top title background image
flash

SWIFT MO104978172_1301 EURO 9700.js

Status: finished
Submission Time: 2023-02-02 12:29:15 +01:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • js
  • NanoCore
  • RAT

Details

  • Analysis ID:
    796930
  • API (Web) ID:
    1164158
  • Analysis Started:
    2023-02-02 12:36:13 +01:00
  • Analysis Finished:
    2023-02-02 12:49:28 +01:00
  • MD5:
    0d6f726c3c2a4f6e82f0ede90ba88155
  • SHA1:
    668eb996c241e10fb19c3a6ae5024309470be171
  • SHA256:
    658c78c61ac43dc28e128cd71060b2c5ab03ed241cbcd32c5a0f5a09f081a574
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 18/39
malicious
malicious

URLs

Name Detection
bition.duckdns.org
http://upx.sf.net
http://nsis.sf.net/NSIS_ErrorError
Click to see the 1 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\tabgrjvojn\syhbwgs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\SWIFT MO104978172_1301 EURO 9700.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
International EBCDIC text, with no line terminators
#
Click to see the 19 hidden entries
C:\Users\user\AppData\Local\Temp\fdqkbs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fdqkbs.exe.log
ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fdqkbs.exe_3b5310cef4636bfdd6ade66b7a63e113c499e9f_d2ed2369_0d427a15\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9550.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
#
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
#
C:\Users\user\AppData\Local\Temp\rkgnewnhq.v
data
#
C:\Users\user\AppData\Local\Temp\nse2F03.tmp
data
#
C:\Users\user\AppData\Local\Temp\cdbnwuwdrt.r
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94E1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER932B.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Feb 2 20:37:39 2023, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER74E7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7478.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72C2.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Feb 2 20:37:31 2023, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72B4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7246.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FB5.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Feb 2 20:37:30 2023, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_syhbwgs.exe_f4889ff7e22f232fc0b23411b3d2f693b1794092_282dfd12_12f69936\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_syhbwgs.exe_f4889ff7e22f232fc0b23411b3d2f693b1794092_282dfd12_0cfe7af0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
#