top title background image
flash

Education and Experience.lnk(1).zip

Status: finished
Submission Time: 2023-02-15 23:30:09 +01:00
Malicious
Evader

Comments

Tags

Details

  • Analysis ID:
    809075
  • API (Web) ID:
    1176271
  • Analysis Started:
    2023-02-15 23:30:10 +01:00
  • Analysis Finished:
    2023-02-15 23:35:40 +01:00
  • MD5:
    254c94d8e782c1e10fd3021b56638bc7
  • SHA1:
    cc6081254fa2a6f9c472123ad81534769e7dc6d3
  • SHA256:
    af67e631e6c185c8c127267fa57efffe589612feba6d43755ceda0a3104ac1ad
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 52
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
142.11.222.59
United States

Domains

Name IP Detection
sophia-lagoon.net
142.11.222.59

URLs

Name Detection
https://suggest.yandex.by/suggest-ff.cgi?srv=ie11&part=
http://www.baidu.com/favicon.icohttps://suggest.yandex.com.tr/suggest-ff.cgi?srv=ie11&uil=tr&part=
https://suggest.yandex.kz/suggest-ff.cgi?srv=ie11&part=
Click to see the 6 hidden entries
https://suggest.yandex.ua/suggest-ff.cgi?srv=ie11&part=
http://sophia-lagoon.net/81754783
http://sophia-lagoon.net/81754783WWC:
http://sophia-lagoon.net/81754783lP
https://www.baidu.com/s?tn=80035161_2_dg&wd=
https://www.sogou.com/tx?hdq=sogou-wsse-6abba5d8ab1f4f32&query=

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.bak
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-ClearIconCache.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-basesettings.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\ieuinit.inf
Windows setup INFormation
#
C:\Users\user\Favorites\Bing.url
Generic INItialization configuration [InternetShortcut]
#
C:\Windows\Temp\OLDF396.tmp
Windows setup INFormation
#
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
#