top title background image
flash

DHL04AWB01173903102023PDF.scr.exe

Status: finished
Submission Time: 2023-03-16 17:47:18 +01:00
Malicious
Ransomware
Trojan
Evader
Spyware
GuLoader, Remcos

Comments

Tags

  • DHL
  • exe
  • RemcosRAT
  • scr
  • signed

Details

  • Analysis ID:
    828071
  • API (Web) ID:
    1195161
  • Analysis Started:
    2023-03-16 18:03:17 +01:00
  • Analysis Finished:
    2023-03-16 18:30:13 +01:00
  • MD5:
    1bf124cc783ff47a91ada4e6d4ac9e6b
  • SHA1:
    b78f2ffb785071ab785830cdd4cbc5f010b7480b
  • SHA256:
    494d5735144af171cc15708b37b491b74be1522494958e605ac348dd4897dcf9
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 96
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301

Third Party Analysis Engines

malicious
Score: 9/69

IPs

IP Country Detection
79.134.225.111
Switzerland
162.159.129.233
United States

Domains

Name IP Detection
milliondollar23.duckdns.org
79.134.225.111
cdn.discordapp.com
162.159.129.233

URLs

Name Detection
https://cdn.discordapp.com/attachments/503469199062990850/1085873812794523729/NxXRtUXfgqSkIuV181.bin
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
http://crl.thawte.com/ThawteTimestampingCA.crl0
Click to see the 12 hidden entries
http://www.symauth.com/rpa00
http://ocsp.thawte.com0
http://www.nero.com
https://cdn.discordapp.com/t
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
https://cdn.discordapp.com/
http://nsis.sf.net/NSIS_ErrorError
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
http://www.gopher.ftp://ftp.
http://www.symauth.com/cps0(

Dropped files

Name File Type Hashes Detection
C:\ProgramData\remcos\logs.dat
data
#
C:\Users\user\AppData\Local\Temp\Slbemaalsflyvningers\Chirming.scr
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\nsbBACD.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Temp\nseB51F.tmp
data
#
C:\Users\user\Nonhieratical\Apicad\Outjinx\Nonnavigableness\Competed\Coccosteid.Udr
data
#
C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\TableTextServiceYi.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
#
C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\Z_Custom2.ini
Generic INItialization configuration [allData0]
#
C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlb
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
C:\Users\user\Nonhieratical\Counts\Convolution\Dottily\ArtDeco_brown_22.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, components 3
#
C:\Users\user\Nonhieratical\Counts\Convolution\Dottily\Iconology.Ess
ASCII text, with very long lines (57606), with no line terminators
#
C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\Sports-Wallpapers-1.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, components 3
#