top title background image
flash

izwFjkhFJm.exe

Status: finished
Submission Time: 2023-03-20 18:23:22 +01:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • exe
  • Telegram

Details

  • Analysis ID:
    830846
  • API (Web) ID:
    1197942
  • Original Filename:
    ae2a3b41292c66a9dd6f10c874c05293.exe
  • Analysis Started:
    2023-03-20 18:29:53 +01:00
  • Analysis Finished:
    2023-03-20 18:43:56 +01:00
  • MD5:
    ae2a3b41292c66a9dd6f10c874c05293
  • SHA1:
    caa30701c5487c2aecfb9b35b1d0e9ea6f3214b6
  • SHA256:
    65cc1ea27c733c270dd0497ed9c99896baf50eeafa5e1200889557985bfd87d5
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 36/68
malicious
Score: 13/39

IPs

IP Country Detection
149.154.167.220
United Kingdom
173.231.16.76
United States

Domains

Name IP Detection
api4.ipify.org
173.231.16.76
api.telegram.org
149.154.167.220
api.ipify.org
0.0.0.0

URLs

Name Detection
https://api.ipify.org/
https://api.ipify.org
https://api.telegram.org4
Click to see the 10 hidden entries
https://api.telegram.org
https://www.newtonsoft.com/jsonschema
https://api.telegram.org/bot5687731944:AAEDpsUftmaHrKNSGkOlhq0UZLPEvIUd8Bo/sendDocument
https://www.newtonsoft.com/json
https://www.nuget.org/packages/Newtonsoft.Json.Bson
https://api.telegram.org/bot5687731944:AAEDpsUftmaHrKNSGkOlhq0UZLPEvIUd8Bo/
https://urn.to/r/sds_see
http://api.telegram.org
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://james.newtonking.com/projects/json

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\izwFjkhFJm.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Ienlugq\Oefdyik.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Ienlugq\Oefdyik.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Roaming\kDPmkTm\kDPmkTm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\kDPmkTm\kDPmkTm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Oefdyik.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23uza2uz.txl.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ch2n5eak.wf2.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d5xdroaz.3qx.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsdp1x51.web.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p4snmec2.2zw.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rydz4q53.akc.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_txscot0j.aim.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xu1bhbsk.zgm.psm1
very short file (no magic)
#