top title background image
flash

PSFBGrvmxy.exe

Status: finished
Submission Time: 2023-03-20 18:23:22 +01:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • exe

Details

  • Analysis ID:
    830847
  • API (Web) ID:
    1197943
  • Original Filename:
    c4b59f8e80a1289b9202a33da41d7d94.exe
  • Analysis Started:
    2023-03-20 18:30:48 +01:00
  • Analysis Finished:
    2023-03-20 18:44:23 +01:00
  • MD5:
    c4b59f8e80a1289b9202a33da41d7d94
  • SHA1:
    9e50bc56372bd9f6c8cccf4c284bc373fde319f0
  • SHA256:
    66d51327bab933eda9d755eb691e584fcb324b04c573d1be50d634c7297134f8
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 39/68
malicious
Score: 16/24

IPs

IP Country Detection
149.154.167.220
United Kingdom
64.185.227.155
United States
173.231.16.76
United States

Domains

Name IP Detection
api4.ipify.org
64.185.227.155
api.telegram.org
149.154.167.220
api.ipify.org
0.0.0.0

URLs

Name Detection
https://api.ipify.org/
https://api.ipify.org
https://api.telegram.org4
Click to see the 10 hidden entries
https://api.telegram.org
https://www.newtonsoft.com/jsonschema
https://api.telegram.org/bot5687731944:AAEDpsUftmaHrKNSGkOlhq0UZLPEvIUd8Bo/sendDocument
https://www.newtonsoft.com/json
https://www.nuget.org/packages/Newtonsoft.Json.Bson
https://api.telegram.org/bot5687731944:AAEDpsUftmaHrKNSGkOlhq0UZLPEvIUd8Bo/
https://urn.to/r/sds_see
http://api.telegram.org
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://james.newtonking.com/projects/json

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\kDPmkTm\kDPmkTm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\kDPmkTm\kDPmkTm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Xnckpwz\Vlrvln.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 14 hidden entries
C:\Users\user\AppData\Roaming\Xnckpwz\Vlrvln.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PSFBGrvmxy.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gttgckaj.t2k.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vzsrsnwb.prs.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ndva24ym.xs2.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lisb23su.oum.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_isna14iz.ron.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fie33zp.osx.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2rnvnvtl.wmk.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xd0qs05.x0o.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kDPmkTm.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Vlrvln.exe.log
ASCII text, with CRLF line terminators
#