top title background image
flash

file.exe

Status: finished
Submission Time: 2023-03-20 19:31:11 +01:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • NET
  • exe
  • MSIL

Details

  • Analysis ID:
    830902
  • API (Web) ID:
    1198002
  • Analysis Started:
    2023-03-20 19:36:46 +01:00
  • Analysis Finished:
    2023-03-20 19:49:38 +01:00
  • MD5:
    2ddec3a033a6ded2ec135bb2f3ec897d
  • SHA1:
    cb40f86b808c7b7812fff7820dc596d3a78e5760
  • SHA256:
    bb4297e1d60fbf0c9670f3a436d3c00993307ccf5bbf9bade4a6ebcb608edd6c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 30/68
malicious
Score: 14/39

IPs

IP Country Detection
149.154.167.220
United Kingdom
104.237.62.211
United States

Domains

Name IP Detection
api4.ipify.org
104.237.62.211
api.telegram.org
149.154.167.220
api.ipify.org
0.0.0.0

URLs

Name Detection
https://www.newtonsoft.com/json
http://api.ipify.org
http://james.newtonking.com/projects/json
Click to see the 14 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://api.telegram.org
https://urn.to/r/sds_see
https://api.telegram.org/bot5687731944:AAEDpsUftmaHrKNSGkOlhq0UZLPEvIUd8Bo/
http://api4.ipify.org
https://www.nuget.org/packages/Newtonsoft.Json.Bson
https://api.ipify.org/
https://api.telegram.org/bot5687731944:AAEDpsUftmaHrKNSGkOlhq0UZLPEvIUd8Bo/sendDocument
https://www.newtonsoft.com/jsonschema
https://api.ipify.org4
https://api.telegram.org
http://www.microsoft.s
https://api.telegram.org4
https://api.ipify.org

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Uwztwjweuc\Qasvjoldkyh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Uwztwjweuc\Qasvjoldkyh.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Roaming\kDPmkTm\kDPmkTm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\kDPmkTm\kDPmkTm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Qasvjoldkyh.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kDPmkTm.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2egqyutc.ddd.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cea0kgqa.155.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fkiks3cu.tp3.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3bxpezw.gna.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tilezn50.bbb.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vy0mxscm.2f4.ps1
very short file (no magic)
#