top title background image
flash

jw2ILbVCX7.exe

Status: finished
Submission Time: 2023-05-26 09:25:16 +02:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe
  • NanoCore
  • RAT

Details

  • Analysis ID:
    876048
  • API (Web) ID:
    1243037
  • Original Filename:
    beca1cb2ead4d465a208217ac1b189d1.exe
  • Analysis Started:
    2023-05-26 09:29:22 +02:00
  • Analysis Finished:
    2023-05-26 09:39:28 +02:00
  • MD5:
    beca1cb2ead4d465a208217ac1b189d1
  • SHA1:
    3251edb9b99c9ff7ad8915073c290b4ee68ae6ba
  • SHA256:
    ee6820bbca27cf252b5d81cbbf0fe67a85246b4eea3c584607640d0f8adde5e2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 61/71
malicious
Score: 35/36
malicious
malicious

IPs

IP Country Detection
212.193.30.230
Russian Federation
192.169.69.26
United States

Domains

Name IP Detection
december2nd.ddns.net
212.193.30.230
december2n.duckdns.org
192.169.69.26

URLs

Name Detection
december2nd.ddns.net
december2n.duckdns.org

Dropped files

Name File Type Hashes Detection
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\jw2ILbVCX7.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmpDDF3.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
ASCII text, with no line terminators
#