top title background image
flash

dokumentera.exe

Status: finished
Submission Time: 2020-04-02 14:01:41 +02:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

Details

  • Analysis ID:
    219753
  • API (Web) ID:
    336355
  • Analysis Started:
    2020-04-02 14:01:42 +02:00
  • Analysis Finished:
    2020-04-02 14:08:51 +02:00
  • MD5:
    54eab4922369977af26e96d086134633
  • SHA1:
    a8f597f51f553613598db31e8aeca1397be85c5d
  • SHA256:
    8a90616e98ae23edd79a64f17dde8ed6152cb9ef7b917b8b266827db19c1e735
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 26/72
malicious
Score: 14/31

IPs

IP Country Detection
172.111.188.199
United States

URLs

Name Detection
http://www.jiyu-kobo.co.jp/w
http://www.sandoll.co.kro.kr
http://www.tiro.comic
Click to see the 28 hidden entries
http://www.sakkal.com
http://www.zhongyicts.com.cn
http://www.sandoll.co.kr
http://www.fonts.com
http://www.typography.net-br
http://www.jiyu-kobo.co.jp/Y0
http://www.jiyu-kobo.co.jp/
http://www.jiyu-kobo.co.jp/m
http://www.typography.net
http://www.jiyu-kobo.co.jp/8
http://www.founder.com.cn/cnp
http://www.founder.com.cn/cn
http://fontfabrik.com
http://www.apache.org/licenses/LICENSE-2.0
http://www.founder.com.cn/cn/cThe
http://www.typography.netD
http://www.founder.com.cn/cn/
http://www.sajatypeworks.com
http://www.carterandcone.coml
http://www.jiyu-kobo.co.jp/jp/
http://www.goodfont.co.kr
http://www.tiro.comI
http://www.goodfont.co.krL
http://www.tiro.com
http://www.jiyu-kobo.co.jp/O
http://www.founder.com.cn/cn/bThe
http://www.typography.net-us
http://www.sajatypeworks.compor

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dokumentera.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp1D19.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\run.dat
data
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\aKrtWHyRehAOaq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\aKrtWHyRehAOaq.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#