flash

svchost.exe

Status: finished
Submission Time: 18.04.2020 02:01:24
Malicious
Trojan
Evader
AsyncRAT

Comments

Tags

Details

  • Analysis ID:
    223564
  • API (Web) ID:
    343758
  • Analysis Started:
    18.04.2020 02:01:25
  • Analysis Finished:
    18.04.2020 02:09:44
  • MD5:
    67deca381bb44b96fa13bead0adc1a6b
  • SHA1:
    43438e798b9affd9fcb871dfb8c31f42b06f5b4c
  • SHA256:
    e9c607f263a990db1bf0465c8688ed7ce7e5f294845041fb56af313df34f45df
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
55/72

malicious
25/30

IPs

IP Country Detection
192.169.69.25
United States

Domains

Name IP Detection
babyboyhammer2.duckdns.org
192.169.69.25

URLs

Name Detection
http://www.apache.org/licenses/LICENSE-2.0
http://www.founder.com.cn/cn/bThe
http://www.tiro.com
Click to see the 28 hidden entries
http://www.founder.com.cn/cnto
http://www.founder.com.cn/cnn-us
http://www.goodfont.co.kr
http://www.zhongyicts.com.cnhttp://www.zhongyicts.com.cn
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.founder.com.cn/cn/
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.founder.com.cn/cnh5
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.founder.com.cn/cnm
http://www.sandoll.co.krs-czrm
http://www.founder.com.cn/cnoft.com/typography/fonts)
http://www.jiyu-kobo.co.jp/
http://www.mn-use.
http://www.sandoll.co.kror
http://ww.micro
http://www.zhongyicts.com.cno.
http://www.ascendercorp.com/typedesigners.html
http://www.fonts.com
http://www.sandoll.co.kr
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.sakkal.com
http://www.founder.com.cn/cn)
http://www.founder.com.cn/cnh

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmpF42D.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\USNizoLckoTtei.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Roaming\USNizoLckoTtei.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#