flash

Orden_De_Compra_019999_img.exe

Status: finished
Submission Time: 29.05.2020 12:45:41
Malicious
Trojan
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    234159
  • API (Web) ID:
    364467
  • Analysis Started:
    29.05.2020 12:45:42
  • Analysis Finished:
    29.05.2020 12:49:45
  • MD5:
    cc209b878cb2993332dc05802716ad83
  • SHA1:
    c069335fe4a39f64fd0f84b47dae44a832195040
  • SHA256:
    b8541f6bb3a95ce34949861ff7224c39c7f207a55801eaa98d421bf3f3a65e98
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
92/100

malicious
35/72

malicious
23/31

malicious

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Desktop\Veladecor_order1.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 600x600, segment length 16, baseline, precision 8, 5368x6950, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
Click to see the 4 hidden entries
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3202qsrl.02t.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u4vb1sqn.5nv.ps1
ASCII text, with no line terminators
#
C:\Users\user\Documents\20200529\PowerShell_transcript.305090.LfNbm6YD.20200529124617.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\Veladecor_order1.txt
ASCII text, with no line terminators
#