top title background image
flash

ewuTygg1Bw.exe

Status: finished
Submission Time: 2020-06-08 19:19:33 +02:00
Malicious
Trojan
Spyware
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    236613
  • API (Web) ID:
    369284
  • Analysis Started:
    2020-06-08 19:21:25 +02:00
  • Analysis Finished:
    2020-06-08 19:35:09 +02:00
  • MD5:
    0060b9cfb3b239c92f18f3b1ae7d8c3c
  • SHA1:
    7170ef2a931341c0c4fb152c1552a5049eca68ae
  • SHA256:
    bb973839df53081c969a7e6647bdfc2d3090b43b496fe8e2244a51a604264112
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 25/68

IPs

IP Country Detection
104.219.248.115
United States

Domains

Name IP Detection
longfellowpurebreds.com
104.219.248.115
www.longfellowpurebreds.com
0.0.0.0
www.audreyfarley.com
0.0.0.0
Click to see the 2 hidden entries
www.diamond-distinction.com
0.0.0.0
ext-sq.squarespace.com
198.185.159.144

URLs

Name Detection
http://www.longfellowpurebreds.com/4vx/?T4s=JVdfqtShaZLEdrfPMUiD2srIZ4Eny+NoRWx7/Ra+VhS0efzYbtMJqhi2JVU5dyBSSoIe&GlTD=Q87p3Xr0bF8LO
http://www.%s.comPA
http://www.sajatypeworks.com
Click to see the 18 hidden entries
https://www.msn.com/content/images/icons/Favi
http://www.carterandcone.coml
http://www.msn.com/ocid=iehpm3
http://www.msn.com/de-ch/ocid=iehp
http://www.sakkal.com
http://www.zhongyicts.com.cn
http://www.goodfont.co.kr
http://www.sandoll.co.kr
http://www.fonts.com
http://www.typography.netD
http://www.tiro.com
http://www.jiyu-kobo.co.jp/
http://www.msn.com/?ocid=iehp
http://www.founder.com.cn/cn/bThe
http://www.founder.com.cn/cn
http://fontfabrik.com
http://www.apache.org/licenses/LICENSE-2.0
http://www.founder.com.cn/cn/cThe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ewuTygg1Bw.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\DB1
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Local\Temp\Iobk\vgaot707b.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Roaming\983-T328\983logrf.ini
data
#
C:\Users\user\AppData\Roaming\983-T328\983logri.ini
data
#
C:\Users\user\AppData\Roaming\983-T328\983logrv.ini
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vgaot707b.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\983-T328\983logim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Roaming\983-T328\983logrg.ini
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
MS Windows shortcut, Item id list present, Points to a file or directory, Read-Only, Directory, ctime=Wed Apr 11 22:38:20 2018, mtime=Mon Jun 8 16:24:40 2020, atime=Mon Jun 8 16:24:40 2020, length=8192, window=hide
#