top title background image
flash

7371e1b74410000cb35049d74ba9f63da63cabfc28f9aae86769136d7e435ad7.exe

Status: finished
Submission Time: 2020-06-24 10:13:32 +02:00
Malicious
Trojan
Spyware
Evader
Remcos

Comments

Tags

Details

  • Analysis ID:
    241092
  • API (Web) ID:
    377919
  • Analysis Started:
    2020-06-24 10:13:32 +02:00
  • Analysis Finished:
    2020-06-24 10:15:43 +02:00
  • MD5:
    40260c82d6de6b4792a8530eb9c693d9
  • SHA1:
    cb749c5f0fc7849dd613f398392b9f94276a8f53
  • SHA256:
    bcd4432a25c6f69ce343ea14d3b508b48e9d12f899589c7e7346362c0816df2d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 60/73
malicious

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_7371e1b74410000c_d5c9c7f46e118b3273b2860af7c36df8ac5_6ebf9234_1503c494\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBCA.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 24 08:14:04 2020, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD90.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE2D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#