top title background image
flash

http://www.mediafire.com/file/pmniek5ga3pcbsn/fac898.7z/file

Status: finished
Submission Time: 2020-06-24 18:00:02 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    241243
  • API (Web) ID:
    378218
  • Analysis Started:
    2020-06-24 18:01:17 +02:00
  • Analysis Finished:
    2020-06-24 18:11:11 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 96
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 34/72

IPs

IP Country Detection
104.16.202.237
United States
199.91.154.50
United States
77.88.21.158
Russian Federation

Domains

Name IP Detection
www.mediafire.com
104.16.202.237
smtp.yandex.ru
77.88.21.158
download2056.mediafire.com
199.91.154.50

URLs

Name Detection
https://BZVsVeDUDomXhE.org
http://schemas.microso
http://subca.ocsp-certum.com0.
Click to see the 13 hidden entries
http://repository.certum.pl/ca.cer09
http://www.mediafire.com/file/pmniek5ga3pcbsn/fac898.7z/file
http://repository.certum.pl/ctnca.cer09
http://crls.yandex.net/certum/ycasha2.crl0-
http://crl.certum.pl/ctnca.crl0k
http://subca.ocsp-certum.com01
http://yandex.crl.certum.pl/ycasha2.crl0q
http://download2056.mediafire.com/t7kl52as3fmg/pmniek5ga3pcbsn/fac898.7z
http://crl.certum.pl/ca.crl0h
https://www.certum.pl/CPS0
http://www.certum.pl/CPS0
http://yandex.ocsp-responder.com03
http://repository.certum.pl/ycasha2.cer0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\rr4hywsr.0fu\fac898.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fac898.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D4DE3F1-B67F-11EA-AAE6-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9D4DE3F3-B67F-11EA-AAE6-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898.7z.mw216qp.partial
7-zip archive data, version 0.4
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898.7z.mw216qp.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898.7z:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898[1].7z
7-zip archive data, version 0.4
#
C:\Users\user\AppData\Local\Temp\3a1m2uue.qx5\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF86D00686D6BA0DDF.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFF9966B38267E881A.TMP
data
#