flash

http://www.mediafire.com/file/pmniek5ga3pcbsn/fac898.7z/file

Status: finished
Submission Time: 24.06.2020 18:00:02
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    241243
  • API (Web) ID:
    378218
  • Analysis Started:
    24.06.2020 18:01:17
  • Analysis Finished:
    24.06.2020 18:11:11
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
96/100

malicious
34/72

IPs

IP Country Detection
104.16.202.237
United States
199.91.154.50
United States
77.88.21.158
Russian Federation

Domains

Name IP Detection
www.mediafire.com
104.16.202.237
smtp.yandex.ru
77.88.21.158
download2056.mediafire.com
199.91.154.50

URLs

Name Detection
https://BZVsVeDUDomXhE.org
http://schemas.microso
http://subca.ocsp-certum.com0.
Click to see the 13 hidden entries
http://repository.certum.pl/ca.cer09
http://www.mediafire.com/file/pmniek5ga3pcbsn/fac898.7z/file
http://repository.certum.pl/ctnca.cer09
http://crls.yandex.net/certum/ycasha2.crl0-
http://crl.certum.pl/ctnca.crl0k
http://subca.ocsp-certum.com01
http://yandex.crl.certum.pl/ycasha2.crl0q
http://download2056.mediafire.com/t7kl52as3fmg/pmniek5ga3pcbsn/fac898.7z
http://crl.certum.pl/ca.crl0h
https://www.certum.pl/CPS0
http://www.certum.pl/CPS0
http://yandex.ocsp-responder.com03
http://repository.certum.pl/ycasha2.cer0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\rr4hywsr.0fu\fac898.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fac898.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D4DE3F1-B67F-11EA-AAE6-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9D4DE3F3-B67F-11EA-AAE6-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898.7z.mw216qp.partial
7-zip archive data, version 0.4
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898.7z.mw216qp.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898.7z:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\fac898[1].7z
7-zip archive data, version 0.4
#
C:\Users\user\AppData\Local\Temp\3a1m2uue.qx5\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF86D00686D6BA0DDF.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFF9966B38267E881A.TMP
data
#