top title background image
flash

Capasw32.dll

Status: finished
Submission Time: 2020-06-25 00:10:33 +02:00
Malicious
Phishing
E-Banking Trojan
Trojan
Spyware
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    241341
  • API (Web) ID:
    378412
  • Analysis Started:
    2020-06-25 00:10:36 +02:00
  • Analysis Finished:
    2020-06-25 00:19:40 +02:00
  • MD5:
    e0d37750f9b4118deafbdf03ae023684
  • SHA1:
    5f32b33a20d466da8a727eb3f29bd702d2653cef
  • SHA256:
    d723bf8324e58a9d88aaa5601d990b4ce9d825c8f91f2d2c04c77dadc3302036
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 35/72

Domains

Name IP Detection
lissavets.at
0.0.0.0
222.222.67.208.in-addr.arpa
0.0.0.0
tahhir.at
0.0.0.0
Click to see the 3 hidden entries
limpopo.at
0.0.0.0
myip.opendns.com
84.17.52.80
resolver1.opendns.com
208.67.222.222

URLs

Name Detection
http://aaxvkah7dudzoloq.onionhttp://lissavets.athttp://tahhir.athttp://limpopo.athttp://estate-advic
http://limpopo.at
http://estate-advice.at
Click to see the 30 hidden entries
http://estate-advice.atconstitution.org/usdeclar.txt0x4eb7d2cacom
http://tahhir.at
http://aaxvkah7dudzoloq.onion
http://lissavets.at
http://https://file://USER.ID%lu.exe/upd
http://www.sandoll.co.kr
http://www.fonts.com
http://www.%s.comPA
https://www.heise.de/
http://www.zhongyicts.com.cn
http://www.sakkal.com
http://www.jiyu-kobo.co.jp/
https://lh3.googleusercontent.com/ogw/default-user=s24
http://constitution.org/usdeclar.txt
http://www.founder.com.cn/cn
http://www.typography.netD
http://fontfabrik.com
http://www.founder.com.cn/cn/cThe
http://www.apache.org/licenses/LICENSE-2.0
http://www.sajatypeworks.com
http://www.carterandcone.coml
http://www.regsofts.com/free_registry_repair/registry_repair.htm
http://www.autoitscript.com/site/autoit/
https://www.heise.de/c
http://www.goodfont.co.kr
http://www.tiro.com
http://constitution.org/usdeclar.txtC:
http://www.founder.com.cn/cn/bThe
http://www.autoitscript.com/favicon.ico
https://lh3.googleusercontent.com/ogw/default-user=s96

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\prefs.js
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\A3E3.bin
Zip archive data (empty)
#
C:\Users\user\AppData\Local\Temp\CBA0.bi1
ASCII text, with CRLF line terminators
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Temp\EA2A.bin
data
#
C:\Users\user\AppData\Roaming\Microsoft\Authtenc\atmftstr.dll
data
#
C:\Users\user\AppData\Roaming\Microsoft\{44B27E05-D318-1648-7DB8-B7AA016CDB7E}\01D64AC00198B5880B
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
#
\Device\Mailslot\sl1088
data
#