top title background image
flash

evolution_2.0.9.4.exe

Status: finished
Submission Time: 2020-07-19 20:45:56 +02:00
Malicious
Trojan

Comments

Tags

  • evolution
  • ZeuS

Details

  • Analysis ID:
    247213
  • API (Web) ID:
    390070
  • Analysis Started:
    2020-07-20 00:18:09 +02:00
  • Analysis Finished:
    2020-07-20 00:28:01 +02:00
  • MD5:
    36d91d4eb7ec4a756d48662895c46b45
  • SHA1:
    cee3c0f23fd194ee14ba03cd88526346d16d58e2
  • SHA256:
    e9c72773235196502fbbb9eb387351945503ce887cd1d873b70b2a92e3a913a2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass

Third Party Analysis Engines

malicious
Score: 58/69
malicious
Score: 27/39
malicious
Score: 26/31
malicious

IPs

IP Country Detection
2.0.9.4
France

URLs

Name Detection
http://identityAccept-EncodingTEIf-Modified-Sincetext/html;q=0.7
http://www.microsoft.cR
http://microsoft.co
Click to see the 4 hidden entries
http://dinos.uni.me/file.php
http://yandex.com/bots)
http://%s/someRandomGen=%u&user.login=%u&us.pass=%u&email=%u&name=%u&id=%u&file=%u&someRandomGen=%u&
http://yandex.com/bots)Opera/9.80

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_bad_module_info_d7276e448c8d28f2863f777566e3693183cdc5a3_85207d7d_128458a6\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4ABE.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D4F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Temp\WER3AEE.tmp.WERDataCollectionStatus.txt
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Users\user\Desktop\gmon.out
data
#