top title background image
flash

citadel_1.3.1.0.exe

Status: finished
Submission Time: 2020-07-19 21:22:36 +02:00
Malicious

Comments

Tags

  • citadel

Details

  • Analysis ID:
    247231
  • API (Web) ID:
    390104
  • Analysis Started:
    2020-07-20 00:46:17 +02:00
  • Analysis Finished:
    2020-07-20 00:55:16 +02:00
  • MD5:
    b3a89f2ad0c7f93c5c372ff5fe2b4cbc
  • SHA1:
    60ad3147c56275e99c06576948f31a14bbf6dcc8
  • SHA256:
    4c850cfff31192c9f8439e0b9e4127d0b419c9909d2c85e7e99a5bb0115db3c9
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass

Third Party Analysis Engines

malicious
Score: 59/71
malicious
Score: 29/31
malicious

IPs

IP Country Detection
1.3.1.0
China

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_citadel_1.3.1.0._bc9bd9fb1272375b94d5521346f0f2fb91f031d6_c0b866f8_0582d852\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCC9.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jul 19 22:47:42 2020, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE21.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF1C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#