top title background image
flash

satan_1.0.0.14.exe

Status: finished
Submission Time: 2020-07-19 21:36:48 +02:00
Malicious
Ransomware
Trojan
Evader

Comments

Tags

  • satan

Details

  • Analysis ID:
    247405
  • API (Web) ID:
    390420
  • Analysis Started:
    2020-07-20 05:13:25 +02:00
  • Analysis Finished:
    2020-07-20 05:27:53 +02:00
  • MD5:
    802e683af9dae89d568acaab6715ce6c
  • SHA1:
    66777253c5d7691b409ba23e587fd530dd3b9291
  • SHA256:
    5036daccd356ba9794957dc02668b903e2779eb2865aa2cf6605c8cb9f639da6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 62/71
malicious
Score: 27/40
malicious
Score: 27/29
malicious

IPs

IP Country Detection
1.0.0.14
Australia
84.53.167.113
European Union
44.227.65.245
United States

Domains

Name IP Detection
5f4vtuymlsrwczfo.onion.pw
0.0.0.0
pixie.porkbun.com
44.227.65.245

URLs

Name Detection
http://5f4vtuymlsrwczfo.onion.pw/g.phpUmoM4Z1X
http://5f4vtuymlsrwczfo.onion.pw/g.phpare
http://5f4vtuymlsrwczfo.onion.pw/g.php
Click to see the 78 hidden entries
http://5f4vtuymlsrwczfo.onion.pw/g.phpO
https://41a66c0b43b920b14091e66ab7bbc190.clo.footprintdns.com/apc/trans.gif?88e953226870ecc41caf6fdf
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.0zbexSetmgk.O/ck=xjs.s.QBsohBG_1Fg.L.I11.O/am=AAAAgCUAs
http://www.carterandcone.coml
https://%s.xboxlive.com
http://www.google.ch/
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
https://pki.goog/repository/0
http://ocsp.pki.goog/gsr202
http://www.founder.com.cn/cn
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
http://pki.goog/gsr2/GTS1O1.crt0
http://ocsp.pki.goog/gts1o10
https://oneclient.sfx.ms/Win/Prod/19.232.1124.0005/update1.xml?OneDriveUpdate=dc16c11b8916bce05ab4c1
https://login.windows.net/OW
https://aefd.nelreports.net/0
http://www.apache.org/licenses/LICENSE-2.0
http://www.msn.com/de-ch/?ocid=iehpsig
http://crl.pki.goog/gsr2/gsr2.crl0?
https://xsts.auth.xboxlive.com/
https://%s.dnet.xboxlive.com
http://pki.goog/gsr2/GTS1O1.crt0-
https://8eb03f0336a2c2b69706d046a941d170.clo.footprintdns.com/apc/trans.gif?825d32bf21e2310b8e774ca0
https://www.google.ch/?gws_rd=ssl
http://onion.pw
https://policies.yahoo.com/w3c/p3p.xml
https://site-cdn.onenote.net/161252631556_Images/LiveTileImages/MediumAndLarge/Image1.png
https://activity.windows.com
http://www.msn.com/de-ch/?ocid=iehp
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.0zbexSetmgk.O/ck=xjs.s.QBsohBG_1Fg.L.I11.O/m=Fkg7bd
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1.
https://aefd.nelreports.net/api/report?cat=bingrms
http://www.jiyu-kobo.co.jp/
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
https://logincdn.msauth.net/16.000/js/MeControl_tfp5xc9B9RRsZ_q18BJrBA2.js
https://cvision.media.net/new/300x300/2/165/191/129/7bab3851-c82b-4a6b-a3f4-0f55d5eb598e.jpg?v=9
https://aefd.nelreports.net/api/report?cat=bingaot
http://crl.pki.goog/GTS1O1.crl0
https://41a66c0b43b920b14091e66ab7bbc190.clo.footprintdns.com/apc/trans.gif?9853ed5affe7cf36fef19410
http://www.sajatypeworks.com
https://.com/rb/P
https://m.qualifytring.com/apc/trans.gif?af46a0f30939d88b3b328e65714dc57c
http://onion.pw/REGISTRY
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1/XfSzEvX8
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meCore.min.js
https://cvision.media.net/new/300x300/3/152/90/102/3c7651d5-23ee-4b11-833e-c2006603cf5d.jpg?v=9
http://www.goodfont.co.kr
https://www.google.ch/logos/doodles/2020/celebrating-nkosi-johnson-6753651837108279-l.png
https://www.google.ch/images/searchbox/desktop_searchbox_sprites302_hr.png
http://www.tiro.com
https://s.yimg.com/av/ads/1578409727690-8096.jpgF%2Fwww.msn.com%2Fde-ch%2F%3Focid%3Diehp&nse=3&vi=15
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1131
https://www.google.ch/images/nav_logo299.png
https://www.google.ch
https://xsts.auth.xboxlive.com
https://m.qualifytring.com/apc/trans.gif?78a32e80b9c0adf25a60b0e5f7c886ac
http://www.founder.com.cn/cn/bThe
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_333%2Cw_311%2Cc_fill%2Cg_faces:au
http://ns.ado
http://www.sakkal.com
http://www.zhongyicts.com.cn
http://www.sandoll.co.kr
http://www.fonts.com
http://www.%s.comPA
http://onion.pw/
https://contextual.media.net/nrrV36594.js
https://www.google.ch/favicon.ico
http://www.msn.com/?ocid=iehp
https://login.windows.net
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meBoot.min.js
https://maps.windows.com/windows-app-web-link
https://s.yimg.com/lo/api/res/1.2/VDiJ3sgxtBN_DlN7ef9aNw--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1v15
http://fontfabrik.com
https://contextual.media.net/mediamain.html?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3D%3D&
https://8eb03f0336a2c2b69706d046a941d170.clo.footprintdns.com/apc/trans.gif?f335f01350d79361e0eb49d1
http://www.founder.com.cn/cn/cThe
http://www.typography.netD

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmp_394b3111.bat
DOS batch file, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Ryomwi\wucy.exe
PE32+ executable (GUI) x86-64, for MS Windows
#