top title background image
flash

sphinx_1.0.1.2.exe

Status: finished
Submission Time: 2020-07-19 21:36:54 +02:00
Malicious
Phishing
E-Banking Trojan
Trojan
Spyware
Evader
ZeusVM

Comments

Tags

  • sphinx

Details

  • Analysis ID:
    247410
  • API (Web) ID:
    390429
  • Analysis Started:
    2020-07-20 05:20:58 +02:00
  • Analysis Finished:
    2020-07-20 05:36:29 +02:00
  • MD5:
    36bb5464092459c07fc4a5014304d072
  • SHA1:
    345864026b571328aa2deeb9c2fc62fa75e5e847
  • SHA256:
    b7969b30d717867cea9427b87a822d59edd94600312599cf407d0d6ec35988ed
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 57/72
malicious
Score: 19/42
malicious
Score: 28/31
malicious

IPs

IP Country Detection
1.0.1.2
China
76.73.17.194
United States
208.83.223.34
United States

URLs

Name Detection
http://jr3cpbcfbd66zlff.onion/server/config.bin
http://www.tiro.com
https://s.yimg.com/lo/api/res/1.2/FN4h_a.kTjdeFYsRtNEUxg--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
Click to see the 97 hidden entries
http://fontfabrik.com
http://www.typography.netD
https://www.google.ch/images/searchbox/desktop_searchbox_sprites302_hr.png
http://www.openssl.org/support/faq.html
https://s.yimg.com/lo/api/res/1.2/HTh4MviMESQCU1YsoWf5Ew--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meCore.min.js
http://freehaven.net/anonbib/#hs-attack06
http://www.goodfont.co.kr
https://cdn.adnxs.com/v/s/184/trk.js
https://s.yimg.com/av/ads/1563208817331-3136.jpg
https://www.msn.com/spartan/en-us/secure/silentpassport?secure=true&lc=1033
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meBoot.min.js
http://GETHEADPOSTPUTCONNECTHTTP/1.Couldn
https://www.google.ch/images/nav_logo299.png
https://xsts.auth.xboxlive.com
http://www.founder.com.cn/cn/bThe
https://wiki.torproject.org/TheOnionRouter/TorFAQ#SOCKSAndDNS.%s
https://login.windows.net
https://xsts.auth.xboxlive.com/
https://policies.yahoo.com/w3c/p3p.xml
http://crl.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crl0
https://www.google.ch/images/branding/googlelogo/2x/googlelogo_color_272x92dp.png
http://crl.pki.goog/gsr2/gsr2.crl0?
https://cvision.media.net/new/300x300/2/59/25/211/dbde3f3c-eae8-448a-9ce8-5bce3ce848b1.jpg?v=9
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/Small/Image2.png
https://aefd.nelreports.net/api/report?cat=bingaot
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1cj
https://87102a4e47b39a9075c891cdc256e1e9.clo.footprintdns.com/apc/trans.gif?0b76dc40748f1c54790c8a1c
http://www.founder.com.cn/cn
http://www.msn.com/de-ch/?ocid=iehp
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/MediumAndLarge/Image2.png
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meCore.min.js=
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1jsM
https://wiki.torprojec
https://www.torproject.org/download/download#warning
https://www.torproject.
https://sectigo.com/CPS0
http://www.apache.org/licenses/LICENSE-2.0
http://www.sakkal.com
http://www.sandoll.co.kr
http://www.fonts.com
http://www.%s.comPA
https://cvision.media.net/new/300x300/3/108/131/132/67242227-7e6f-4527-83ab-b36ef6ebcdaa.jpg?v=9
https://www.google.ch/favicon.ico
https://www.torproject.org/documentation.html
https://wiki.torproject.org/TheOnionRouter/TorFAQ#SOCKSAndDNS.%sDANGEROUS_SOCKS
http://www.founder.com.cn/cn/cThe
https://www.bizographics.com/collect/?fmt=gif&pid=7850
https://www.bizographics.com/collect/?fmt=gif&pid=7850s%
https://acdn.adnxs.com/ast/ast.js
http://www.autoitscript.com/autoit3/J
http://crl.pki.goog/GTS1O1.crl0
https://img.s-msn.com/tenant/amp/entityid/AAbzMB2.img
https://87102a4e47b39a9075c891cdc256e1e9.clo.footprintdns.com/apc/trans.gif?8c23236cfa866020f02514c9
http://www.zhongyicts.com.cn
http://www.msn.com/?ocid=iehp
http://crt.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crt0#
https://maps.windows.com/windows-app-web-link
https://contextual.media.net/mediamain.html?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3D%3D&
http://ocsp.sectigo.com09
http://www.sajatypeworks.com
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_350%2Cw_624%2Cc_fill%2Cg_faces:aut
https://contextual.media.net/nrrV79893.js
https://mem.gfx.ms/scripts/me/MeControl/10.20056.4/en-US/meCore.min.js
https://www.torproject.org/
https://s.yimg.com/lo/api/res/1.2/mpnNnPAItj5pNCsM3mwM7A--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
https://logincdn.msauth.net/16.000/js/MeControl_US1oxnIoNcCp1NX7xVSBjw2.jss
http://www.msn.com
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850
https://www.msn.com/spartan/ientp?lop
https://wiki.torproject.org/TheOnionRouter/TorFAQ#ServerOS
https://%s.xboxlive.com
https://aefd.nelreports.net/api/report?cat=bingrms
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.exaHKifUbd4.O/ck=xjs.s.VN7hb22Vkco.L.I11.O/m=Fkg7bd
https://www.msn.com/content/images/icons/Favicon_EdgeStart.ico
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_175%2Cw_300%2Cc_fill%2Cg_faces:aut
https://pr-bh.ybp.yahoo.com/sync/msn/2D22DE20AE066B032C5ED0B2AF0F6A94
https://logincdn.msauth.net/16.000/js/MeControl_tfp5xc9B9RRsZ_q18BJrBA2.js
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850&liSync=true
http://nsis.sf.net/NSIS_Error
https://login.windows.net/
https://srtb.msn.com/auction?a=de-ch&b=687d3f87ff2e49babadba9e49aac8d3f&c=MSN&d=http%3A%2F%2Fwww.msn
http://www.carterandcone.coml
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/Wide/Image2.png
https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=0&seller_id=280&pub_id=43801
http://www.google.ch/
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
https://pki.goog/repository/0
http://ocsp.pki.goog/gsr202
http://nsis.sf.net/NSIS_ErrorError
https://img.s-msn.com/tenant/amp/entityid/AAbzMB2
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
http://pki.goog/gsr2/GTS1O1.crt0
https://logincdn.msauth.net/16.000/js/MeControl_US1oxnIoNcCp1NX7xVSBjw2.js
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.exaHKifUbd4.O/ck=xjs.s.VN7hb22Vkco.L.I11.O/am=AAAAgCUAs
http://ocsp.pki.goog/gts1o10

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmpd23ef3bb.bat
DOS batch file, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Eqogty\qoqu.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Roaming\nourishments.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Local\Temp\nscEDB4.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsnC9B1.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsoBE37.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsrDFD8.tmp
data
#
C:\Users\user\AppData\Roaming\25-unhint-nonlatin.conf
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Roaming\BatheUredosporeCosmology
data
#
C:\Users\user\AppData\Roaming\OS Shortcuts.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\arrow_left_enabled.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\olduninstall.iss
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\pcdrdvdminusrw.p5m
data
#
C:\Users\user\AppData\Roaming\tor\state.tmp
ASCII text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#