top title background image
flash

sphinx_1.0.1.3.exe

Status: finished
Submission Time: 2020-07-19 21:40:49 +02:00
Malicious
E-Banking Trojan
Trojan
Evader
ZeusVM

Comments

Tags

  • sphinx

Details

  • Analysis ID:
    247434
  • API (Web) ID:
    390457
  • Analysis Started:
    2020-07-20 06:02:20 +02:00
  • Analysis Finished:
    2020-07-20 06:17:04 +02:00
  • MD5:
    b7e49c14c005991da635005f6022167d
  • SHA1:
    6e169aa8cb0ee6535fcb552706767554d785bcb9
  • SHA256:
    99429e0d24148741ba7b04a8acceb7177ee27a1c3ff6c2dd7f324a937094e270
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 52/69
malicious
Score: 10/42
malicious
Score: 24/31
malicious

IPs

IP Country Detection
1.0.1.3
China
154.35.32.5
United States
76.73.17.194
United States

URLs

Name Detection
http://ocsp.pki.goog/gsr202
http://nsis.sf.net/NSIS_Error
http://www.msn.com/de-ch/?ocid=iehp
Click to see the 69 hidden entries
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.0zbexSetmgk.O/ck=xjs.s.QBsohBG_1Fg.L.I11.O/am=AAAAgCUAs
https://s.yimg.com/av/ads/1578409727690-8096.jpg
https://%s.xboxlive.com
http://www.google.ch/
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
https://pki.goog/repository/0
https://aefd.nelreports.net/api/report?cat=bingaot
https://41a66c0b43b920b14091e66ab7bbc190.clo.footprintdns.com/apc/trans.gif?88e953226870ecc41caf6fdf
http://nsis.sf.net/NSIS_ErrorError
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
http://pki.goog/gsr2/GTS1O1.crt0
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1v=9
https://wiki.torprojec
http://ocsp.pki.goog/gts1o10
https://oneclient.sfx.ms/Win/Prod/19.232.1124.0005/update1.xml?OneDriveUpdate=dc16c11b8916bce05ab4c1
http://crl.pki.goog/gsr2/gsr2.crl0?
https://xsts.auth.xboxlive.com/
https://%s.dnet.xboxlive.com
http://pki.goog/gsr2/GTS1O1.crt0-
https://8eb03f0336a2c2b69706d046a941d170.clo.footprintdns.com/apc/trans.gif?825d32bf21e2310b8e774ca0
https://www.google.ch/?gws_rd=ssl
https://policies.yahoo.com/w3c/p3p.xml
https://site-cdn.onenote.net/161252631556_Images/LiveTileImages/MediumAndLarge/Image1.png
https://activity.windows.com
https://login.windows.net/OW
https://www.torproject.org/download/download#warning
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.0zbexSetmgk.O/ck=xjs.s.QBsohBG_1Fg.L.I11.O/m=Fkg7bd
https://aefd.nelreports.net/api/report?cat=bingrms
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
https://contextual.media.net/mediamain.html?&gdpr=0&cid=8CU1P
https://logincdn.msauth.net/16.000/js/MeControl_tfp5xc9B9RRsZ_q18BJrBA2.js
https://cvision.media.net/new/300x300/2/165/191/129/7bab3851-c82b-4a6b-a3f4-0f55d5eb598e.jpg?v=9
https://www.torproject.org/download/download#warningalphabetaThis
https://41a66c0b43b920b14091e66ab7bbc190.clo.footprintdns.com/apc/trans.gif?9853ed5affe7cf36fef19410
https://m.qualifytring.com/apc/trans.gif?af46a0f30939d88b3b328e65714dc57c
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meCore.min.js
https://cvision.media.net/new/300x300/3/152/90/102/3c7651d5-23ee-4b11-833e-c2006603cf5d.jpg?v=9
http://freehaven.net/anonbib/#hs-attack06
https://site-cdn.onenote.net/161252631556_Images/LiveTileImages/Small/Image1.png
https://site-cdn.onenote.net/161252631556_Images/LiveTileImages/Wide/Image1.png
https://www.torproject.org/
https://www.google.ch/logos/doodles/2020/celebrating-nkosi-johnson-6753651837108279-l.png
http://www.openssl.org/support/faq.html
http://GETHEADPOSTPUTCONNECTHTTP/1.Couldn
https://www.google.ch/images/nav_logo299.png
https://www.google.ch
https://xsts.auth.xboxlive.com
https://m.qualifytring.com/apc/trans.gif?78a32e80b9c0adf25a60b0e5f7c886ac
https://wiki.torproject.org/TheOnionRouter/TorFAQ#ServerOS
https://wiki.torproject.org/TheOnionRouter/TorFAQ#SOCKSAndDNS.%s
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_333%2Cw_311%2Cc_fill%2Cg_faces:au
http://ns.ado
http://static-global-s-msn-com.akama
http://whatismyip.org/index.php
http://crl.pki.goog/GTS1O1.crl0
http://www.msn.com/de-ch/?ocid=iehps.3.63v
https://logincdn.msauth.net/16.000/js/MeControl_tfp5xc9B9RRsZ_q18BJrBA2.jsyMjtoPTM2ODthcHBpZD1nZW1pb
https://contextual.media.net/nrrV36594.js
https://www.google.ch/favicon.ico
http://www.msn.com/?ocid=iehp
https://login.windows.net
https://www.torproject.org/documentation.html
https://wiki.torproject.org/TheOnionRouter/TorFAQ#SOCKSAndDNS.%sDANGEROUS_SOCKS
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meBoot.min.js
https://maps.windows.com/windows-app-web-link
https://s.yimg.com/lo/api/res/1.2/VDiJ3sgxtBN_DlN7ef9aNw--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
https://contextual.media.net/mediamain.html?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3D%3D&
https://8eb03f0336a2c2b69706d046a941d170.clo.footprintdns.com/apc/trans.gif?f335f01350d79361e0eb49d1
https://www.google.ch/images/searchbox/desktop_searchbox_sprites302_hr.png

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmp76d20656.bat
DOS batch file, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Okka\alkus.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Roaming\coagulants.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Temp\nsgB389.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsmE9CB.tmp
data
#
C:\Users\user\AppData\Roaming\Dhaka
data
#
C:\Users\user\AppData\Roaming\LorikeetPhonograph
data
#
C:\Users\user\AppData\Roaming\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\tor\state.tmp
ASCII text, with CRLF line terminators
#
C:\debug.txt
ASCII text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#