top title background image
flash

unnamed 1_1.0.0.0.exe

Status: finished
Submission Time: 2020-07-19 21:50:58 +02:00
Malicious
Evader

Comments

Tags

  • unnamed1

Details

  • Analysis ID:
    247665
  • API (Web) ID:
    390660
  • Analysis Started:
    2020-07-20 12:17:36 +02:00
  • Analysis Finished:
    2020-07-20 12:26:07 +02:00
  • MD5:
    5e6a19522ec875d8920fb28757e463e9
  • SHA1:
    72cb35a09f25aba6a9aca0989058ca0ae7f4b8dd
  • SHA256:
    9606b7c2a76c2f70134ffba266ff8d1f62df336ed149fe28bb85bf230fa22314
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 54/69
malicious
Score: 25/31
malicious

IPs

IP Country Detection
1.0.0.0
Australia
8.8.8.8
United States
131.186.113.70
United States
Click to see the 3 hidden entries
45.33.15.60
United States
198.58.102.14
United States
72.14.187.9
United States

URLs

Name Detection
https://72.14.187.9/
https://45.33.15.60/
https://72.14.187.9//8
Click to see the 3 hidden entries
https://198.58.102.14/enh.dllP
https://72.14.187.9/)
https://198.58.102.14/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\mjednk\tuurf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\mjednk\tuurf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W2BICE6W\SM6HBJ5C.htm
HTML document, ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\mjednk\myunxor.dat
data
#
C:\Users\user\AppData\Roaming\mjednk\zbjca.dat
data
#