top title background image
flash

YvGLRQ2lBoNg.vbs

Status: finished
Submission Time: 2020-09-12 23:00:27 +02:00
Malicious
Trojan
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    284796
  • API (Web) ID:
    464773
  • Analysis Started:
    2020-09-12 23:00:28 +02:00
  • Analysis Finished:
    2020-09-12 23:05:57 +02:00
  • MD5:
    0671e735481a55031081895bf0f57760
  • SHA1:
    11788132e8b10e6370530d68d2d562737ef1dae0
  • SHA256:
    f9ad25e0810fc3f545213be438f531677595044c6a64d6b367e93b9aad9910e6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 12/57
malicious
Score: 10/48
malicious

IPs

IP Country Detection
84.38.181.55
Russian Federation

Domains

Name IP Detection
api10.laptok.at
84.38.181.55

URLs

Name Detection
http://api10.laptok.at/api1/d_2FkQMQPNS1PtreuLmDr0c/isKQ3en2ep/WdaePBnxWvNr4O7Zx/fe5GpcKXEs0Z/nWv1haJIdxX/KPQImnsWZc6Bts/3T1sv6KdCgBkk8kTcY4Tw/vLBIAR6SvcfKkftr/v3qWzzjdQvHhSwJ/vN5Dy_2FrTM09tl_2F/E9H6fSft8/LNlFBPxAbjE4J0c6TJOC/anV9v94dZW1QTs_2Fbn/bfOfyFPP6TfVwktOgPJiQQ/RMTYA97pNPcLL/nGwKPMp2/dEpg95nX_2B2Qt_0A_0DKLH/tTw8xa4uQv/h6OXh5Fmz3Z3zI7T2/MnlbUyKlzKYN/4KNu2_2B_2B/GIckXkWWxkB/utBojx5s
http://api10.laptok.at/api1/1D7z5XkAX/_2FbQrtYcD1kFDfXonyT/Jj2mYzkdYtc4R7X6fxc/9urYr1WZcWa6ZWnQBAZ43f/xval831E1IBwG/n6pzC3ar/eKGANQIthekvo9zg_2Fb94x/iPFw6um9yA/exbRhIIlmYTmBTpxl/jJEsgsP3dBx9/zs5yDfHduFs/ySeUPKocHhrMVB/Q8EDMO_2B3zJSk5QBFGvT/Yy3iBRuEUbqp4Kxn/CqGIdwKcFdmihQj/fosd0P6SSgwFfVNavf/RyCG8rcLK/w_0A_0D7W0vvsSLrshwz/e9K8aNiOBT0pOorA5hH/f7RmqSwXFZJni1LXH4cpYp/tjerjQMglan/92z
http://api10.laptok.at/favicon.ico
Click to see the 7 hidden entries
http://www.wikipedia.com/
http://www.amazon.com/
http://www.nytimes.com/
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
http://www.youtube.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\locate.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\ogress.psd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\adobe.url
MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\handgun.s3m
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\recumbent.woff2
ASCII text, with no line terminators
#