top title background image
flash

7GeMKuMgYyUY.vbs

Status: finished
Submission Time: 2020-10-08 14:38:51 +02:00
Malicious
Trojan
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    295111
  • API (Web) ID:
    485374
  • Analysis Started:
    2020-10-08 14:40:15 +02:00
  • Analysis Finished:
    2020-10-08 14:48:06 +02:00
  • MD5:
    6ad88eeb7eecbefcb11d3ef9a61982b9
  • SHA1:
    e639820b16896e5ca772e58247917f487707145e
  • SHA256:
    09812aabad034564664405aa8a379e26a813db3193bf5be5d2dbce86633d8a80
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 96
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 14/29
malicious

IPs

IP Country Detection
8.208.101.13
Singapore

Domains

Name IP Detection
api10.laptok.at
8.208.101.13

URLs

Name Detection
http://api10.laptok.at/favicon.ico
http://api10.laptok.at/api1/rN10qf5EQHVjOL/dwnfAf2Q9h3xuIkxsZ1bw/ICa4xrpaMuJvArti/EvZwsbjPpa0HqAh/7X
http://api10.laptok.at/api1/rN10qf5EQHVjOL/dwnfAf2Q9h3xuIkxsZ1bw/ICa4xrpaMuJvArti/EvZwsbjPpa0HqAh/7XzZY4Os_2F453GU9o/bPctMlO4u/DVVbVp8yS07noUHwDtRW/x6Lq5hXBjRxf6kbQS0J/nY_2F0fEzjohXMzYgvSo30/J7FyKX7eTCTZt/gVqqDCbW/drQiodHY4KSURbkAr88WlZY/_2B4QvYADS/RIohVVyfB0wQ2co93/SrQqRZupfxwE/RAAg7U8JMyO/F6UuOk5LqL_0A_/0DPLZUT_2Fy6MkpSb_2FZ/n66hMjOYDaHzw2zS/CD_2BJMUddx/Wgr_2F3x/T

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\arcsine.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\future.pl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C016143E-0963-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C0161440-0963-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\gee00pr\imagestore.dat
data
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\adobe.url
MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\ant.s3m
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\bryophyta.ttf
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\cognitive.tbz2
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\culpable.ar
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\enormity.dxf
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\~DF0ED9911D8A957277.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFA3C1D09A07CFEFD9.TMP
data
#