top title background image
flash

Product Specification.exe

Status: finished
Submission Time: 2020-10-28 09:25:09 +01:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    306480
  • API (Web) ID:
    514723
  • Analysis Started:
    2020-10-28 09:54:51 +01:00
  • Analysis Finished:
    2020-10-28 10:05:17 +01:00
  • MD5:
    bd5db679b195513ca32cf997ab08aa37
  • SHA1:
    a7d09e98617fc50663fe8443eb65ea3eb9417407
  • SHA256:
    c0fa6a4c743b56f5f3a08e40efabe0e5d895fab2601f2368c97c936c1a1dad67
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 24/61
malicious
Score: 11/48
malicious

IPs

IP Country Detection
116.193.76.146
Viet Nam

Domains

Name IP Detection
learnenglishinchinese.com
66.235.200.146
www.bestpriceslabstorage.com
116.193.76.146
www.chaserabenn.com
0.0.0.0
Click to see the 2 hidden entries
www.cvhtv.com
0.0.0.0
www.learnenglishinchinese.com
0.0.0.0

URLs

Name Detection
http://www.bestpriceslabstorage.com/om3g/?T6AH=nq7+BbzvYNi9epn4qi/kpHKj+Z1XqZHqE3FkWol9Cs/WqJalbqpVKi21EOrybJYGeh02&wP9=lf5P

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Product Specific_df68d5712b4a2373ff4ac0a0995ecf2828e24bc_9d87a2ba_1a75138c\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D4.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 28 16:55:53 2020, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC88.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD54.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#