top title background image
flash

http://agriex.ca/fsly/1B0ji2nm8Ox6PhheKLd4nNGaNdBNzQIHoC2Kj3x91586HH5/

Status: finished
Submission Time: 2020-10-29 23:55:22 +01:00
Malicious
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    307378
  • API (Web) ID:
    516533
  • Analysis Started:
    2020-10-29 23:55:22 +01:00
  • Analysis Finished:
    2020-10-30 00:03:30 +01:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 96
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 10/80

IPs

IP Country Detection
54.39.146.145
Canada
102.182.145.130
South Africa
205.144.171.81
United States

Domains

Name IP Detection
foryoulady.com
54.39.146.145
agriex.ca
205.144.171.81

URLs

Name Detection
0
http://102.182.145.130/eaVb1dU44D2jX9Aide/
http://agriex.ca/fsly/1B0ji2nm8Ox6PhheKLd4nNGaNdBNzQIHoC2Kj3x91586HH5/

Dropped files

Name File Type Hashes Detection
C:\Users\user\Zxkb3l5\Oglo7x0\Fkyk1qn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\Documents\20201029\PowerShell_transcript.211837.z3Db8gov.20201029235625.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Local\Temp\~DF0C673278DF58A953.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF0A26D3C6351B2640.TMP
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rabdvxgs.15t.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bw5nox5j.hez.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EBECCC13-1A39-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\~$s_19101332332091174033.doc
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Mes_19101332332091174033.doc:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Mes_19101332332091174033.doc.1to3lsu.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Mes_19101332332091174033.doc.1to3lsu.partial
CDFV2 Microsoft Word
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Mes_19101332332091174033[1].doc
CDFV2 Microsoft Word
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{96C4FA2D-FBDC-4BD5-945D-FADE908CB681}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{289521F7-5B9F-4A3D-A960-2B977E394425}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\D8F0C7EA-3C81-4DFE-B430-BBA2A181AD64
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EBECCC15-1A39-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#