top title background image
flash

WFCDopUaDQ.exe

Status: finished
Submission Time: 2020-11-15 08:03:18 +01:00
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

Details

  • Analysis ID:
    316987
  • API (Web) ID:
    535775
  • Analysis Started:
    2020-11-15 08:10:03 +01:00
  • Analysis Finished:
    2020-11-15 08:23:14 +01:00
  • MD5:
    a79e92cc145ea8407a4ed30fee0a912b
  • SHA1:
    7a8ea767226ef0da7ed927f9e1a8b57418cdb916
  • SHA256:
    6e576c6aee1a0e3adf5e36c0ae52d1eda0ec0171fe8163bb0983f62a0e23c0da
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 46/72
malicious
Score: 19/37
malicious
Score: 34/48
malicious

URLs

Name Detection
http://pomf.cat/upload.phpCContent-Disposition:
http://pomf.cat/upload.php&https://a.pomf.cat/
http://pomf.cat/upload.php
Click to see the 18 hidden entries
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&
https://contextual.m
http://bot.whatismyipaddress.com/
https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5864849777998;gt
https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
http://www.nirsoft.net/
http://www.nirsoft.net
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
https://login.yahoo.com/config/login
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
https://contextual.media
https://contextual.media.net/checksync.php?&vsSync=1&cs=
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=58648497779
https://contextual.media.net/checksync.php?&vsSync=1bh
https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
https://login.microsoftonline.com/common/oauth2/authorize?client_id=
https://a.pomf.cat/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\chrome\microsoft.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeviceProperties.url
MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\user\AppData\Local\Temp\chrome\DeviceProperties.vbs>), ASCII text, with CR line terminators
#
C:\Users\user\AppData\Local\Temp\3d7b2230-2812-c499-6f9c-e0286170e62b
ASCII text, with no line terminators
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Temp\chrome\DeviceProperties.vbs
ASCII text, with CR line terminators
#
C:\Users\user\AppData\Local\Temp\tmp7A6D.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmp9AD.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#