flash

0k4Vu1eOEIhU.vbs

Status: finished
Submission Time: 20.11.2020 13:32:26
Malicious
E-Banking Trojan
Trojan
Spyware
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    321161
  • API (Web) ID:
    544126
  • Analysis Started:
    20.11.2020 13:32:27
  • Analysis Finished:
    20.11.2020 13:41:20
  • MD5:
    a3ba204668130312404ae877445921c1
  • SHA1:
    65f172cb351f3bf1b51b24ecf837dd1dab1731e0
  • SHA256:
    c16c0ad19dc1f015c92f3232a1eaa069b71f99695331a12a67a650c4c7bdbf75
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
10/82

malicious
22/48

malicious

IPs

IP Country Detection
47.241.19.44
United States

Domains

Name IP Detection
c56.lepini.at
47.241.19.44
resolver1.opendns.com
208.67.222.222
api3.lepini.at
47.241.19.44
Click to see the 1 hidden entries
api10.laptok.at
47.241.19.44

URLs

Name Detection
http://https://file://USER.ID%lu.exe/upd
http://search.chol.com/favicon.ico
http://www.mercadolivre.com.br/
Click to see the 97 hidden entries
http://www.merlin.com.pl/favicon.ico
http://search.ebay.de/
http://www.mtv.com/
http://www.rambler.ru/
http://www.nifty.com/favicon.ico
http://www.dailymail.co.uk/
http://www3.fnac.com/favicon.ico
http://buscar.ya.com/
http://search.yahoo.com/favicon.ico
http://constitution.org/usdeclar.txtC:
http://www.sogou.com/favicon.ico
http://www.fontbureau.com/designers
http://asp.usatoday.com/
http://fr.search.yahoo.com/
http://rover.ebay.com
http://in.search.yahoo.com/
http://img.shopzilla.com/shopzilla/shopzilla.ico
http://search.ebay.in/
http://image.excite.co.jp/jp/favicon/lep.ico
https://nuget.org/nuget.exe
http://www.galapagosdesign.com/DPlease
http://%s.com
http://msk.afisha.ru/
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://busca.igbusca.com.br//app/static/images/favicon.ico
http://search.rediff.com/
http://www.ya.com/favicon.ico
http://www.etmall.com.tw/favicon.ico
http://it.search.dada.net/favicon.ico
http://pesterbdd.com/images/Pester.png
http://search.naver.com/
http://www.google.ru/
http://search.hanafos.com/favicon.ico
http://www.apache.org/licenses/LICENSE-2.0.html
http://cgi.search.biglobe.ne.jp/favicon.ico
http://www.abril.com.br/favicon.ico
http://search.daum.net/
https://contoso.com/Icon
http://api10.laptok.at/api1/LuBBcY4TML0KBMn/k0LnS7vOrdoo1zsr2O/8QpBkUYNS/Iitw2RlTYx6j2YDr40ho/NiKHYMDKQoBSybL2dbE/e1Tv5976X6JrtcS8e3Cau8/bHBSmERO1b1VH/Kudx_2BF/_2BL9No9vXNqb4KNHmzJd0q/QVVHYO2yKd/Gg_2Bg1xfwH_2BFEB/HY67cbpQ4ByT/WtQUYEw8lT6/2gLjoybqDfhtZw/nLvu2CTf1DWVATvmcGkIs/bnTukFEBv2W5KdSS/EOrXUbzFFEnl_0A/_0Dx52MnKqhyBqUTRM/yhl0u8uL2/TPtLJtxfkRCssV3/F2uVhvn9
http://search.naver.com/favicon.ico
http://search.msn.co.jp/results.aspx?q=
http://www.clarin.com/favicon.ico
http://buscar.ozu.es/
http://kr.search.yahoo.com/
http://search.about.com/
http://busca.igbusca.com.br/
http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
http://www.ask.com/
http://www.priceminister.com/favicon.ico
https://github.com/Pester/Pester
http://www.cjmall.com/
http://search.centrum.cz/
http://www.carterandcone.coml
http://suche.t-online.de/
http://www.google.it/
http://search.auction.co.kr/
http://www.ceneo.pl/
http://www.amazon.de/
http://sads.myspace.com/
http://busca.buscape.com.br/favicon.ico
http://www.pchome.com.tw/favicon.ico
http://browse.guardian.co.uk/favicon.ico
http://google.pchome.com.tw/
http://list.taobao.com/browse/search_visual.htm?n=15&q=
http://www.rambler.ru/favicon.ico
http://uk.search.yahoo.com/
http://espanol.search.yahoo.com/
http://www.ozu.es/favicon.ico
http://search.sify.com/
http://openimage.interpark.com/interpark.ico
http://search.yahoo.co.jp/favicon.ico
http://search.ebay.com/
http://www.gmarket.co.kr/
http://www.founder.com.cn/cn/bThe
http://search.nifty.com/
http://searchresults.news.com.au/
http://www.google.si/
http://www.google.cz/
http://www.soso.com/
http://www.univision.com/
http://search.ebay.it/
http://images.joins.com/ui_c/fvc_joins.ico
http://www.asharqalawsat.com/
http://busca.orange.es/
http://cnweb.search.live.com/results.aspx?q=
http://api10.laptok.at/api1/LuBBcY4TML0KBMn/k0LnS7vOrdoo1zsr2O/8QpBkUYNS/Iitw2RlTYx6j2YDr40ho/NiKHYM
http://auto.search.msn.com/response.asp?MT=
http://search.yahoo.co.jp
http://www.target.com/
http://buscador.terra.es/
http://www.typography.netD
http://fontfabrik.com
http://search.orange.co.uk/favicon.ico
http://www.iask.com/
http://www.tesco.com/
http://cgi.search.biglobe.ne.jp/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\1b1iaete\1b1iaete.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\Ammerman.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\earmark.avchd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 33 hidden entries
C:\Users\user\AppData\Local\Temp\gf33rpcq\gf33rpcq.0.cs
UTF-8 Unicode (with BOM) text
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0F633127-2B78-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{0F633129-2B78-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{0F63312B-2B78-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{15B14822-2B78-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\ghuK[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\F2uVhvn9[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\x[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\1b1iaete\1b1iaete.0.cs
UTF-8 Unicode (with BOM) text
#
C:\Users\user\AppData\Local\Temp\1b1iaete\1b1iaete.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\1b1iaete\1b1iaete.out
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\1b1iaete\CSC8D8F05B01A304F97BCE9A6F7324A364.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\FCC.cxx
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\RES3556.tmp
data
#
C:\Users\user\AppData\Local\Temp\RES45E1.tmp
data
#
C:\Users\user\AppData\Local\Temp\Tolstoy.3gp
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lh5pn2oo.e51.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xeee2m1p.fyr.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\adobe.url
MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\bowerbird.m3u
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\gf33rpcq\CSC37B7B5B8D8A1469384B4E042B687670.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\gf33rpcq\gf33rpcq.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\gf33rpcq\gf33rpcq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\gf33rpcq\gf33rpcq.out
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\~DF59ED155C1D1CCF51.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB0CD04804313B9D1.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFCC0C7DB5ED67DF9E.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD893D4E6D1758C04.TMP
data
#
C:\Users\user\AppData\Roaming\Microsoft\{FC666F93-2B96-8EB5-95F0-8FA2992433F6}
ASCII text, with CRLF line terminators
#
C:\Users\user\Documents\20201120\PowerShell_transcript.284992.umVzyGW1.20201120133403.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#