top title background image
flash

2Q4tLHa5wbO1.vbs

Status: finished
Submission Time: 2020-11-23 12:17:51 +01:00
Malicious
E-Banking Trojan
Trojan
Spyware
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    321602
  • API (Web) ID:
    545019
  • Analysis Started:
    2020-11-23 12:17:52 +01:00
  • Analysis Finished:
    2020-11-23 12:27:27 +01:00
  • MD5:
    afa1319ab7c53ec14f6e2b5b403d4d08
  • SHA1:
    1081298acf917fed6ed090c3d5ed642eef9e0f34
  • SHA256:
    7eb2fa04c617f7c2adcfe5f2f6d0fef4dc20d89c30e06158ee1bcb94e5c128a2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 10/82
malicious
Score: 20/29
malicious

IPs

IP Country Detection
47.241.19.44
United States

Domains

Name IP Detection
c56.lepini.at
47.241.19.44
222.222.67.208.in-addr.arpa
0.0.0.0
myip.opendns.com
84.17.52.25
Click to see the 3 hidden entries
resolver1.opendns.com
208.67.222.222
api3.lepini.at
47.241.19.44
api10.laptok.at
47.241.19.44

URLs

Name Detection
http://c56.lepini.at//
http://https://file://USER.ID%lu.exe/upd
http://c56.lepini.at/s
Click to see the 97 hidden entries
http://c56.lepini.at:80/jvassets/xI/t64.dat
http://www.google.it/
http://list.taobao.com/browse/search_visual.htm?n=15&q=
http://google.pchome.com.tw/
http://browse.guardian.co.uk/favicon.ico
http://www.pchome.com.tw/favicon.ico
http://api3.lepini.at/api1/IFYp0PHJ_2BMM/wnyhOVyw/DTs0YCcjJ3qF45s5mMb3gCK/4RNSmr4vxJ/t3onykIcbr_2FK9Xl/H4TzJ_2FhWjS/VeLVa7O7zLV/8TE8KNMU3WmVp7/1SZwuOnHWsYhkdJWGRZAO/qo7x2rkUbXkHUJ_2/BC7f_2BJ0A1Duj6/Ipk_2FJFklx32RY4N0/bk5DAm8jE/qW10iqV6xd9Zezvdl1zm/BnhClBi9RrNKwOk_2Bm/fx09VPfvVJosXa3PmEErZX/NEcSBwStFW8Y4/j9LX0_0A/_0DyR3w9VgUnyTwYjUOpcPC/rfYZc9XYZ8/Dq1kzhh1/E7PDPOgD/b
http://busca.buscape.com.br/favicon.ico
http://www.g5e.com/G5_End_User_License_Supplemental_TermsLC.Hulu
http://sads.myspace.com/
http://www.amazon.de/
http://www.ceneo.pl/
http://search.auction.co.kr/
http://busca.igbusca.com.br/
http://www.rambler.ru/favicon.ico
http://kr.search.yahoo.com/
http://suche.t-online.de/
http://www.carterandcone.coml
http://search.centrum.cz/
http://www.cjmall.com/
https://github.com/Pester/Pester
http://search.about.com/
http://www.priceminister.com/favicon.ico
http://www.ask.com/
http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
http://searchresults.news.com.au/
http://auto.search.msn.com/response.asp?MT=
http://cnweb.search.live.com/results.aspx?q=
http://busca.orange.es/
http://www.asharqalawsat.com/
http://images.joins.com/ui_c/fvc_joins.ico
http://ns.adobe.cmg
http://search.ebay.it/
http://www.univision.com/
http://www.soso.com/
http://www.google.cz/
http://www.google.si/
http://ns.micro/1
http://search.nifty.com/
http://www.founder.com.cn/cn/bThe
http://www.gmarket.co.kr/
http://search.ebay.com/
http://search.yahoo.co.jp/favicon.ico
http://openimage.interpark.com/interpark.ico
http://search.sify.com/
http://www.ozu.es/favicon.ico
http://espanol.search.yahoo.com/
http://uk.search.yahoo.com/
http://buscar.ozu.es/
http://universalstore.streaming.mediaservices.windows.net/411ee20d-d1b8-4d57-ae3f-af22235d79d9/1f8e1
https://nuget.org/nuget.exe
http://image.excite.co.jp/jp/favicon/lep.ico
http://search.ebay.in/
http://img.shopzilla.com/shopzilla/shopzilla.ico
http://in.search.yahoo.com/
http://rover.ebay.com
http://fr.search.yahoo.com/
http://asp.usatoday.com/
http://www.fontbureau.com/designers
http://www.sogou.com/favicon.ico
http://constitution.org/usdeclar.txtC:
http://api10.laptok.at/api1/OdjgwCqVJwPbZSsZ/VYrVT8VCOKL6QD5/EVmo1TumZD8KFbU_2F/DqCRYFqUt/6t1Wi5sZ6Sd10ZyeuxsI/zz_2BvVs4Qba4SjUA81/XTlzG2Ikb6e4IhPsrP2pW5/IOYwufo82QfRm/dMck8gxG/UZU1HPUj7EpbLym6Tf1ZXia/MduJyH_2BJ/WUEq3SnF_2FcXcMTp/Xq474GevRlOt/vDC5iQyZB9v/TjWELQbwGzWKMO/lagHfBD7ms5J_2BDQZ3w8/PtBT4jSv2lZUfu_0/A_0DP97GvnPGpv0/X1fJAQJ3FbyqO_2B4n/YGBi_2Ftdmzlg/gz3C3rVo/j
https://corp.roblox.com/contact/
http://search.yahoo.com/favicon.ico
http://buscar.ya.com/
http://www3.fnac.com/favicon.ico
http://www.dailymail.co.uk/
http://www.nifty.com/favicon.ico
http://www.rambler.ru/
http://www.mtv.com/
http://search.ebay.de/
http://www.merlin.com.pl/favicon.ico
http://www.mercadolivre.com.br/
http://search.naver.com/
http://www.clarin.com/favicon.ico
http://search.msn.co.jp/results.aspx?q=
http://search.naver.com/favicon.ico
https://contoso.com/Icon
http://search.daum.net/
http://www.abril.com.br/favicon.ico
https://www.roblox.com/develop
http://cgi.search.biglobe.ne.jp/favicon.ico
http://www.apache.org/licenses/LICENSE-2.0.html
http://search.hanafos.com/favicon.ico
http://www.google.ru/
http://search.chol.com/favicon.ico
http://pesterbdd.com/images/Pester.png
http://it.search.dada.net/favicon.ico
http://www.etmall.com.tw/favicon.ico
http://www.ya.com/favicon.ico
http://search.rediff.com/
http://busca.igbusca.com.br//app/static/images/favicon.ico
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.zhongyicts.com.cn
http://msk.afisha.ru/
http://%s.com
http://www.galapagosdesign.com/DPlease

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\marginal.roq
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Bonaparte.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\ztp4fhzn\ztp4fhzn.0.cs
UTF-8 Unicode (with BOM) text
#
Click to see the 35 hidden entries
C:\Users\user\AppData\Local\Temp\5b2bnkld\5b2bnkld.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ztp4fhzn\ztp4fhzn.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v3uhcgdk.pa4.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\adobe.url
MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\hemp.mp4
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\reactionary.thm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ztp4fhzn\CSC901590E0DE33494E82C695FA40AE49BE.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\RES269.tmp
data
#
C:\Users\user\AppData\Local\Temp\ztp4fhzn\ztp4fhzn.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ztp4fhzn\ztp4fhzn.out
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\~DF135B9A8EB736BB66.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF6A31E5743615C572.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFCF3528861E95EDFF.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD243D1994B0C4AD0.TMP
data
#
C:\Users\user\AppData\Roaming\Microsoft\{FC666F93-2B96-8EB5-95F0-8FA2992433F6}
ASCII text, with CRLF line terminators
#
C:\Users\user\Documents\20201123\PowerShell_transcript.405464.YiUpPuBI.20201123121927.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\404E.bi1
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B24C39E3-2D7D-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B24C39E5-2D7D-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B9675AD6-2D7D-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\j[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\Gfdfp[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\k[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqjlg1ip.3rs.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\5b2bnkld\5b2bnkld.0.cs
UTF-8 Unicode (with BOM) text
#
C:\Users\user\AppData\Local\Temp\5b2bnkld\5b2bnkld.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\5b2bnkld\5b2bnkld.out
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\5b2bnkld\CSC18B8FCEB9D646308CD119582578A238.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\Hettie.jpeg
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\RES16AC.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B24C39E1-2D7D-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#