top title background image
flash

Overdue_invoices.exe

Status: finished
Submission Time: 2021-01-27 15:14:11 +01:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    344973
  • API (Web) ID:
    591866
  • Analysis Started:
    2021-01-27 15:14:11 +01:00
  • Analysis Finished:
    2021-01-27 15:23:30 +01:00
  • MD5:
    afa35ee8f27c8a6661219bccb198fd9b
  • SHA1:
    8b86a3066a24586bd5d17ce45ce8bd7984079af0
  • SHA256:
    2d2c26b0f3308bda9e00913401761b8b5026edccfbe12bce7a72cd2d324c2f45
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 8/46

IPs

IP Country Detection
193.239.147.103
Brunei Darussalam
147.75.47.199
Switzerland
151.101.0.133
United States
Click to see the 1 hidden entries
108.177.119.109
United States

Domains

Name IP Detection
raw.githubusercontent.com
0.0.0.0
github.map.fastly.net
151.101.0.133
smtp.gmail.com
108.177.119.109
Click to see the 1 hidden entries
icanhazip.com
147.75.47.199

URLs

Name Detection
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
http://www.msn.com/de-ch/?ocid=iehp
https://ac.ecosia.org/autocomplete?q=
Click to see the 34 hidden entries
https://raw.githubusercontent.com
http://ocsp.pki.goog/gts1o1core0
https://wa.239.147.103/base/D87080E8818FCC40A45F948026A84297.html
http://www.msn.com/de-ch/
http://193.239.147.103/base/D87080E8818FCC40A45F948026A84297.html
http://www.msn.com/?ocid=iehp
http://crl.pki.goog/GTS1O1core.crl0
http://www.msn.com/
http://icanhazip.com
http://193.239.147.103
http://crl.pki.goog/gsr2/gsr2.crl0?
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://smtp.gmail.com
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
https://i.imgur.com/9sS1RPE.png
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://pki.goog/gsr2/GTS1O1.crt0
http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
https://duckduckgo.com/ac/?q=
http://icanhazip.com4
http://bit.ly/icanhazip-faq
https://cdn.ecosia
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
https://raw.githubusercontenPf~
https://raw.githubusercontent.com/pandalog/nothing/master/john.txt)CqbkTHriRRbQjaArtJfFMC#
https://duckduckgo.com/chrome_newtab
https://raw.githubusercontenP
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
https://duckduckgo.com/chrom
http://icanhazip.com/
http://ns.adobe.c/g
http://ocsp.pki.goog/gsr202
https://pki.goog/repository/0
https://raw.githubusercontent.com/pandalog/nothing/master/john.txt

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Overdue_invoices.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\TMP_4728
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\TMP_Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Temp\TMP_pass
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\browserCreditCards
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\tmp99EA0x.tmp
UTF-8 Unicode text, with CRLF, LF line terminators
#