top title background image
flash

V7F2H10gJw.dll

Status: finished
Submission Time: 2021-01-30 14:16:25 +01:00
Malicious

Comments

Tags

  • Mingloa

Details

  • Analysis ID:
    346323
  • API (Web) ID:
    594581
  • Analysis Started:
    2021-01-30 14:16:28 +01:00
  • Analysis Finished:
    2021-01-30 14:26:19 +01:00
  • MD5:
    0562f10f0c926a05eb28d3579fc86663
  • SHA1:
    f75ad2980002d655410e7270825d51dcc53de0cc
  • SHA256:
    8794893f687e487bfafaf085154a5b932612d9de0825a3b392931d414b2c1985
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 14/69
malicious
Score: 13/29

URLs

Name Detection
https://upload.twitter.com/i/media/upload.json
https://www.instagram.com/graphql/query/?query_hash=149bef52a3b2af88c0fec37913fe1cbc&variables=%7B%2
https://www.messenger.comhttps://www.messenger.com/login/nonce/ookie:
Click to see the 25 hidden entries
https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0
https://www.messenger.com/login/nonce/
https://www.instagram.com/accept:
https://www.messenger.com
http://www.interestvideo.com/video1.php
https://www.messenger.com/accept:
https://twitter.comReferer:
https://www.instagram.com/sec-fetch-site:
https://www.instagram.com/accounts/login/ajax/facebook/
https://www.instagram.comsec-fetch-mode:
https://twitter.com/compose/tweetsec-fetch-mode:
https://01%s08%s15%s22%sWebGL%d%02d%s.club/http://01%s08%s15%s22%sFrankLin%d%02d%s.xyz/post_info.
https://twitter.comsec-fetch-dest:
https://curl.haxx.se/docs/http-cookies.html
https://api.twitter.com/1.1/statuses/update.json
https://twitter.com/ookie:
https://twitter.com/
https://www.messenger.com/origin:
https://api.twitter.com/1.1/statuses/update.jsoninclude_profile_interstitial_type=1&include_blocking
https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0accept:
https://upload.twitter.com/i/media/upload.json%dcommand=INIT&total_bytes=&media_type=image%2Fjpeg&me
https://www.messenger.com/
https://www.instagram.com/
https://twitter.com/compose/tweetsec-fetch-dest:
https://upload.twitter.com/i/media/upload.jsoncommand=FINALIZE&media_id=

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_c9fe8838cffade97faaf2b4b1f1bdd540aa1221_b4806494_108474bb\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A2C.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Jan 30 13:17:31 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FDA.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71A0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#