=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

aOn5CfTiwS.exe

Status: finished
Submission Time: 2021-01-30 18:06:13 +01:00
Malicious
Trojan
Spyware
Evader

Comments

Tags

Details

  • Analysis ID:
    346349
  • API (Web) ID:
    594625
  • Analysis Started:
    2021-01-30 18:06:14 +01:00
  • Analysis Finished:
    2021-01-30 18:15:37 +01:00
  • MD5:
    013eba0050ebe18e39978e89a56c0fab
  • SHA1:
    85ef7c03d70e2cc7095550ce15f140e78d05f3ad
  • SHA256:
    5fa60303a0c4fd13ecd69e7c1a17788b72605473c2fb3f93eb758010326c76e5
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
80/100

malicious
31/71

malicious
10/37

malicious
22/46

IPs

IP Country Detection
198.54.117.244
United States

Domains

Name IP Detection
1a469593c1fe15dc.xyz
198.54.117.244

URLs

Name Detection
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
http://1a469593c1fe15dc.xyz/info/ddpbidden
https://www.messenger.com/login/nonce/
Click to see the 97 hidden entries
http://www.synametrics.com
https://charlesproxy.com/ssl1
http://www.apache.org/licenses/LICENSE-2.0
http://crl.pki.goog/GTSGIAG3.crl0
https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gt
http://ocsp.thawte.com0
http://1a469593c1fe15dc.xyz/info/dd
http://store.paycenter.uc.cnmail-attachment.googleusercontent.com
http://1a469593c1fe15dc.xyz/info/fbX
https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_5QoHC_ilFOmb96M0pIeJ
http://pki.goog/gsr2/GTS1O1.crt0M
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc71c68d7b8f049b6a6f3b669bd5d00c
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
http://www.msn.com/de-ch/?ocid=iehp
https://static.nc-img.com/uiraa/app.ab29bfd164428d10f
http://service.real.com/realplayer/security/02062012_player/en/
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplate
https://static.nc-img.com/uiraa/app.3c1b6a5a2612ad098ccd
http://service.real.com/realplay
https://www.messenger.comaccept-language:
https://www.messenger.com/
http://1a469593c1fe15dc.xyz/info/fb
http://www.msn.com
http://1a469593c1fe15dc.xyz/info/ddpxztN8b6xDUh
http://www.nirsoft.net
https://deff.nelreports.net/api/report?cat=msn
https://static.nc-img.com/pp/nc-ui-globalenv/museo-sans-700-webfont.b125dc012841fa8a23b98c37499ca5e8
https://www.instagram.com
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc13122162a9a46c3b4cbf05ffccde0f
http://charlesproxy.com/ssl
http://www.interoperabilitybridges.com/wmp-extension-for-chrome
http://ocsp.pki.goog/gts1o1core0
https://maps.windows.com/windows-app-web-link
http://www.msn.com/?ocid=iehp
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=68568119166
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCee0d4d5fd4424c8390d703b105f82c3
https://srtb.msn.com/auction?a=de-ch&b=a8415ac9f9644a1396bc1648a4599445&c=MSN&d=http%3A%2F%2Fwww.msn
http://crl.pki.goog/GTS1O1core.crl0
http://1a469593c1fe15dc.xyz/info/stepstatus=0&L
https://www.messenger.com
http://www.nirsoft.net/
http://ocsp.pki.goog/GTSGIAG30
https://static.nc-img.com/pp/nc-ui-globalenv/museo-sans-300-webfont.96dd56ebb50aa0150f6630360d8d69cf
https://www.messenger.com/login/nonce/wd=488x1043;
https://logincdn.msauth.net/16.000/Converged_v21033_-0mnSwu67knBd7qR7YN9GQ2.css
https://logincdn.msauth.net/16.000.28666.10/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc1937
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_white_5ac590ee72bfe06a7cecfd75b5
https://www.instagram.com/
http://schemas.xmlsoap.org/soap/encoding/
http://www.xunlei.com/GET
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
http://1a469593c1fe15dc.xyz/info/stepmsn.com%2FB
https://static.nc
https://static.nc-img.com/uiraa/app.3c1b6a5a2612ad098ccd.js
https://www.messenger.com/origin:
http://1a469593c1fe15dc.xyz/info/step
http://pki.goog/gsr2/GTS1O1.crt0
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
https://support.google.
https://contextual.media.net/
http://ocsp.pki.goog/gsr202
https://pki.goog/repository/0
https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
http://www.msn.com/
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC828bc1cde9f04b788c98b5423157734
https://static.nc-img.com/uiraa/libs/polyfills_469970f8ffedace1b5b8
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674
https://static.nc-img.com/pp/nc-ui-globalenv/museo-sans-500-webfont.5d9883d92e2eaa724e4e6beb0ef6728a
http://www.apache.org/licenses/LICENSE
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/consent/55a804
https://contextual.media.net/803288796/fcmain.js?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3
https://static.nc-img.com/pp/nc-ui-globalenv/mainLegacy.bb0357e72b1f882521990fd54c3c08d1.css
https://contextual.media.net/48/nrrV18753.js
https://www.instagram.comreferer:
http://crl.pki.goog/gsr2/gsr2.crl0?
https://static.nc-img.com/uiraa/app.ab29bfd164428d10f32bc34df1cad4ed.css
http://pki.goog/gsr2/GTSGIAG3.crt0)
http://1a469593c1fe15dc.xyz/info/fb1.6
http://www.xunlei.com/
http://pki.goog/gsr2/GTS1O1.crt0#
https://static.nc-img.com/uiraa/libs/vendors_70ac76496c2b0e5ed06c
http://1a469593c1fe15dc.xyz/info/stepxztN8b6xDUh
https://aefd.nelreports.net/api/report?cat=bingth
http://schemas.xmlsoap.org/soap/envelope/
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
https://curl.haxx.se/docs/http-cookies.html
http://www.openssl.org/support/faq.html
https://www.namecheap.com/assets/img/nc
https://www.instagram.com/accounts/login/ajax/facebook/
https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://exchangework%04d%02d%02d.xyz/accept:
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
http://1a469593c1fe15dc.xyz/info/stepbidden

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\1612058829275.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\MiniThunderPlatform.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\ThunderFW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Local\Temp\download\atl71.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\dl_peer_id.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\download_engine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\msvcp71.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\msvcr71.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\download\zlib1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ecv71A3.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x406b65bd, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\xldl.dat
7-zip archive data, version 0.3
#
C:\Users\user\AppData\Local\Temp\xldl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\1612058828915
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Roaming\1612058829072
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\1612058829275.txt
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD
data
#