top title background image
flash

Orders.exe

Status: finished
Submission Time: 2021-02-01 09:07:51 +01:00
Malicious
Trojan
Adware
Spyware
Evader
HawkEye AgentTesla MailPassView Matiex

Comments

Tags

  • exe
  • Yahoo

Details

  • Analysis ID:
    346555
  • API (Web) ID:
    595043
  • Analysis Started:
    2021-02-01 09:07:53 +01:00
  • Analysis Finished:
    2021-02-01 09:28:15 +01:00
  • MD5:
    e85daf3a43f107b213310a53bfd35aa9
  • SHA1:
    042208c7a232b806c6382e34417f9c8e2a955747
  • SHA256:
    0b1fbc81d9d9e685307e80d20afe4b01c6538b903b77136b0d1db2486fe8c6e8
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 17/37
malicious
Score: 44/46
malicious

IPs

IP Country Detection
131.186.161.70
United States
104.16.155.36
United States
199.193.7.228
United States
Click to see the 2 hidden entries
216.146.43.71
United States
172.67.188.154
United States

Domains

Name IP Detection
178.229.4.0.in-addr.arpa
0.0.0.0
checkip.dyndns.org
0.0.0.0
whatismyipaddress.com
104.16.155.36
Click to see the 3 hidden entries
freegeoip.app
172.67.188.154
smtp.privateemail.com
199.193.7.228
checkip.dyndns.com
216.146.43.71

URLs

Name Detection
http://pesterbdd.com/images/Pester.png8
http://www.fonts.com
https://login.yahoo.com/config/login
Click to see the 97 hidden entries
https://api.ipify.org%GETMozilla/5.0
http://www.founder.com.cn/cna
https://contoso.com/
http://www.tiro.comxIC
http://www.jiyu-kobo.co.jp/-ca
http://www.carterandcone.comE
http://fontfabrik.com
http://www.galapagosdesign.com/staff/dennis.htm
http://www.typography.netD
http://www.founder.com.cn/cnE
http://www.sandoll.co.kr
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
http://www.carterandcone.com
http://www.goodfont.co.kr
http://www.tiro.com
http://en.wikipnrC
https://contoso.com/License
http://www.jiyu-kobo.co.jp/jp/H
http://www.fontbureau.com/designers?
http://ocsp.sectigo.com0
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?
http://whatismyipaddress.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
http://www.fontbureau.com/designers8
http://yQFlsb.com
http://www.zhongyicts.com.cno.
http://www.jiyu-kobo.co.jp/
http://crl.usertrust.
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.apache.org/licenses/LICENSE-2.0.html8
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
http://www.carterandcone.comicrtg
http://www.jiyu-kobo.co.jp/jp/
http://www.fontbureau.com/designersG
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
http://www.carterandcone.comTex
http://www.fontbureau.comH
https://sectigo.com/CPS0
http://DynDns.comDynDNS
http://www.fontbureau.com
http://www.apache.org/licenses/LICENSE-2.0
http://nuget.org/NuGet.exe
https://github.com/Pester/Pester8
http://www.sakkal.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
http://whatismyipaddress.com/
http://www.urwpp.deDPlease
http://www.site.com/logs.php
http://www.galapagosdesign.com/DPlease
http://whatismyipaddress.com/-
http://www.tiro.comBs
https://nuget.org/nuget.exe
http://www.jiyu-kobo.co.jp/-
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
http://www.jiyu-kobo.co.jp/r-t
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
http://checkip.dyndns.org/
http://www.nirsoft.net/
http://www.founder.com.cn/cn/cThe
http://csARxe.com
http://www.sajatypeworks.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
http://ns.adobe.c/g
http://www.fontbureau.com/designers
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
http://www.carterandcone.comva
http://tempuri.org/DataSet1.xsd
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
http://127.0.0.1:HTTP/1.1
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://www.carterandcone.comri
http://www.jiyu-kobo.co.jp/e
http://www.jiyu-kobo.co.jp/jp/-
http://www.fontbureau.com/designers/frere-jones.html
http://www.fontbureau.comituF
http://www.founder.com.cn/cn/
http://www.carterandcone.coml
https://github.com/Pester/Pester
http://www.jiyu-kobo.co.jp/H
https://contoso.com/Icon
http://www.fontbureau.comaU
http://www.apache.org/licenses/LICENSE-2.0.html
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
http://ns.adobe.cobj
http://pesterbdd.com/images/Pester.png
http://www.carterandcone.come
http://www.jiyu-kobo.co.jp/U
http://www.carterandcone.coma
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.carterandcone.como.
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.zhongyicts.com.cn

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Orders.exe_c173c4d7306a40d1422278d49383db0ef5e6f35_c446bb0c_083415f8\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\hawkgoods.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Matiexgoods.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 34 hidden entries
C:\Users\user\AppData\Local\Temp\hawkgoods.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\origigoods20.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\origigoods40.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_hawkgoods.exe_93f07d9c4f92cda17563b29cabdf995c588ef9_00000000_1717da56\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_hawkgoods.exe_697020edb13ed8bc761f5d6b0de413dddfcbfb_b4666e22_09649e14\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
#
C:\Users\user\Documents\20210201\PowerShell_transcript.320946.GXJdt0T3.20210201090850.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210201\PowerShell_transcript.320946.zsUBLVk9.20210201090956.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_I$s#$lT3ssl.exe_475c1b6650cb1237ccbea93f193b5c1a2bf60cf_f556f9f0_08026e6f\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oht352yv.150.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m1dlmoaq.ohr.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1uftfplo.nuv.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03w4pbbs.uza.ps1
very short file (no magic)
#
C:\Users\user\Documents\Matiex Keylogger\Screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF62B.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Feb 1 17:09:22 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD19.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBEF.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBC2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6DF.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB12E.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Feb 1 17:10:25 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA992.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Feb 1 17:09:06 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F0.tmp.mdmp
Mini DuMP crash report, 14 streams, Mon Feb 1 17:09:33 2021, 0x60521 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER47E7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3846.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AF.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15F5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_vbc.exe_fcdf79ff79f329d98f696167290ab3ea8a293_6c16ead4_18d4c207\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#