top title background image
flash

QuotationTXCtyres.exe

Status: finished
Submission Time: 2021-02-02 20:13:17 +01:00
Malicious
Trojan
Adware
Spyware
Evader
HawkEye MailPassView

Comments

Tags

  • exe
  • HawkEye

Details

  • Analysis ID:
    347605
  • API (Web) ID:
    597138
  • Analysis Started:
    2021-02-02 20:15:00 +01:00
  • Analysis Finished:
    2021-02-02 20:33:27 +01:00
  • MD5:
    683bd9bd416a67e5b14c59668ead6de8
  • SHA1:
    476275961878e53692cdbf7a887d6f6f61c27eee
  • SHA256:
    6f8bb9d51ef192747d5393e13349bb03f272f5a947de849835709502ef09ef68
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 10/29

IPs

IP Country Detection
104.23.98.190
United States

Domains

Name IP Detection
63.155.11.0.in-addr.arpa
0.0.0.0
mail.privateemail.com
198.54.122.60
pastebin.com
104.23.98.190

URLs

Name Detection
http://www.jiyu-kobo.co.jp/sl-s
http://www.nirsoft.net/
http://www.zhongyicts.com.cn
Click to see the 60 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.sakkal.com
http://www.fontbureau.comai
http://www.founder.com.cn/cnh
http://www.jiyu-kobo.co.jp/Z
http://nuget.org/NuGet.exe
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.jiyu-kobo.co.jp/U
http://pesterbdd.com/images/Pester.png
http://schemas.xmlsoap.org/soap/encoding/
http://www.apache.org/licenses/LICENSE-2.0.html
https://go.micro
http://www.jiyu-kobo.co.jp/jp/U
https://contoso.com/Icon
http://www.jiyu-kobo.co.jp/G
http://www.jiyu-kobo.co.jp/jp/
http://www.fontbureau.com/designers/frere-jones.htmlXE
https://github.com/Pester/Pester
http://www.carterandcone.coml
http://pesterbdd.com/images/Pester.png02
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.fontbureau.com/designers&
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://www.jiyu-kobo.co.jp/Y0/
http://schemas.xmlsoap.org/wsdl/
http://www.jiyu-kobo.co.jp/
http://www.fontbureau.com/designers8
http://www.sajatypeworks.com
http://www.fontbureau.com/designersF
http://www.apache.org/licenses/LICENSE-2.0.html02
http://www.founder.com.cn/cnK
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.microsoft.co
https://contoso.com/License
http://www.tiro.com
https://github.com/Pester/Pester02
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
http://www.fontbureau.com/designersP
http://www.fontbureau.comiona
http://www.jiyu-kobo.co.jp/~
http://www.fontbureau.com/designersG
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.jiyu-kobo.co.jp/1
http://www.fontbureau.com/designers/tio
https://contoso.com/
https://nuget.org/nuget.exe
http://www.galapagosdesign.com/DPlease
http://www.ascendercorp.com/typedesigners.html
http://www.fonts.com
http://www.sandoll.co.kr
http://www.microsoft.c
http://www.urwpp.deDPlease

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuotationTXCtyres.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuotationTXCtyres.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sj15usfh.5ry.psm1
very short file (no magic)
#
Click to see the 18 hidden entries
C:\Users\user\Documents\20210202\PowerShell_transcript.760639.n8KH4wHy.20210202201612.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210202\PowerShell_transcript.760639.aeTluj22.20210202201613.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210202\PowerShell_transcript.760639.Vs0JZx_v.20210202201614.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210202\PowerShell_transcript.760639.+YxYN0EN.20210202201613.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xp0dmdgo.4km.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_trtlbzzv.ezr.psm1
very short file (no magic)
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QuotationTXCtyre_5b15cfdc4f612f9064aeb4aec970f0159d8e17c1_808a50c5_1abcf7fa\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pgcjwta5.qa2.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_md0ng4yz.md3.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrpgrtce.j2h.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1uk2hlpg.2lo.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_11cayev4.bax.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC086.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB049.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER230B.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Feb 3 04:17:09 2021, 0x1205a4 type
#