top title background image
flash

Covid 19 bilgi yönetim sistemi.msi

Status: finished
Submission Time: 2021-02-19 12:30:09 +01:00
Malicious
Spyware
Evader
ScreenConnect Tool

Comments

Tags

Details

  • Analysis ID:
    355327
  • API (Web) ID:
    612629
  • Analysis Started:
    2021-02-19 12:30:10 +01:00
  • Analysis Finished:
    2021-02-19 12:42:28 +01:00
  • MD5:
    1f365aa75ff0d2806a2269d238208593
  • SHA1:
    440ef2dfdd778ec159cd6babc60e2b70252d661f
  • SHA256:
    3dbe3682f5d3db8cd0d8c0586d3c345a458f274355a4dac2edd05f25092423a8
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
51.77.118.172
France

Domains

Name IP Detection
server-ovh31150295-relay.screenconnect.com
51.77.118.172
instance-s6p2r4-relay.screenconnect.com
0.0.0.0

URLs

Name Detection
http://en.wikipedia
http://www.carterandcone.coml
https://dev.virtualearth.net/mapcontrol/logging.ashx
Click to see the 91 hidden entries
http://www.jiyu-kobo.co.jp/FSV
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://%s.xboxlive.com
http://www.carterandcone.comi
http://www.carterandcone.comj
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
http://www.jiyu-kobo.co.jp/F
http://www.fontbureau.comj
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
https://dev.virtualearth.net/REST/v1/Routes/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
http://www.jiyu-kobo.co.jp/.TTC
http://www.fontbureau.com
http://www.apache.org/licenses/LICENSE-2.0
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
http://www.sajatypeworks.comrBV
https://%s.dnet.xboxlive.com.
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://%s.dnet.xboxlive.com
http://www.founder.com.cn/cn/YV
https://dev.ditu.live.com/REST/v1/Locations
http://www.fontbureau.com/designers/
http://www.carterandcone.comcomj
https://activity.windows.com
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
http://www.jiyu-kobo.co.jp/j
http://www.fontbureau.com/designers8
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
http://www.bingmapsportal.com
https://feedback.screenconnect.com/Feedback.axd
http://www.jiyu-kobo.co.jp/
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://dynamic.t
http://www.fontbureau.com/designers/frere-jones.html
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.founder.com.cn/cn
http://wixtoolset.org/releases/
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.carterandcone.como.zV
http://www.sajatypeworks.com
https://dev.ditu.live.com/mapcontrol/logging.ashx
http://www.jiyu-kobo.co.jp/HLj
http://www.carterandcone.com
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
http://www.goodfont.co.kr
http://wixtoolset.org/news/
http://www.fontbureau.com/designers
http://www.tiro.com
https://dev.virtualearth.net/REST/v1/Routes/Walking
http://www.jiyu-kobo.co.jp/.TTCSV
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://t0.tiles.ditu.live.com/tiles/gen
http://www.fontbureau.comFzV
http://www.fontbureau.com/designers?
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.virtualearth.net/REST/v1/Routes/Driving
http://www.jiyu-kobo.co.jp/jp/F
https://dev.ditu.live.com/REST/v1/Routes/
http://www.jiyu-kobo.co.jp/XTj
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?
http://www.fontbureau.com/designersG
http://www.jiyu-kobo.co.jp/jp/j
http://www.sakkal.com
http://www.fontbureau.comFcnV
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.jiyu-kobo.co.jp/FTV
http://www.carterandcone.comFBV
http://www.zhongyicts.com.cn
http://www.urwpp.deDPlease
https://appexmapsappupdate.blob.core.windows.net
http://www.sandoll.co.kr
http://www.fonts.com
http://www.galapagosdesign.com/DPlease
http://www.carterandcone.como.nV
http://www.fontbureau.com/designerse
http://www.jiyu-kobo.co.jp/Y0/XTj
http://www.zhongyicts.com.cnwdthK
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
http://fontfabrik.com
http://www.galapagosdesign.com/staff/dennis.htm
http://www.founder.com.cn/cn/cThe
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
http://www.typography.netD
http://www.jiyu-kobo.co.jp/jp/XTj

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xff0ca065, page size 16384, DirtyShutdown, Windows version 10.0
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
Click to see the 12 hidden entries
C:\ProgramData\ScreenConnect Client (5c1b63d437ba59e3)\n1llp0rc.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
data
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
data
#
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
data
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\CustomAction.config
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\ScreenConnect.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\MSIDAF2.tmp-\ScreenConnect.InstallerActions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
data
#