top title background image
flash

OII9x4FeW7.exe

Status: finished
Submission Time: 2021-02-22 20:30:36 +01:00
Malicious
Trojan
Adware
Evader
Mimikatz

Comments

Tags

  • exe
  • YoungLotus

Details

  • Analysis ID:
    356280
  • API (Web) ID:
    614535
  • Analysis Started:
    2021-02-22 20:41:01 +01:00
  • Analysis Finished:
    2021-02-22 20:49:16 +01:00
  • MD5:
    ff7d3b6003c9058e40ae38a6a7efe40c
  • SHA1:
    842bbfb81f4a65112bc2d8e4aff8b976e5db9a55
  • SHA256:
    c3304ec52968793ae709cf7c7caad6acae0bded8088f06cefbee55bde0a9224f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 52/71
malicious
Score: 36/47
malicious

IPs

IP Country Detection
58.218.67.253
China

Domains

Name IP Detection
s2010218.f3322.net
58.218.67.253

URLs

Name Detection
https://ssl.ptlogin2.qq.com%s
https://xui.ptlogin2.qq.com/cgi-bin/xlogin?appid=715030901&daid=73&hide_close_icon=1&pt_no_auth=1&s_
http://ptlogin2.qun.qq.com%s
Click to see the 1 hidden entries
http://qun.qq.com%s

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Ogxog.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Windows\System32\drivers\QAssist.sys
PE32+ executable (native) x86-64, for MS Windows
#
Click to see the 1 hidden entries
\Device\Null
ASCII text, with CRLF line terminators
#