top title background image
flash

HAWB AND INV.exe

Status: finished
Submission Time: 2021-05-03 14:51:23 +02:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe

Details

  • Analysis ID:
    402848
  • API (Web) ID:
    707859
  • Analysis Started:
    2021-05-03 14:51:24 +02:00
  • Analysis Finished:
    2021-05-03 15:06:34 +02:00
  • MD5:
    42662765a94ce5ece11529509f937711
  • SHA1:
    da57dd4c137c47fc9b906caaf067c6ed13fa2da6
  • SHA256:
    2138325dd5e2825ee4086187a944af336476b0327e1ddae7563bb24523836e08
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 10/47

IPs

IP Country Detection
181.214.142.2
Chile
107.180.57.119
United States
202.254.234.152
Japan
Click to see the 1 hidden entries
34.102.136.180
United States

Domains

Name IP Detection
www.premier-moment.info
202.254.234.152
ecosanhn.com
181.214.142.2
jaimericart.com
81.88.48.71
Click to see the 11 hidden entries
networkingmaderas.com
107.180.57.119
www.vipbrandwatch.info
0.0.0.0
www.networkingmaderas.com
0.0.0.0
www.beachrockisland.com
0.0.0.0
www.curvygirlholiday.com
0.0.0.0
www.dinkoistmatrimony.com
0.0.0.0
www.ecosanhn.com
0.0.0.0
www.jaimericart.com
0.0.0.0
www.itechfreak.com
192.238.144.41
dinkoistmatrimony.com
34.102.136.180
curvygirlholiday.com
34.102.136.180

URLs

Name Detection
www.alldaazz.com/maw9/
http://www.ecosanhn.com/maw9/?AVF=cbTyfQFVyV4qwzSuB5gkHhMhd4ZKxxzMSggVhGr4392xKRAUAYS1aRQvNzIyvi+llhoR0m7eyA==&6l=sHbLpdw8x0Nx4
http://www.networkingmaderas.com/maw9/?AVF=CxDYGZqaFGf+wggxXYaRsXxHYh0vkMvLuxQU/eiz8BKY71rUvugXdjEA5Q+gRIVecMz1lX5ZhQ==&6l=sHbLpdw8x0Nx4
Click to see the 41 hidden entries
http://www.premier-moment.info/maw9/?AVF=6+c9WwA91vc3q1qPV/bxdb4jLCwfrBo6mkGAjXedmMMeaWqNVTNOJ33lEW7rMTYT0EzxW77dCg==&6l=sHbLpdw8x0Nx4
http://www.fontbureau.com/designers8
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
http://www.dinkoistmatrimony.com/maw9/?AVF=4eDAg+VUuFTPb+HpMV2XwHXrAkW6c8A/v4D4zAieFew51h9R0F5m+f+tz7m/68XBKeAB57yd0w==&6l=sHbLpdw8x0Nx4
http://www.jiyu-kobo.co.jp/
http://www.galapagosdesign.com/DPlease
http://www.founder.com.cn/cn/cThe
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.sakkal.com
https://github.com/unguest
http://www.curvygirlholiday.com/maw9/?AVF=ueXSnp9RuZV4VGv1GREwgsKbz6ngTp3QynINalfLY22/qL3buQO/ZY9WhadtjkGC+9EglwJKpA==&6l=sHbLpdw8x0Nx4
https://github.com/unguest9WinForms_RecursiveFormCreate5WinForms_SeeInnerExceptionGProperty
http://www.tiro.com
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
http://pesterbdd.com/images/Pester.png
http://www.apache.org/licenses/LICENSE-2.0.html
http://www.fontbureau.com/designers?
https://go.micro
https://go.microX%
http://www.autoitscript.com/autoit3/J
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
https://go.cpanel.net/privacy
https://github.com/Pester/Pester
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.typography.netD
http://www.fontbureau.com/designers/cabarga.htmlN

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HAWB AND INV.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp9D41.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\qxnptkmQbHB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_452t2rgn.y0w.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ci5ca1ps.eac.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kktv134m.r1n.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o4og0hre.avf.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qa3iixpe.2p0.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_whb0pjwq.qxr.psm1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\qxnptkmQbHB.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\Documents\20210503\PowerShell_transcript.760639.DjF4q4v1.20210503145231.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210503\PowerShell_transcript.760639.TlWWST52.20210503145228.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210503\PowerShell_transcript.760639.loHpl5Ui.20210503145226.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#