top title background image
flash

IMG_05412_868_21.docx

Status: finished
Submission Time: 2021-05-04 21:58:47 +02:00
Malicious
Trojan
Exploiter
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    404303
  • API (Web) ID:
    710757
  • Analysis Started:
    2021-05-04 22:00:45 +02:00
  • Analysis Finished:
    2021-05-04 22:10:43 +02:00
  • MD5:
    8832e0557e1b144bad206ed6d14d5c34
  • SHA1:
    4b729d3262362a2ab3edab09ac1f625af8f5e0c1
  • SHA256:
    fbd1b454da7fecb92c40b9b2f74fc8fecae79340afdc011e7c0d6339fabdcfde
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 19/63
malicious
Score: 19/47
malicious

IPs

IP Country Detection
31.210.20.6
Netherlands

URLs

Name Detection
http://31.210.20.6/3/44444.exe
http://127.0.0.1:HTTP/1.1
https://api.ipify.org%GETMozilla/5.0
Click to see the 9 hidden entries
https://discord.com/2
http://DynDns.comDynDNS
http://www.%s.comPA
https://discord.com/
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
https://discord.com/6
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://mNVnNH.com
https://discord.com/:

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\44444[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tthxx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 8 hidden entries
C:\Users\user\tthxx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E92F7FC7.png
PNG image data, 288 x 424, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3E742551-7EEA-4C35-A601-2DE7AC9E238F}.tmp
Targa image data - RLE 65536 x 65536 x 0 ""
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4ABA8B27-B28F-4AE5-86AD-026C320EA73C}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\IMG_05412_868_21.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:18 2020, mtime=Wed Aug 26 14:08:18 2020, atime=Wed May 5 04:01:37 2021, length=96379, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$G_05412_868_21.docx
data
#