top title background image
flash

Proforma Invoice and Bank swift-REG.PI-0086547654.exe

Status: finished
Submission Time: 2021-06-10 14:34:38 +02:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    432567
  • API (Web) ID:
    800171
  • Analysis Started:
    2021-06-10 14:34:39 +02:00
  • Analysis Finished:
    2021-06-10 14:45:04 +02:00
  • MD5:
    b148ae414eb8a1b34a15cdb32c21f9ee
  • SHA1:
    25b78f76010cc34843352c78d4f8e07a28b46b32
  • SHA256:
    193788545c12c697fe660e9dd178e5d97478d5b90d5b0096f1cd6a9b641d48e9
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 20/68
malicious
Score: 14/47

IPs

IP Country Detection
37.48.65.148
Netherlands
104.232.96.207
United States
23.227.38.74
Canada
Click to see the 5 hidden entries
69.162.102.218
United States
121.254.178.252
Korea Republic of
85.159.66.93
Turkey
162.0.229.108
Canada
35.205.61.67
United States

Domains

Name IP Detection
www.theyogirunner.com
104.232.96.207
www.kladios.com
121.254.178.252
closetofaurora.com
162.0.229.108
Click to see the 11 hidden entries
www.pecon.pro
37.48.65.148
shops.myshopify.com
23.227.38.74
www.kingguardgroup.com
69.162.102.218
natroredirect.natrocdn.com
85.159.66.93
www.closetofaurora.com
0.0.0.0
www.letstrumpbiden.com
0.0.0.0
www.28ji.site
0.0.0.0
www.hireinone.xyz
0.0.0.0
www.goodlukc.com
0.0.0.0
www.oilleakgames.com
0.0.0.0
www.rebeccannemontgomery.net
35.205.61.67

URLs

Name Detection
www.rebeccannemontgomery.net/dp3a/
http://www.kingguardgroup.com/dp3a/?GR-d=+9xVWhQ3YZdKS9LSdJD9Q5IGOGjZWYGRUC/PBrhb5+8EiR866LajmsNw/hU5zOKELtJS&nPTdU=-ZoHnNt0frfd2Hn
http://www.closetofaurora.com/dp3a/?GR-d=gKBh5mJw+OBG/cLQbNfpnnQYqc+45jCeSmhHkERkUIltQJh3+jBq8zykiXiJ5ld+SMHF&nPTdU=-ZoHnNt0frfd2Hn
Click to see the 36 hidden entries
http://www.hireinone.xyz/dp3a/?GR-d=gNGby8oVX6PgZB5GWA7CusOGqzi3GywYGs/3OTvKjB1NulubMkWwqj/edMXwHBCob9Lh&nPTdU=-ZoHnNt0frfd2Hn
http://www.28ji.site/dp3a/?nPTdU=-ZoHnNt0frfd2Hn&GR-d=/zMHFgDZZhoYLr+uNA/LZaIwAqqHNoUyccNHiXKU1Oc8waRhqa0xV5lesUE3sQ0wja+H
http://www.theyogirunner.com/dp3a/?nPTdU=-ZoHnNt0frfd2Hn&GR-d=rT959XFbghPJVv5hpca1PvfPcVCtnqQ7MGzQwkslu+qbfaQ1OXZa8AaW+DloN+T+QKhF
http://www.pecon.pro/dp3a/?nPTdU=-ZoHnNt0frfd2Hn&GR-d=qfgFr8ieK4pb0oEJahXrwfByJwdYjuIB81dpFpRA2DwOSKuw2QjIPW4nYRzvvZDFGDPJ
http://www.kladios.com/dp3a/?GR-d=9p/K3n16Mfij3JUlf4zaR/Rujbmkv/CDhZs1M9Rj6A9SEkbuvv/NT9LewVshmGfbFjhm&nPTdU=-ZoHnNt0frfd2Hn
http://www.founder.com.cn/cn
http://www.founder.com.cn/cn/cThe
http://www.fontbureau.com/designers/frere-user.html
http://nsis.sf.net/NSIS_Error
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
http://www.jiyu-kobo.co.jp/
http://www.galapagosdesign.com/DPlease
http://www.fontbureau.com/designers8
http://www.%s.comPA
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com
http://www.goodfont.co.kr
http://www.fontbureau.com
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.tiro.com
http://www.fontbureau.com/designers
http://nsis.sf.net/NSIS_ErrorError
http://fontfabrik.com
http://www.rebeccannemontgomery.net/dp3a/?GR-d=ayCA4X1Kl09ymHiLnx81tYxQpS3YxUUFxhK9zdH9kq/gCaIMsyBIYQcEhhLQSA14VAsf&nPTdU=-ZoHnNt0frfd2Hn
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.typography.netD
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.apache.org/licenses/LICENSE-2.0
http://www.galapagosdesign.com/staff/dennis.htm

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\6jlp0t221b5inmotwb6
data
#
C:\Users\user\AppData\Local\Temp\dceotuvjnitpz
data
#
C:\Users\user\AppData\Local\Temp\nsp24F6.tmp
data
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Temp\nsp24F7.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#