top title background image
flash

KY4cmAI0jU.exe

Status: finished
Submission Time: 2021-06-11 08:54:16 +02:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    433078
  • API (Web) ID:
    800681
  • Analysis Started:
    2021-06-11 09:00:39 +02:00
  • Analysis Finished:
    2021-06-11 09:10:40 +02:00
  • MD5:
    8c35ac8d43f7e59105902fa16114144e
  • SHA1:
    c1a0e5de1121e55c22649182c923b41efd4e2848
  • SHA256:
    1a08fc838c4ebab6b986b6010e2074a05c29916cd38096e7f7d26a6455917508
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 24/69
malicious
Score: 8/35
malicious
Score: 12/29

IPs

IP Country Detection
104.21.89.72
United States
104.18.193.20
United States
107.180.57.111
United States
Click to see the 5 hidden entries
173.234.255.253
United States
172.67.206.33
United States
45.195.169.197
Seychelles
3.34.12.41
United States
3.143.65.214
United States

Domains

Name IP Detection
www.take-me-bergen.com
172.67.206.33
www.meganfantastic.com
45.195.169.197
www.rentcafecloudflaremvccn.com
104.18.193.20
Click to see the 11 hidden entries
www.candydulce.com
104.21.89.72
www.ezonkorea.com
3.34.12.41
www.ladorreguita.com
173.234.255.253
dndemystified.com
107.180.57.111
www.starflexacademy.com
0.0.0.0
www.dndemystified.com
0.0.0.0
www.insurancedowntown.com
0.0.0.0
www.obi4ex.com
0.0.0.0
www.sciencebasedmasks.com
0.0.0.0
prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com
3.143.65.214
www.baliholisticacademy.com
192.185.0.218

URLs

Name Detection
http://www.take-me-bergen.com/sh2m/?i0=Y4nA7D8ZanudJV/n7ckHSBWOhW22WEJR/asQiGNTmjaNDyrYZ8Q/zKqiBMBjk5weHegN&4huxZr=02MtK8MPsR3L
www.alberthospice.com/sh2m/
http://www.ladorreguita.com/sh2m/?i0=AN9Dli3eSwBxhLN7Z92H8FzDOGpUzm7G3BkkvfgYwC6zoN6kwH9F+lw53Jt7Bui6OWXD&4huxZr=02MtK8MPsR3L
Click to see the 35 hidden entries
http://www.candydulce.com/sh2m/?i0=Qqwfsv61LD8gOSv2HQNs13/ILT3hkPAGuV1QQZOHa/kG/rdN/rA5QVkGcwq5olxFBDS9&4huxZr=02MtK8MPsR3L
http://www.insurancedowntown.com/sh2m/?i0=c9aUCvLa9Ql2a6xFKe5xJWdXulTfAnmJmW0relGKzVi+CMwVFA49Zy8Fshmf8yObHaZC&4huxZr=02MtK8MPsR3L
http://www.starflexacademy.com/sh2m/?i0=CQ6AMTNmXrT6GsHyvLqygrxreupfdtmN+4T1XtvAXMgditzRj6Y1Xuw537ryrSqhWitY&4huxZr=02MtK8MPsR3L
http://www.meganfantastic.com/sh2m/?i0=uHvpiI6aXo2y2Po+6svR0qIfr0jRx6IK9412etvelJearRBAFXnPloN9l4KAKLF+tazG&4huxZr=02MtK8MPsR3L
http://www.dndemystified.com/sh2m/?i0=e+6U2v/464/49Vrt/4yGVwpDKMjmMUzpCV508o5/z2Kz7+x90JHivdh29zvGxsTtrzAO&4huxZr=02MtK8MPsR3L
http://www.ezonkorea.com/sh2m/?i0=UiVwUNrNLQfwtohPmVYH70t5lUixURpqlrLqHTUDsyREBVD/9Tpqi3FDGPs9lJ3zNa3b&4huxZr=02MtK8MPsR3L
http://www.urwpp.deDPlease
http://www.sandoll.co.kr
http://www.zhongyicts.com.cn
http://www.fonts.com
http://www.sakkal.com
http://www.fontbureau.com/designers8
http://www.galapagosdesign.com/DPlease
http://www.typography.netD
http://www.jiyu-kobo.co.jp/
http://nsis.sf.net/NSIS_Error
http://www.fontbureau.com/designers/frere-jones.html
http://www.founder.com.cn/cn
http://fontfabrik.com
http://www.galapagosdesign.com/staff/dennis.htm
http://www.founder.com.cn/cn/cThe
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.apache.org/licenses/LICENSE-2.0
http://www.sajatypeworks.com
http://www.carterandcone.coml
http://www.goodfont.co.kr
http://nsis.sf.net/NSIS_ErrorError
http://www.fontbureau.com/designers
http://www.tiro.com
http://www.fontbureau.com/designers?
https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?
http://www.fontbureau.com/designersG
http://www.fontbureau.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\nssF13F.tmp
data
#
C:\Users\user\AppData\Local\Temp\nssF140.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\x8abgzdx2taarfhvmdw
data
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Temp\yerrxvolv
data
#