flash

KY4cmAI0jU.exe

Status: finished
Submission Time: 11.06.2021 08:54:16
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    433078
  • API (Web) ID:
    800681
  • Analysis Started:
    11.06.2021 09:00:39
  • Analysis Finished:
    11.06.2021 09:10:40
  • MD5:
    8c35ac8d43f7e59105902fa16114144e
  • SHA1:
    c1a0e5de1121e55c22649182c923b41efd4e2848
  • SHA256:
    1a08fc838c4ebab6b986b6010e2074a05c29916cd38096e7f7d26a6455917508
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
24/69

malicious
8/35

malicious
12/29

IPs

IP Country Detection
104.21.89.72
United States
104.18.193.20
United States
107.180.57.111
United States
Click to see the 5 hidden entries
173.234.255.253
United States
172.67.206.33
United States
45.195.169.197
Seychelles
3.34.12.41
United States
3.143.65.214
United States

Domains

Name IP Detection
www.take-me-bergen.com
172.67.206.33
www.meganfantastic.com
45.195.169.197
www.rentcafecloudflaremvccn.com
104.18.193.20
Click to see the 11 hidden entries
www.candydulce.com
104.21.89.72
www.ezonkorea.com
3.34.12.41
www.ladorreguita.com
173.234.255.253
dndemystified.com
107.180.57.111
www.starflexacademy.com
0.0.0.0
www.dndemystified.com
0.0.0.0
www.insurancedowntown.com
0.0.0.0
www.obi4ex.com
0.0.0.0
www.sciencebasedmasks.com
0.0.0.0
prod-sav-park-lb01-1919960993.us-east-2.elb.amazonaws.com
3.143.65.214
www.baliholisticacademy.com
192.185.0.218

URLs

Name Detection
http://www.dndemystified.com/sh2m/?i0=e+6U2v/464/49Vrt/4yGVwpDKMjmMUzpCV508o5/z2Kz7+x90JHivdh29zvGxsTtrzAO&4huxZr=02MtK8MPsR3L
http://www.meganfantastic.com/sh2m/?i0=uHvpiI6aXo2y2Po+6svR0qIfr0jRx6IK9412etvelJearRBAFXnPloN9l4KAKLF+tazG&4huxZr=02MtK8MPsR3L
http://www.starflexacademy.com/sh2m/?i0=CQ6AMTNmXrT6GsHyvLqygrxreupfdtmN+4T1XtvAXMgditzRj6Y1Xuw537ryrSqhWitY&4huxZr=02MtK8MPsR3L
Click to see the 35 hidden entries
http://www.insurancedowntown.com/sh2m/?i0=c9aUCvLa9Ql2a6xFKe5xJWdXulTfAnmJmW0relGKzVi+CMwVFA49Zy8Fshmf8yObHaZC&4huxZr=02MtK8MPsR3L
http://www.ladorreguita.com/sh2m/?i0=AN9Dli3eSwBxhLN7Z92H8FzDOGpUzm7G3BkkvfgYwC6zoN6kwH9F+lw53Jt7Bui6OWXD&4huxZr=02MtK8MPsR3L
www.alberthospice.com/sh2m/
http://www.candydulce.com/sh2m/?i0=Qqwfsv61LD8gOSv2HQNs13/ILT3hkPAGuV1QQZOHa/kG/rdN/rA5QVkGcwq5olxFBDS9&4huxZr=02MtK8MPsR3L
http://www.ezonkorea.com/sh2m/?i0=UiVwUNrNLQfwtohPmVYH70t5lUixURpqlrLqHTUDsyREBVD/9Tpqi3FDGPs9lJ3zNa3b&4huxZr=02MtK8MPsR3L
http://www.take-me-bergen.com/sh2m/?i0=Y4nA7D8ZanudJV/n7ckHSBWOhW22WEJR/asQiGNTmjaNDyrYZ8Q/zKqiBMBjk5weHegN&4huxZr=02MtK8MPsR3L
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
http://www.fontbureau.com/designers?
http://www.tiro.com
http://www.fontbureau.com/designers
http://nsis.sf.net/NSIS_ErrorError
http://www.goodfont.co.kr
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.typography.netD
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://nsis.sf.net/NSIS_Error
http://www.jiyu-kobo.co.jp/
http://www.galapagosdesign.com/DPlease
http://www.fontbureau.com/designers8
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\nssF13F.tmp
data
#
C:\Users\user\AppData\Local\Temp\nssF140.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\x8abgzdx2taarfhvmdw
data
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Temp\yerrxvolv
data
#