top title background image
flash

WXs8v9QuE7.exe

Status: finished
Submission Time: 2021-06-22 18:23:12 +02:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    438542
  • API (Web) ID:
    806131
  • Analysis Started:
    2021-06-22 18:23:13 +02:00
  • Analysis Finished:
    2021-06-22 18:34:08 +02:00
  • MD5:
    1f45b0e2bd669bce49b2140373243a91
  • SHA1:
    6ea61f1b39548a8b9192c0606d6daeb2c071a190
  • SHA256:
    ef05dd27e2dc499d3c1f42f00525fea7204735acd45c7a03efb78a241a9f9660
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 13/69
malicious
Score: 9/46
malicious

IPs

IP Country Detection
185.53.177.12
Germany
50.87.146.99
United States
75.2.124.199
United States
Click to see the 7 hidden entries
119.81.95.146
Singapore
184.168.131.241
United States
222.239.248.209
Korea Republic of
94.136.40.51
United Kingdom
67.199.248.12
United States
23.225.101.32
United States
34.102.136.180
United States

Domains

Name IP Detection
www.fredrika-stahl.com
185.53.177.12
www.kesat-ya10.com
0.0.0.0
www.kocaelimanliftkiralama.site
0.0.0.0
Click to see the 18 hidden entries
www.underce.com
0.0.0.0
www.oceancollaborative.com
0.0.0.0
www.mutanterestaurante.com
0.0.0.0
www.doodstore.net
0.0.0.0
www.reufhroir.com
0.0.0.0
www.motivactivewear.com
0.0.0.0
www.purpleqube.com
0.0.0.0
oceancollaborative.com
184.168.131.241
mutanterestaurante.com
50.87.146.99
www.9wsc.com
23.225.101.32
www.tori2020.com
222.239.248.209
purpleqube.com
119.81.95.146
doodstore.net
67.199.248.12
www.shenghui118.com
45.192.104.89
vallble01.xshoppy.shop
75.2.124.199
www.5xlsteve.com
94.136.40.51
motivactivewear.com
34.102.136.180
www.grpsexportsandimports.com
52.74.134.26

URLs

Name Detection
http://www.purpleqube.com/bp3i/?2db=IkQuCFl7MCfBRj/Vz+o9SZKu4zQeP+5HQLx8WUcJbeVktEW19wEdA8Etbmrh51eTDYYM&ApZx=O2MHiVr0W
http://www.fredrika-stahl.com/bp3i/?2db=cas+hsZJvZFo3GF+EdMNCMOiV1dGjFKaknimsFdRmzAJWDDXgl+w3pBTGW4WB38KsB49&ApZx=O2MHiVr0W
http://www.5xlsteve.com/bp3i/?2db=zbNXh78uhP7VzN8kPHFueaY47g6J6psPJhyFJvfKuCHih9LJaB8PnmAAQmuNnVgiv7yX&ApZx=O2MHiVr0W
Click to see the 34 hidden entries
http://www.doodstore.net/bp3i/?2db=/O9fLU9fKPl9hp8FjcQBjfSEDJBN8B2QQZ2zni9zphKaS5k3K3CvlS+mwENkfwkv1cT8&ApZx=O2MHiVr0W
http://www.mutanterestaurante.com/bp3i/?2db=E7M2l69Gv0yeE4KBOXHGh6mx//FtP199Dh6qlRwE96ss/V1ksNZ+8ksSpGi6EwZCpyax&ApZx=O2MHiVr0W
http://www.tori2020.com/bp3i/?2db=MlxGGjj2GILR3uc1yrCD+B+Qm9+cwVH8bO7hosl1JjKtZPf8ruvdLFpmglVOZIulzoDe&ApZx=O2MHiVr0W
www.oceancollaborative.com/bp3i/
http://www.galapagosdesign.com/staff/dennis.htm
http://www.typography.netD
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://nsis.sf.net/NSIS_Error
http://www.jiyu-kobo.co.jp/
https://www.123-reg-new-domain.co.uk/iframe.html
http://www.galapagosdesign.com/DPlease
http://www.fontbureau.com/designers8
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com
http://www.founder.com.cn/cn/cThe
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.sajatypeworks.com
http://www.carterandcone.coml
http://www.goodfont.co.kr
http://nsis.sf.net/NSIS_ErrorError
http://www.fontbureau.com/designers
http://www.tiro.com
http://www.motivactivewear.com/bp3i/?2db=zzYPr0OAQH7TXWaM6HNOV25V/HRJbXLG3d0AEq0Xu0niOsubCwaCiuhJfb7NIA/TR+lf&ApZx=O2MHiVr0W
http://www.fontbureau.com/designers?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?
http://www.fontbureau.com/designersG
http://www.fontbureau.com
http://www.apache.org/licenses/LICENSE-2.0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\fy9bu4fvmp6z54he
data
#
C:\Users\user\AppData\Local\Temp\nsa7685.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\pplsesniiplv
DOS executable (COM)
#