top title background image
flash

5nXX3v5zWn.exe

Status: finished
Submission Time: 2021-07-14 09:30:35 +02:00
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

  • 32
  • exe

Details

  • Analysis ID:
    448478
  • API (Web) ID:
    816070
  • Analysis Started:
    2021-07-14 09:33:33 +02:00
  • Analysis Finished:
    2021-07-14 09:53:19 +02:00
  • MD5:
    e35a0bdb66b37b80c51a1559058e326b
  • SHA1:
    42d31ffa8a8a38d5073220550cae44d3e91bf9d6
  • SHA256:
    4d16ac850f443e678e5cdc8c104f9369a97e8347c3a64f3fce173329072fee53
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 32/69
malicious
Score: 20/46

IPs

IP Country Detection
91.199.212.52
United Kingdom
185.26.106.194
France

Domains

Name IP Detection
mail.spamora.net
185.26.106.194
crt.sectigo.com
91.199.212.52
231.29.2.0.in-addr.arpa
0.0.0.0

URLs

Name Detection
http://www.tiro.comtn
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
Click to see the 47 hidden entries
http://www.fontbureau.comF
https://sectigo.com/CPS0
http://www.fonts.comc
http://pesterbdd.com/images/Pester.png
http://schemas.xmlsoap.org/soap/encoding/
http://www.apache.org/licenses/LICENSE-2.0.html
https://go.micro
http://www.tiro.comt.j
http://www.apache.org/licenses/LICENSE-2.0.htmlH
https://contoso.com/Icon
http://nuget.org/NuGet.exe
http://www.fontbureau.come.com
https://github.com/Pester/Pester
http://en.w
http://ocsp.sectigo.com0%
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/cabarga.html
https://go.micro8
http://pesterbdd.com/images/Pester.pngH
http://schemas.xmlsoap.org/wsdl/
http://www.fontbureau.com/designers/
http://www.microsoft.co_
https://contoso.com/
https://github.com/Pester/PesterH
https://contoso.com/License
http://www.tiro.com
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt5=
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
http://www.sajatypeworks.com
http://www.typography.netD
http://fontfabrik.comq
http://www.fontbureau.comas
http://www.founder.com.cn/cn/cThe
http://fontfabrik.com
http://www.founder.com.cn/cn/bThe
https://nuget.org/nuget.exe
http://mail.spamora.net
http://www.fontbureau.com/designersv
https://login.yahoo.com/config/login
http://www.fonts.com
http://www.sandoll.co.kr
http://www.site.com/logs.php
http://www.nirsoft.net/
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5nXX3v5zWn.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\egGZqtIOrEmq.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\egGZqtIOrEmq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Roaming\WindowsUpdate.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmpA9C5.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\Documents\20210714\PowerShell_transcript.138727.oUfNsHgU.20210714093455.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210714\PowerShell_transcript.138727.fYco6+D0.20210714093453.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210714\PowerShell_transcript.138727.JIVpCcrj.20210714093452.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30D802E0E248FEE17AAF4A62594CC75A
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vth45tfl.sdf.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uyn15uet.dem.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mfl5jaou.44l.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3j5vb2e.zhc.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_53yqb03u.w2f.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_102g4eb0.ed4.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30D802E0E248FEE17AAF4A62594CC75A
data
#