top title background image
flash

ORDER TSA-A090621B.exe

Status: finished
Submission Time: 2021-07-20 08:31:26 +02:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe
  • NanoCore
  • RAT

Details

  • Analysis ID:
    451105
  • API (Web) ID:
    818695
  • Analysis Started:
    2021-07-20 08:34:07 +02:00
  • Analysis Finished:
    2021-07-20 08:48:18 +02:00
  • MD5:
    f5d3b895f4109e09f8918fc52147d154
  • SHA1:
    e4fe29023bd9af1916d7c12197949ddaed424e8b
  • SHA256:
    9713a28e0645cc77089dfd921118db8827de0a8b7e8196d653da2002646bd3cf
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 14/68
malicious
Score: 8/46

IPs

IP Country Detection
84.38.133.182
Latvia
185.140.53.253
Sweden

Domains

Name IP Detection
dedicatedlambo9.ddns.net
84.38.133.182

URLs

Name Detection
dedicatedlambo9.ddns.net
185.140.53.253
http://www.urwpp.delar
Click to see the 40 hidden entries
http://www.jiyu-kobo.co.jp/Y0d
http://www.jiyu-kobo.co.jp/r
http://www.fontbureau.comcomF
http://www.fontbureau.comonyd
http://www.jiyu-kobo.co.jp/
http://www.jiyu-kobo.co.jp/jp/71
http://www.ascendercorp.com/typedesigners.html
http://www.fontbureau.comals
http://www.sakkal.comd
http://www.jiyu-kobo.co.jp/arge
http://www.sajatypeworks.comc
http://www.urwpp.de
http://www.founder.com.cn/cn/s
http://www.jiyu-kobo.co.jp/ns.
http://www.jiyu-kobo.co.jp/vnoi
http://www.fontbureau.com/designers/c
http://www.jiyu-kobo.co.jp/_
http://www.founder.com.cn/cn#
http://www.founder.com.cn/cnd
http://www.tiro.com
http://www.fontbureau.com
http://www.galapagosdesign.com/
http://www.fontbureau.comdr
http://www.jiyu-kobo.co.jp/V
http://www.tiro.comn
http://www.founder.com.cn/cnU
http://www.fontbureau.comueTF
http://www.jiyu-kobo.co.jp/jp/M
http://www.founder.com.cn/cnA
http://www.sakkal.comx.
http://www.fontbureau.com/designers/frere-jones.htmla-d
http://www.sajatypeworks.comD
http://www.jiyu-kobo.co.jp/71
http://google.com
http://www.jiyu-kobo.co.jp/jp/
http://www.fontbureau.coma
http://www.jiyu-kobo.co.jp/vau
http://www.sajatypeworks.com
http://www.founder.com.cn/cn/
http://www.founder.com.cn/cn

Dropped files

Name File Type Hashes Detection
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER TSA-A090621B.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
data
#