top title background image
flash

Products Order.exe

Status: finished
Submission Time: 2021-08-03 20:28:18 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • exe
  • null

Details

  • Analysis ID:
    458877
  • API (Web) ID:
    826446
  • Analysis Started:
    2021-08-03 20:28:19 +02:00
  • Analysis Finished:
    2021-08-03 20:36:46 +02:00
  • MD5:
    7beee2584cd632154d34c65237cd5eb0
  • SHA1:
    d192b8805a1d874d480d791f673dbde77f12059b
  • SHA256:
    56390f611b9571d11cdeb128435aaf3d5b282511f4a540d81912d87ffc1d2953
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 41/67
malicious
Score: 17/35
malicious
Score: 22/28

URLs

Name Detection
http://www.jiyu-kobo.co.jp/Y0
http://www.jiyu-kobo.co.jp/eta
http://www.founder.com.cn/cn
Click to see the 32 hidden entries
http://www.jiyu-kobo.co.jp/x
http://www.founder.com.cn/cn-
http://www.jiyu-kobo.co.jp/-
https://Au1SDZgNiFJp.net
http://www.jiyu-kobo.co.jp/
http://www.jiyu-kobo.co.jp/n
http://www.founder.com.cn/cn/
http://www.fontbureau.com/designers8
http://www.fonts.com
http://www.sandoll.co.kr
http://www.jiyu-kobo.co.jp/d
http://www.fonts.com8
http://www.sajatypeworks.comh
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.founder.com.cn/cnh
http://www.sandoll.co.kre
http://DynDns.comDynDNS
http://www.sajatypeworks.com/
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://www.jiyu-kobo.co.jp/K
https://Au1SDZgNiFJp.n
http://www.fontbureau.com/designersW
http://www.tiro.com
http://www.fontbureau.com/designers
http://127.0.0.1:HTTP/1.1
http://www.jiyu-kobo.co.jp/jp/
http://www.sandoll.co.krthe
http://www.fonts.comW
http://www.jiyu-kobo.co.jp/jp/w
http://oGRaXU.com
http://www.sajatypeworks.com
http://www.tiro.comn.

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Products Order.exe.log
ASCII text, with CRLF line terminators
#