top title background image
flash

E-Remittance Form_z.TXT.exe

Status: finished
Submission Time: 2021-08-14 10:47:11 +02:00
Malicious
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

  • exe
  • HawkEye

Details

  • Analysis ID:
    465268
  • API (Web) ID:
    832837
  • Analysis Started:
    2021-08-14 10:47:11 +02:00
  • Analysis Finished:
    2021-08-14 10:59:48 +02:00
  • MD5:
    0c3bdc11fd6454bb67da849864170b44
  • SHA1:
    1c925518e075761758a47f677016c95f5e80c92c
  • SHA256:
    bdade907a458b6c9d2e87af5667c3b8a16aa7804535634ed662b0e07c34f64b1
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 7/79
malicious
Score: 12/35
malicious
Score: 13/28

URLs

Name Detection
https://a.pomf.cat/
http://pomf.cat/upload.php&https://a.pomf.cat/
http://pomf.cat/upload.php
Click to see the 9 hidden entries
http://pomf.cat/upload.phpCContent-Disposition:
http://secure.globalsign.net/cacert/PrimObject.crt0
http://secure.globalsign.net/cacert/ObjectSign.crt09
http://www.globalsign.net/repository09
http://www.nirsoft.net/
http://www.autoitscript.com/autoit3/0
http://www.globalsign.net/repository/0
http://bot.whatismyipaddress.com/
http://www.globalsign.net/repository/03

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\82139548\urdavsa.pif
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\82139548\run.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\rnjidsxil.mp3
ASCII text, with CRLF line terminators
#
Click to see the 17 hidden entries
C:\Users\user\temp\pqbfmorxw.docx
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\wvjnbptk.exe
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\wdav.xml
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\uummnexccu.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\sggjqlvp.ico
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\rwvkj.jpg
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\rpgc.htg
data
#
C:\Users\user\AppData\Local\Temp\82139548\bsaecqbjx.docx
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\pvvrt.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\pqbfmorxw.docx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\pojm.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\ncplbfrqpr.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\mibt.ppt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\ledpu.cpl
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\kvfbftnru.mp3
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\hqlxwejnc.exe
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\82139548\essmbjocut.ico
ASCII text, with CRLF line terminators
#