flash

VjLfUM5cMx.exe

Status: finished
Submission Time: 10.09.2021 07:26:25
Malicious
Trojan
Evader
Ursnif Ursnif v3

Comments

Tags

  • exe
  • FORTHPROPERTYLTD

Details

  • Analysis ID:
    480997
  • API (Web) ID:
    848566
  • Analysis Started:
    10.09.2021 07:26:27
  • Analysis Finished:
    10.09.2021 07:34:14
  • MD5:
    c07d4f7dcac497a3c06cbba9e6e9e711
  • SHA1:
    f9910595a15ee0ca41871bda8f1a23a3aa7f9360
  • SHA256:
    82aabb70809394ec910ecdff3dfe4982d652c6d65f7fa65e7da16b83ebf87192
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
88/100

malicious
9/68

Domains

Name IP Detection
haverit.xyz
0.0.0.0

URLs

Name Detection
https://haverit.xyz/index.htm
https://haverit.xyz/index.htmr#
http://www.nytimes.com/
Click to see the 18 hidden entries
https://sectigo.com/CPS0
http://ocsp.sectigo.com0
https://haverit.xyz/index.htmdex.htm
http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
http://www.youtube.com/
http://www.wikipedia.com/
http://www.amazon.com/
https://haverit.xyz
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
http://www.live.com/
https://haverit.xyz/0b
https://haverit.xyz/Q
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
http://www.reddit.com/
http://www.twitter.com/
https://haverit.xyz/index.htm&E
https://haverit.xyz/index.htmRoot
http://www.google.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{077FA0D4-11F8-11EC-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E1A18F6F-11F7-11EC-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{077FA0D6-11F8-11EC-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
Click to see the 25 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{E1A18F71-11F7-11EC-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\NewErrorPageTemplate[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\dnserror[1]
HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\errorPageStrings[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\httpErrorPagesScripts[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\NewErrorPageTemplate[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\dnserror[1]
HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\errorPageStrings[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\httpErrorPagesScripts[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF53DFCC907A82F6AE.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB3B5364D27108BD7.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFCE99751527B74E99.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD3F956B20687A278.TMP
data
#