top title background image
flash

Microsoft.ApplicationInsights.PersistenceChannel.exe

Status: finished
Submission Time: 2021-09-13 15:54:21 +02:00
Malicious
Spyware
Evader

Comments

Tags

  • exe
  • OuterJoinSrl
  • signed

Details

  • Analysis ID:
    482276
  • API (Web) ID:
    849849
  • Analysis Started:
    2021-09-13 15:54:31 +02:00
  • Analysis Finished:
    2021-09-13 16:05:24 +02:00
  • MD5:
    14e351015c5d632f888dbcac03871fae
  • SHA1:
    b5471c5eea356ce87ac5c2df8bbd9bc72cf84da9
  • SHA256:
    977a8d56d7bbc22e780e85bea06fa4be13c8f9be01515665863cb431fb2e8daa
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 72
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 27/67
malicious
Score: 13/45

IPs

IP Country Detection
77.222.42.92
Russian Federation

URLs

Name Detection
https://dc.services.visualstudio.com/v2/track
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://77.222.42.92/public/sqlite3.dll
Click to see the 23 hidden entries
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
https://dc.services.visualstudio.com/v2/trackY87C19923:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
https://ac.ecosia.org/autocomplete?q=
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://77.222.42.92/goodnews.php
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
https://duckduckgo.com/ac/?q=
https://duckduckgo.com/chrome_newtab
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3AVJH2FWN4NV3EHF_2ef946da1f6452dd7dfcc2fa85c468c6437b1f_4630c9cb_145b58bf\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFBB.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Sep 13 13:55:48 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCDC.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 6 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCFFA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\sqlite3[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\Desktop\7QQ1NYCJ
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\Desktop\OHLNY58Q
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\Desktop\XBAIMOPZ
SQLite 3.x database, last written using SQLite version 3032001
#