top title background image
flash

VknMvPoCXZ.exe

Status: finished
Submission Time: 2021-09-15 15:03:20 +02:00
Malicious
Trojan
Adware
Exploiter
Evader
AgentTesla

Comments

Tags

  • AfiaWaveEnterprisesOy
  • AgentTesla
  • exe
  • signed

Details

  • Analysis ID:
    483863
  • API (Web) ID:
    851426
  • Analysis Started:
    2021-09-15 15:19:29 +02:00
  • Analysis Finished:
    2021-09-15 15:37:01 +02:00
  • MD5:
    0cecfa83ee6ea6dd1de38462bbedf15c
  • SHA1:
    de4dde34707658d98f50de8cf2a182bf7ded2a45
  • SHA256:
    a6bdce859b5373990681d6ed6c6133a80330fa2744ea9c1e88018d03ab77feb2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 33/69
malicious
Score: 20/45

URLs

Name Detection
http://www.typography.netD
http://www.apache.org/licenses/LICENSE-2.0
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Click to see the 97 hidden entries
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
http://www.sakkal.com
http://www.founder.com.cn/cnf
http://www.sandoll.co.kr
http://www.fonts.com
https://sectigo.com/CPS0D
https://sectigo.com/CPS0C
http://fontfabrik.com
http://www.galapagosdesign.com/staff/dennis.htm
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
http://www.fontbureau.com
https://dev.ditu.live.com/mapcontrol/logging.ashx
http://www.tiro.comnm
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
http://www.goodfont.co.kr
http://www.jiyu-kobo.co.jp/5.
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
http://www.tiro.com
http://www.fontbureau.com/designers?
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.virtualearth.net/REST/v1/Routes/Driving
http://www.fontbureau.com/designers/cabarga.htmlN
https://%s.dnet.xboxlive.com
https://dev.ditu.live.com/REST/v1/Locations
https://activity.windows.com
http://www.fontbureau.com/designers8
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
http://www.jiyu-kobo.co.jp/
http://www.fontbureau.comm
http://www.sajatypeworks.comnt
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
http://www.founder.com.cn/cn
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
http://www.fontbureau.comicva
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
http://www.jiyu-kobo.co.jp/jp/
https://activity.windows.comr
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
http://www.fontbureau.com/designers19
https://sectigo.com/CPS0
http://www.fontbureau.comue
http://www.sandoll.co.krlea
https://mhconsultores.net.ve/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
http://www.fonts.comc
http://www.sandoll.co.kropyw2-
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.bingmapsportal.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.zhongyicts.com.cn
http://www.nirsoft.net/
http://www.urwpp.deDPlease
https://appexmapsappupdate.blob.core.windows.net
http://www.galapagosdesign.com/DPlease
https://dev.virtualearth.net/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
http://www.jiyu-kobo.co.jp/H.
http://www.founder.com.cn/cn/cThe
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
http://www.sajatypeworks.com
http://www.fontbureau.com/designers
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://dev.ditu.live.com/REST/v1/Routes/
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
http://www.jiyu-kobo.co.jp/c.
http://ocsp.sectigo.com0
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?
http://www.fontbureau.com/designersG
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
http://www.microsoftc.
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://dev.virtualearth.net/REST/v1/Routes/Transit
http://www.jiyu-kobo.co.jp/Y0/
https://dynamic.t
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
http://www.jiyu-kobo.co.jp/curs
http://www.fontbureau.com/designers/frere-jones.html
http://www.sandoll.co.krB2
http://www.founder.com.cn/cn/
http://www.carterandcone.coml
http://en.w
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations
https://%s.xboxlive.com
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
http://crl.ver)

Dropped files

Name File Type Hashes Detection
C:\Windows\Resources\Themes\aero\shell\4B6A7152\svchost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_VknMvPoCXZ.exe_64eaf576c345d5342863ccd8192529db1bd52c80_e2466c59_0f48ed99\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\Windows\Resources\Themes\aero\shell\4B6A7152\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 47 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\481F404B.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\481F404B.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q2gw4bjc.itm.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojwwilnd.ypi.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqnhaj14.abr.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5xybjsm.dfn.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\b4116074-3d60-4dc8-8710-9dcf62ffe1cd\AdvancedRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\b4116074-3d60-4dc8-8710-9dcf62ffe1cd\test.bat
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\ce8a02e5-a5a2-4145-9112-744934cbc98c\AdvancedRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ce8a02e5-a5a2-4145-9112-744934cbc98c\test.bat
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\d3617b11-5ec7-4976-90b8-7ee0bce6869f\AdvancedRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\d3617b11-5ec7-4976-90b8-7ee0bce6869f\test.bat
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\f83f9cf5-aecc-448e-9e82-875f5c76499f\AdvancedRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\f83f9cf5-aecc-448e-9e82-875f5c76499f\test.bat
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.1BWqT5MQ.20210915152050.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.RiCjU3CB.20210915152105.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.Vuu9YzJB.20210915152106.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.cMiMRTOx.20210915152053.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.fN_Cx1KH.20210915152048.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.jKue+ViU.20210915152052.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.uTd+oL9Y.20210915152105.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210915\PowerShell_transcript.928100.zLIiz7Tp.20210915152056.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0dzsxkm1.gmw.psm1
very short file (no magic)
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x17166b1a, page size 16384, DirtyShutdown, Windows version 10.0
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC744.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Sep 15 22:21:25 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA60.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC26.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC53.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE424.tmp.txt
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\0c0a829c-b011-4032-9ed5-9caa96b4c6d3\AdvancedRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\0c0a829c-b011-4032-9ed5-9caa96b4c6d3\test.bat
ASCII text, with very long lines, with CRLF line terminators
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0k00wotq.d3h.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0uko0qtt.v1f.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54v3gsur.dvq.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5z51jnmi.3bc.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_afkkkgq1.y0i.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duwzq4u5.ro3.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_grxndcbs.jvz.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h5nm0hzg.gxy.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0bhscjr.xhy.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mo22qrr4.kn0.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nein1cmy.5m1.psm1
very short file (no magic)
#