top title background image
flash

LISTA DE PEDIDO DE COMPRA.exe

Status: finished
Submission Time: 2021-09-27 18:52:56 +02:00
Malicious
Trojan
Evader
Spreader
Spyware
GuLoader, AgentTesla

Comments

Tags

  • exe
  • guloader

Details

  • Analysis ID:
    491627
  • API (Web) ID:
    859193
  • Analysis Started:
    2021-09-27 19:03:46 +02:00
  • Analysis Finished:
    2021-09-27 19:27:19 +02:00
  • MD5:
    943986d4cb51d4cc29946aa7914dbc5b
  • SHA1:
    cce8ec41fe0fabda407eaa5b8b9efc81168c5e5c
  • SHA256:
    47d8b37351178ed6a40a269f3f42eb23fa0780a9a93098439275f7e66897a924
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 76
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 100
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

Third Party Analysis Engines

malicious
Score: 7/45

IPs

IP Country Detection
109.169.39.245
United Kingdom
142.250.185.174
United States
142.250.184.193
United States

Domains

Name IP Detection
mail.reyesyasociados.com
109.169.39.245
drive.google.com
142.250.185.174
googlehosted.l.googleusercontent.com
142.250.184.193
Click to see the 1 hidden entries
doc-0c-50-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
https://doc-0c-50-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/0kmp839hage8unguv37m9lhvdkbnieei/1632762825000/00519186742208262786/*/1S2e4Rmu8PYtHWrTHvb17Qs1CjaoopuG3?e=download
http://127.0.0.1:HTTP/1.1
http://DynDns.comDynDNS
Click to see the 10 hidden entries
https://sectigo.com/CPS0
http://mail.reyesyasociados.com
https://doc-0c-50-docs.googleusercontent.com/
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
https://drive.google.com/
https://doc-0c-50-docs.googleusercontent.com/om~;
https://support.google.com/chrome/?p=plugin_flash
http://DXdVhu.com
https://f9WVaLZTFfU.com
https://doc-0c-50-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/0kmp839h

Dropped files

Name File Type Hashes Detection
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\1496CAC4-B309-4A8A-ACB7-494664AD3BC9\MpSigStub.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\1496CAC4-B309-4A8A-ACB7-494664AD3BC9\mpasdlta.vdm
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\1496CAC4-B309-4A8A-ACB7-494664AD3BC9\mpavdlta.vdm
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
Click to see the 2 hidden entries
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\MpSigStub.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#