top title background image
flash

Revised Proforma Invoice_New order.exe

Status: finished
Submission Time: 2021-09-28 08:08:54 +02:00
Malicious
Trojan
Evader
AgentTesla

Comments

Tags

  • exe
  • Invoice

Details

  • Analysis ID:
    491993
  • API (Web) ID:
    859530
  • Analysis Started:
    2021-09-28 08:54:45 +02:00
  • Analysis Finished:
    2021-09-28 09:04:03 +02:00
  • MD5:
    3a391e960ff363979a5ac9dc3a95c636
  • SHA1:
    8930a2e630f133dfb78e87e06b4f9ecd882a84e1
  • SHA256:
    8842d55ed240f4ed04d12d227dfd1c65bc20b72bf79fc5e40daf61d9f3f86d47
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 29/68
malicious
Score: 11/45

URLs

Name Detection
http://127.0.0.1:HTTP/1.1
http://DynDns.comDynDNS
http://AAbVfU.com
Click to see the 2 hidden entries
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Revised Proforma Invoice_New order.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Revised Proforma Invoice_New order.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Revised Proforma Invoice_New order.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1vgntrt1.ztt.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ff5nys0k.j11.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jm0jnll4.eqo.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngqwsyfo.kwg.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pvgur2kc.vrh.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zbprfsgr.2ta.psm1
very short file (no magic)
#
C:\Users\user\Documents\20210928\PowerShell_transcript.114127.HB6zZtzF.20210928085543.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210928\PowerShell_transcript.114127.I2K6eNc7.20210928085600.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210928\PowerShell_transcript.114127.syR87O2Z.20210928085551.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#