top title background image
flash

IMAGE_0004.exe

Status: finished
Submission Time: 2021-10-14 07:47:08 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • bat
  • exe

Details

  • Analysis ID:
    502635
  • API (Web) ID:
    870207
  • Analysis Started:
    2021-10-14 07:47:10 +02:00
  • Analysis Finished:
    2021-10-14 07:58:20 +02:00
  • MD5:
    3722d60a637a0c27261a839a04d7d4d2
  • SHA1:
    3933f5a2ea8b486ff8247e30d228e00d17f39e3f
  • SHA256:
    add10727ec98dd291126c26b084300c9c050722305e19ba54e8bd564897da586
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Domains

Name IP Detection
msjfurniturewll.com
131.153.37.2
mail.msjfurniturewll.com
0.0.0.0

URLs

Name Detection
http://MuKFQF.com
http://127.0.0.1:HTTP/1.1
https://api.ipify.org%GETMozilla/5.0
Click to see the 8 hidden entries
http://DynDns.comDynDNS
http://Ta32N99jPM5hmB3Q0v.com1-5-21-3853321935-2125563209-4053062332-1002_Classes
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
https://api.ipify.org%
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://Ta32N99jPM5hmB3Q0v.com
http://mail.msjfurniturewll.com
http://msjfurniturewll.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmp4781.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IMAGE_0004.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jNnIJrO.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\guqslNCu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#