top title background image
flash

credit notification pdf.exe

Status: finished
Submission Time: 2021-10-26 08:40:14 +02:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe

Details

  • Analysis ID:
    509207
  • API (Web) ID:
    876774
  • Analysis Started:
    2021-10-26 08:40:16 +02:00
  • Analysis Finished:
    2021-10-26 08:54:45 +02:00
  • MD5:
    69d14fb14deeb4bc08a3c47840d1f6fb
  • SHA1:
    2830362d97678edaa8dc6f28a8c555f690101bed
  • SHA256:
    2719fac0d4d5ff10221753f561d70346516d6226a3868c40a9d4c9282f370aa0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
clean
0/100

Third Party Analysis Engines

malicious
Score: 34/68
malicious
Score: 5/37
malicious
Score: 10/38
malicious

IPs

IP Country Detection
212.192.246.88
Russian Federation
142.250.203.100
United States

Domains

Name IP Detection
arkseven702.ddns.net
212.192.246.88
www.google.com
142.250.203.100

URLs

Name Detection
arkseven702.ddns.net
https://www.google.com
http://ns.ado/1:
Click to see the 11 hidden entries
http://ns.adobe.cobj:
http://ns.adobe.cobj
http://tempuri.org/libraryDataSet.xsd
http://tempuri.org/libraryDataSet1.xsd
http://ns.d
http://ns.adobe.c/g:
http://ns.adobe.c/g
http://google.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://www.google.com/
http://ns.ado/1

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\credit notification pdf.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\info.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Non-ISO extended-ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\a.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\a.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\info.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\info.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#