top title background image
flash

xxTzyGLZx5.exe

Status: finished
Submission Time: 2021-12-07 13:33:43 +01:00
Malicious
Phishing
Trojan
Spyware
Exploiter
Evader
Remcos AgentTesla AveMaria HawkEye MailP

Comments

Tags

  • exe
  • RAT
  • RemcosRAT

Details

  • Analysis ID:
    535501
  • API (Web) ID:
    903025
  • Analysis Started:
    2021-12-07 13:37:38 +01:00
  • Analysis Finished:
    2021-12-07 13:55:42 +01:00
  • MD5:
    d5f570694f0847caea18ccac8837b052
  • SHA1:
    b509737bb61ae0e9dee56ca2706456b3788ce553
  • SHA256:
    ea209f6ba95920038ac83985be8bcffc1fda49631ed3142cfdd9f2acd52584b1
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 20/66
malicious
Score: 6/24
malicious
Score: 34/45
malicious

IPs

IP Country Detection
185.157.161.174
Sweden
104.16.154.36
United States
195.110.124.154
Italy
Click to see the 2 hidden entries
66.29.159.53
United States
81.88.52.165
Italy

Domains

Name IP Detection
whatismyipaddress.com
104.16.154.36
hotmarzz.eu
195.110.124.154
smtp.privateemail.com
66.29.159.53
Click to see the 1 hidden entries
216.47.6.0.in-addr.arpa
0.0.0.0

URLs

Name Detection
https://adservice.google.com/ddm/fls/i/src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9
https://contextual.media.net/checksync.phphttps://contextual.media.net/medianet.php?cid=8CU157172&cr
https://consent.google.com/done8?continue=https://www.google.com/?gws_rd%3Dssl&origin=https://www.go
Click to see the 38 hidden entries
http://stascorp.comDVarFileInfo$
http://nsis.sf.net/NSIS_Error
http://service.real.com/realplayer/security/02062012_player/en/
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
https://www.google.com/intl/en_uk/chrome/
http://www.msn.com/?ocid=iehp
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
http://www.msn.com/de-ch/?ocid=iehp
https://consent.google.com/set?pc=s&uxe=4421591
http://whatismyipaddress.com/
http://hotmarzz.eu/goods/Droppertodownloa.exeW
http://www.nirsoft.net/
https://github.com/syohex/java-simple-mine-sweeperC:
https://hotmarzz.eu/goods/Droppertodownloa.exej
http://hotmarzz.eu/goods/Droppertodownloa.exe
https://support.google.com/p
https://ogs.google.com/widget/callouthttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&
https://support.google.com/chrome/?p=plugin_flash
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094
https://ogs.google.com/widget/callout?prid=19020392&pgid=19020380&puid=93eb0881ae9ec1db&origin=https
https://www.google.com/search?source=hp&ei=djJ0X6TKCL6IjLsPqriogAY&q=chrome&oq=chrome&gs_lcp=CgZwc3k
https://support.google.com/chrome/answer/6258784
https://www.google.com/?gws_rd=ssl
https://www.google.com/search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8k7G9rJDsAhWNTxUIHZZGDCQQ
http://hotmarzz.eu/goods/Droppertodownloa.exem
https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
https://hotmarzz.eu/goods/Droppertodownloa.exe
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
http://hotmarzz.eu/goods/Droppertodownloa.exeOZ
http://www.nirsoft.net
https://support.google.
http://nsis.sf.net/NSIS_ErrorError
https://consent.google.com/?hl=en-GB&origin=https://www.google.com&continue=https://www.google.com/?
https://support.google.com/chrome/?p=plugin_java
https://www.google.com/favicon.ico
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=8072167097284;g

Dropped files

Name File Type Hashes Detection
C:\Program Files\Microsoft DN1\sqlmap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\rem9090sta.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\install.vbs
data
#
Click to see the 52 hidden entries
C:\Users\user\AppData\Local\Temp\bin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Remcos\dwn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Remcos\remcos.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Windows Update.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\4.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\21.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Droppertodownloa[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\5.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\LoginData
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files.zip~RF421d9e0.TMP (copy)
Zip archive data (empty)
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\LSBIHQFDVT.pdf
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\SFPUSAFIOL.pdf
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\SFPUSAFIOL.xlsx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\SQRKHNBNYN.docx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\SQRKHNBNYN.pdf
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\Documents\20211207\PowerShell_transcript.405464.W_BMIIUL.20211207133845.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\UOOJJOZIRH.xlsx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\VAMYDFPUND.docx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\VAMYDFPUND.xlsx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files\ZTGJILHXQB.docx
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\SQLite3_StdCall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Program Files\Microsoft DN1\rdpwrap.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\WebData
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\w.BmxDA.tmp
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\jmtceghqeepjeivm
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft Vision\07-12-2021_13.38.52
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\5.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\84a79tbwxmvn7adt
data
#
C:\Users\user\AppData\Local\Temp\8tps30shve
data
#
C:\Users\user\AppData\Local\Temp\KGa06088
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\SysInfo.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enwkj00w.kq1.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wrn55b2l.mfa.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\bhv9034.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x13ce402f, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\c1cbn8ydb22
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Files.zip
Zip archive data (empty)
#
C:\Users\user\AppData\Local\Temp\nsaAFFF.tmp\rgsbzeog.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nslA5A0.tmp\rgsbzeog.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nst9F76.tmp\orwglwkinzb.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsuAEE7.tmp\kqkz.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nszE2AE.tmp\sozz.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmpG77.tmp (copy)
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\wfkc2ng2j1zi47wu
data
#
C:\Users\user\AppData\Roaming\Fhg.xgx.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\BURPLQ1DAW.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\CookiesChrome.txt
ASCII text, with very long lines, with CRLF line terminators
#