top title background image
flash

YfTokH7RIj.exe

Status: finished
Submission Time: 2021-12-28 18:12:15 +01:00
Malicious
Trojan
Spyware
Evader
Miner
BitCoin Miner RedLine

Comments

Tags

  • 32
  • exe
  • trojan

Details

  • Analysis ID:
    545999
  • API (Web) ID:
    913521
  • Analysis Started:
    2021-12-28 18:12:16 +01:00
  • Analysis Finished:
    2021-12-28 18:25:50 +01:00
  • MD5:
    1b8bf38e83c31c76c7dd00088ac0922d
  • SHA1:
    1bc87682b1518b398ee7eacc4c8e4370b18d359e
  • SHA256:
    25cd127b9d559d6754269ecc116d35be66aca027640bcd71a836567c32b946c5
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 40/67
malicious
Score: 11/35
malicious
Score: 21/28
malicious

IPs

IP Country Detection
185.82.202.246
Netherlands
162.159.129.233
United States

Domains

Name IP Detection
yabynennet.xyz
185.82.202.246
cdn.discordapp.com
162.159.129.233
api.ip.sb
0.0.0.0

URLs

Name Detection
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
http://tempuri.org/Entity/Id11
http://tempuri.org/Entity/Id10
Click to see the 97 hidden entries
http://schemas.xmlsoap.org/ws/2004/04/trust
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
http://forms.rea
https://support.google.com/chrome/?p=plugin_shockwave
http://schemas.xmlsoap.org/ws/2004/08/addressing
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
http://tempuri.org/Entity/Id12
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
http://go.mic
http://tempuri.org/Entity/Id1Response
http://tempuri.org/Entity/Id24Response
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
http://tempuri.org/Entity/Id24
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
http://tempuri.org/Entity/Id23
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
http://tempuri.org/Entity/Id22
http://tempuri.org/Entity/Id19
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
https://support.google.com/chrome/answer/6258784
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
https://support.google.com/chrome/?p=plugin_wmp
http://tempuri.org/Entity/Id8Response
https://cdn.discordapp.com/attachments/917178535238586432/922560115226312704/StopScam.vmp.exe
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
http://tempuri.org/Entity/Id10Response
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
http://tempuri.org/Entity/Id21
http://tempuri.org/Entity/Id5Response
http://tempuri.org/Entity/Id18
http://tempuri.org/Entity/Id17
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
http://tempuri.org/Entity/Id16
http://tempuri.org/Entity/Id15
http://tempuri.org/Entity/Id14
http://tempuri.org/Entity/Id13
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
http://tempuri.org/Entity/Id16Response
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
http://tempuri.org/Entity/Id19Response
https://support.google.com/chrome/?p=plugin_real
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
http://tempuri.org/Entity/Id6
http://tempuri.org/Entity/Id7
http://tempuri.org/Entity/Id4
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
http://tempuri.org/Entity/Id5
http://tempuri.org/Entity/Id8
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
http://tempuri.org/Entity/Id9
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
http://tempuri.org/Entity/Id21Response
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
http://tempuri.org/Entity/Id2Response
http://tempuri.org/
http://tempuri.org/Entity/Id12Response
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
https://duckduckgo.com/ac/?q=
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
http://service.r
https://duckduckgo.com/chrome_newtab
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
http://tempuri.org/Entity/Id20
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://tempuri.org/Entity/Id9Response
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
http://schemas.xmlsoap.org/ws/2004/04/sc
https://support.google.com/chrome/?p=plugin_quicktime
http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
https://api.ip.sb/ip
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
http://tempuri.org/Entity/Id6Response
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
http://support.a
http://forms.real.com/real/realone/download.html?type=rpsp_us
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://tempuri.org/Entity/Id15Response
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
http://schemas.xmlsoap.org/ws/2004/10/wsat
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
https://support.google.com/chrome/?p=plugin_pdf
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
http://www.interoperabilitybridges.com/wmp-extension-for-chrome

Dropped files

Name File Type Hashes Detection
C:\Windows\System32\services32.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YfTokH7RIj.exe.log
ASCII text, with CRLF line terminators
#
C:\Windows\System32\Microsoft\Telemetry\sihost32.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
Click to see the 22 hidden entries
C:\Users\user\AppData\Local\Temp\fl.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tyggyavs.qlc.ps1
very short file (no magic)
#
C:\Users\user\Documents\20211228\PowerShell_transcript.376483.ocrmpR+3.20211228181423.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20211228\PowerShell_transcript.376483.le9Tu1FR.20211228181425.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20211228\PowerShell_transcript.376483.hFAsNzsv.20211228181436.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20211228\PowerShell_transcript.376483.KBDYqCXn.20211228181352.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20211228\PowerShell_transcript.376483.Hr_crS3R.20211228181400.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20211228\PowerShell_transcript.376483.DXsl59n5.20211228181418.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z1wx4p30.mk0.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysspdktq.d5o.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uyq1fusj.sme.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fl.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ri3urkro.nvo.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qsuhercb.yt1.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pj1w0owe.2sc.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j5e5r3m1.ck0.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlrldjfa.c0k.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fwfedu5d.5cu.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dyw4scav.ll0.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5rishn0w.102.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services32.exe.log
ASCII text, with CRLF line terminators
#