top title background image
flash

7AYsP32Q7Y.exe

Status: finished
Submission Time: 2022-01-28 11:06:31 +01:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • 32
  • exe
  • Formbook
  • trojan

Details

  • Analysis ID:
    562059
  • API (Web) ID:
    929580
  • Analysis Started:
    2022-01-28 11:09:41 +01:00
  • Analysis Finished:
    2022-01-28 11:24:55 +01:00
  • MD5:
    6ae185ce909f0b66306100824c28bad1
  • SHA1:
    5f23a2d4b2c564c95606e537e557aa8251087746
  • SHA256:
    074991cefc03a7683cb3c81e83c383010f45c130fdc6dafa13469bfffaf87867
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 14/67

Domains

Name IP Detection
www.graffity-aws.com
0.0.0.0
onedrive.live.com
0.0.0.0
vru2ia.am.files.1drv.com
0.0.0.0

URLs

Name Detection
www.fyonkaly.com/ahc8/
https://vru2ia.am.files.1drv.com/y4m423aJ2r6bprjijqR9Zhv79BsqXWchgBZ_yRRKAukc5TAIPNB4BdYAYidrCTJ4BkE
https://vru2ia.am.files.1drv.com/y4mqmZSB7T13rwuDyCkOltxUalsuuekof9Mak2JfMqUquSjRzSFu0dx_u0qHh2VQFIg
Click to see the 13 hidden entries
https://onedrive.live.com/download?cid=C38D15779
https://vru2ia.am.files.1drv.com/y4m8TXF6mlgGvccZFUvhwUh-l9zz_V1hgmOQiTI_douTr2wu7UlvtGbODDxtwhN0e5H
https://vru2ia.am.files.1drv.com/y
https://vru2ia.am.files.1drv.com/y4mC-JI5vs5pbHFPeZ5KI8vSY-Zm0BYG_DfYRphHWKBbqd0ouSRcXTjDbP2g5pIoI5u
https://onedrive.live.com/ve.live.com/
https://onedrive.live.com/D
https://vru2ia.am.files.1drv.com/y4m4qzuMb9gIarzlKBTf0D1umDohf9Y3sIpL-K8zvk8UHM6XBD2Ajct4M-j4Gm20nJT
https://vru2ia.am.files.1drv.com/y4mXdCXgV78z93QBfcFjKJ0ucHs8CARh8saaIpZ0Zw4IJExL4V9d7aCID-8TYoLJ0Qx
https://onedrive.live.com/download?cid=C38D15779AFD1231&resid=C38D15779AFD1231%21112&authkey=AJglnSs
https://vru2ia.am.files.1drv.com/
https://onedrive.live.com/
https://onedrive.live.com/ownload?cid=C38D15779AFD1231&resid=C38D15779AFD1231%21112&authkey=AJglnSs0
https://vru2ia.am.files.1drv.com/J

Dropped files

Name File Type Hashes Detection
C:\Users\user\Contacts\Iodqgrdelf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Contacts\Iodqgrdelf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\Iodqgrdelfemgrjgzrzpbewqyzpzqin[1]
data
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\Iodqgrdelfemgrjgzrzpbewqyzpzqin[1]
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\Iodqgrdelfemgrjgzrzpbewqyzpzqin[1]
data
#
C:\Users\user\Contacts\fledrgqdoI.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Contacts\\Iodqgrdelf.exe">), ASCII text, with CRLF line terminators
#