top title background image
flash

Bg6DyC7lDh.dll

Status: finished
Submission Time: 2022-01-28 22:10:25 +01:00
Malicious
Trojan
Evader
Emotet

Comments

Tags

  • 32
  • dll
  • exe
  • trojan

Details

  • Analysis ID:
    562461
  • API (Web) ID:
    929979
  • Analysis Started:
    2022-01-28 22:20:13 +01:00
  • Analysis Finished:
    2022-01-28 22:35:46 +01:00
  • MD5:
    3fa1bec287b995a7f96dc3866eff577d
  • SHA1:
    c721507f4a11e090f107d071a99aaeffbdc0ea43
  • SHA256:
    f7a5f6bc0833474da5450e33786893ac7b996ba5e91ed0f7d3243dc4d7db5486
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 10/68

IPs

IP Country Detection
54.38.242.185
France
37.59.209.141
France
78.46.73.125
Germany
Click to see the 30 hidden entries
210.57.209.142
Indonesia
185.148.168.220
Germany
54.37.228.122
France
185.168.130.138
Ukraine
190.90.233.66
Colombia
142.4.219.173
Canada
116.124.128.206
Korea Republic of
195.154.146.35
France
195.77.239.39
Spain
78.47.204.80
Germany
118.98.72.86
Indonesia
37.44.244.177
Germany
62.171.178.147
United Kingdom
128.199.192.135
United Kingdom
207.148.81.119
United States
159.69.237.188
Germany
203.153.216.46
Indonesia
217.182.143.207
France
139.196.72.155
China
66.42.57.149
United States
185.148.168.15
Germany
168.197.250.14
Argentina
191.252.103.16
Brazil
85.214.67.203
Germany
103.41.204.169
Indonesia
74.207.230.120
United States
59.148.253.194
Hong Kong
194.9.172.107
unknown
198.199.98.78
United States
104.131.62.48
United States

URLs

Name Detection
https://disneyplus.com/legal.
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://dev.ditu.live.com/mapcontrol/logging.ashx
Click to see the 40 hidden entries
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
https://www.disneyplus.com/legal/privacy-policy
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://dynamic.t
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://activity.windows.com
http://www.bingmapsportal.com
https://dev.ditu.live.com/REST/v1/Locations
http://help.disneyplus.com.
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://%s.dnet.xboxlive.com
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
https://www.disneyplus.com/legal/your-california-privacy-rights
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://dev.ditu.live.com/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://dev.ditu.live.com/REST/v1/Transit/Stops/
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.virtualearth.net/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
https://dev.virtualearth.net/REST/v1/Routes/Walking
http://crl.ver)
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
https://www.tiktok.com/legal/report/feedback
https://activity.windows.comr
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://%s.xboxlive.com
https://dev.virtualearth.net/REST/v1/Locations

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0f7c94ec, page size 16384, Windows version 10.0
#
Click to see the 6 hidden entries
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61414 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220129_062134_900.etl
data
#