top title background image
flash

Eset32.exe

Status: finished
Submission Time: 2022-03-24 22:08:23 +01:00
Malicious
Trojan
Evader
Miner
Xmrig

Comments

Tags

  • exe

Details

  • Analysis ID:
    596584
  • API (Web) ID:
    964106
  • Analysis Started:
    2022-03-24 22:08:24 +01:00
  • Analysis Finished:
    2022-03-24 22:23:43 +01:00
  • MD5:
    b405bf6533c047b1a47ceced3b42c23b
  • SHA1:
    bbb321d380c3f9d17e49a9f2167234742e292e4d
  • SHA256:
    5b35297b640271fea6e846f28d07852589f60ab88ee597c0e2eea68a5de3bec9
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 43/68
malicious
Score: 5/35
malicious
Score: 19/26
malicious

IPs

IP Country Detection
208.95.112.1
United States

Domains

Name IP Detection
ip-api.com
208.95.112.1

URLs

Name Detection
http://www.jsonrpc.org/
https://github.com/openwall/john/issues/3454#issuecomment-436899959
http://crl.mi
Click to see the 32 hidden entries
http://ip-api.com4
http://nsis.sf.net/NSIS_Error
http://schemas.xmlsoap.org/wsdl/
https://contoso.com/
https://nuget.org/nuget.exe
http://ip-api.com
https://github.com/Pester/Pester
http://www.codeplex.com/DotNetZip
http://crl.entrust.net/ts1ca.crl0
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.entrust.net/rpa0
http://crl.entrust.net/2048ca.crl0
http://ip-api.com/line/?fields=hosting
http://crl.micros
http://www.gnu.org/licenses/
http://www.entrust.net/rpa03
https://sectigo.com/CPS0
http://ocsp.sectigo.com0
http://pesterbdd.com/images/Pester.png
http://schemas.xmlsoap.org/soap/encoding/
http://ocsp.entrust.net03
http://www.apache.org/licenses/LICENSE-2.0.html
http://ocsp.entrust.net02
https://go.micro
http://nuget.org/NuGet.exe
https://contoso.com/License
https://contoso.com/Icon
http://aia.entrust.net/ts1-chain256.cer01
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
https://pidgin.im0
http://nsis.sf.net/NSIS_ErrorError
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Windows\Telemetry\sihost64.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Windows\System.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\12.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
Click to see the 20 hidden entries
C:\Users\user\AppData\Roaming\1.exe
PE32 executable (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdo0e3x0.t1b.psm1
very short file (no magic)
#
C:\Users\user\Documents\20220324\PowerShell_transcript.841618.sZdefLPX.20220324220950.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220324\PowerShell_transcript.841618.LAWMVj_f.20220324221018.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220324\PowerShell_transcript.841618.C+N4AHXZ.20220324221113.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220324\PowerShell_transcript.841618.3pgwcPiq.20220324221049.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220324\PowerShell_transcript.841618.0_G0nLw0.20220324221054.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_st3h5wvp.0v4.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sb0bhm4m.q4d.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\12.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oy5qikcs.t2u.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mcrj51io.qjc.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gq1rjo0b.xw4.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aimqagfl.k3o.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44p5rcer.s4n.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ylat3fg.wsq.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0yow3mvu.tj4.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System.exe.log
ASCII text, with CRLF line terminators
#