=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

WWVN_INVOICE_8363567453.lzh

Status: finished
Submission Time: 2022-05-10 14:00:43 +02:00
Malicious
Trojan
Evader
GuLoader

Comments

Tags

Details

  • Analysis ID:
    623395
  • API (Web) ID:
    990904
  • Analysis Started:
    2022-05-10 14:00:44 +02:00
  • Analysis Finished:
    2022-05-10 14:09:06 +02:00
  • MD5:
    1492683d46a38dc3af26589b486d55ab
  • SHA1:
    d7dd2f48e26ca1683643f5671d5a5b7a26da73e0
  • SHA256:
    8e55ce0d37045fc2d93dde800ae6fea90c6c71d29c5b28837a61d749d5a7810f
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
84/100

malicious
15/58

URLs

Name Detection
http://barsam.com.au/bin_FCWtLoO90.bin
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://go.micro

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Hetero3.dat
data
#
C:\Users\user\AppData\Local\Temp\RES571F.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kg2wzxat.uwa.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vkspfn2f.hc4.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\jgrsfdcl.bp3\WWVN_INVOICE_8363567453.vbs
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tpled5lu.bpn\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\xd0x2kfy\CSC444B4F613D554F189420B3812D9BACB.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\xd0x2kfy\xd0x2kfy.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\xd0x2kfy\xd0x2kfy.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\xd0x2kfy\xd0x2kfy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\xd0x2kfy\xd0x2kfy.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#