=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

PI PDF.exe

Status: finished
Submission Time: 2022-05-14 12:25:08 +02:00
Malicious
Trojan
Adware
Spyware
Evader
AgentTesla

Comments

Tags

  • agenttesla
  • exe

Details

  • Analysis ID:
    626548
  • API (Web) ID:
    994052
  • Analysis Started:
    2022-05-14 12:25:09 +02:00
  • Analysis Finished:
    2022-05-14 12:39:09 +02:00
  • MD5:
    530c898ee065629d77b0b12781991d4f
  • SHA1:
    316f4b32bdcaca1902a7e9898a31f3fae42ebe30
  • SHA256:
    56e4da2be0de5210fa5f78b35aed78dc18145164b03c396d85098368aae825a5
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
24/68

malicious
15/26

IPs

IP Country Detection
198.54.126.161
United States

Domains

Name IP Detection
webmail.ocenmasters.com
198.54.126.161

URLs

Name Detection
http://www.fontbureau.comessedg
http://127.0.0.1:HTTP/1.1
http://www.fontbureau.com/designersG
Click to see the 63 hidden entries
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/x
http://www.fonts.comFB
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.tiro.com
http://www.fontbureau.com/designers
http://www.fontbureau.comessed
http://www.goodfont.co.kr
http://www.tiro.comnf
http://www.tiro.comB
http://www.sajatypeworks.com
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.fontbureau.comgrita
http://www.fontbureau.comgreta
http://www.fontbureau.comcom
http://www.founder.com.cn/cnr
https://RHjTIBqqVW.com
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
http://www.galapagosdesign.com/DPlease
http://www.fontbureau.comalsvP
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.urwpp.de
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.sakkal.com
http://webmail.ocenmasters.com
http://www.fonts.comtaT
http://www.fonts.comWu
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.fontbureau.comF
http://www.fontbureau.comce9
http://www.agfamonotype.
http://www.carterandcone.comZ
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
http://www.tiro.comcomE
http://www.fontbureau.comdn
http://www.tiro.comtn
http://www.fontbureau.comd
http://www.fonts.comX
http://en.w
http://www.carterandcone.coml
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn
http://www.founder.com.cn/cn0
http://www.fontbureau.com/designers/frere-jones.html
http://www.sajatypeworks.comint
http://www.fontbureau.com/designers/cabarga.html
http://www.jiyu-kobo.co.jp/
http://www.fontbureau.com/designers8
http://www.fontbureau.comu
http://www.sajatypeworks.com#
http://www.founder.com.cn/cnk-s
http://KCCXXE.com
http://www.sajatypeworks.com(
http://www.fontbureau.comsief
http://www.founder.com.cn/cn#

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI PDF.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp3224.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\bwjRNo\bwjRNo.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Roaming\bwjRNo\bwjRNo.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\jAZPdPbNZIxFH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bwjRNo.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmpC00D.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\xkhii1zz.ywa\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\zktusgco.ufg\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#