top title background image
flash

QT_0948765446-NMPMUST-9876563783.exe

Status: finished
Submission Time: 2022-05-17 16:38:16 +02:00
Malicious
Trojan
Evader
GuLoader, NanoCore

Comments

Tags

Details

  • Analysis ID:
    628420
  • API (Web) ID:
    995928
  • Analysis Started:
    2022-05-17 16:39:40 +02:00
  • Analysis Finished:
    2022-05-17 17:03:17 +02:00
  • MD5:
    155a8b146f63fcecc360cc1162974373
  • SHA1:
    7abaf8a0df564b853227fdb8a614e7f8ba3edd15
  • SHA256:
    361deb3d9ef665902441a554d099bd5e43266cd6320ef84facacdee256d325bd
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 88
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

IPs

IP Country Detection
142.250.185.78
United States
216.58.212.129
United States
91.193.75.131
Serbia

Domains

Name IP Detection
drive.google.com
142.250.185.78
googlehosted.l.googleusercontent.com
216.58.212.129
8476.hopto.org
91.193.75.131
Click to see the 1 hidden entries
doc-08-38-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
https://doc-08-38-docs.googleusercontent.com/
https://doc-08-38-docs.googleusercontent.com/g
http://nsis.sf.net/NSIS_ErrorError
Click to see the 3 hidden entries
https://doc-08-38-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/ot0nf77q
https://doc-08-38-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/ot0nf77q6jqiqi74hke0fspqmeou4ksp/1652799000000/00504591766740753318/*/15pFGBWcJey0L1ljJmoCXsS1qG0k_QM5X?e=download
https://drive.google.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
data
#
C:\Users\user\AppData\Local\Temp\tmp1B52.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\mail-attachment-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
Click to see the 14 hidden entries
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\nsq8ECC.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\network-cellular-disabled-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Local\Temp\mail-reply-all-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\mail-forward.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\library.dll
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\libpixbufloader-tiff.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\flugters.GLA
data
#
C:\Users\user\AppData\Local\Temp\document-print-preview-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\applications-engineering.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\Tagselvbordet6\qindarka.exe
data
#
C:\Users\user\AppData\Local\Temp\ArtDeco_green_22.bmp
PNG image data, 110 x 110, 8-bit/color RGB, non-interlaced
#