top title background image
flash

SecuriteInfo.com.Variant.Tedy.122593.7296.exe

Status: finished
Submission Time: 2022-05-21 01:49:05 +02:00
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

  • exe

Details

  • Analysis ID:
    631411
  • API (Web) ID:
    998915
  • Analysis Started:
    2022-05-21 01:49:06 +02:00
  • Analysis Finished:
    2022-05-21 02:04:50 +02:00
  • MD5:
    a3f9db216c595bbb5081ad0430248975
  • SHA1:
    e06a7da7340e4e27d9737e58554ab4419116a0e2
  • SHA256:
    647c540fe4c9f3dc5a06c978ff0644905b07a53517e637f674a089f866a135d0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 18/65
malicious
Score: 12/40

IPs

IP Country Detection
185.220.69.56
Romania

Domains

Name IP Detection
nwme22.duckdns.org
185.220.69.56

URLs

Name Detection
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://dev.ditu.live.com/mapcontrol/logging.ashx
Click to see the 36 hidden entries
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://dynamic.t
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://activity.windows.com
http://www.bingmapsportal.com
https://dev.ditu.live.com/REST/v1/Locations
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://%s.dnet.xboxlive.com
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://dev.ditu.live.com/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://dev.ditu.live.com/REST/v1/Transit/Stops/
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.virtualearth.net/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
https://activity.windows.comr
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://%s.xboxlive.com
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Tedy.122593.7296.exe.log
ASCII text, with CRLF line terminators
#
C:\Windows\Temp\y5zio4ie.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
#
C:\Windows\Temp\jcxc0kzm.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
#
Click to see the 15 hidden entries
C:\Windows\Temp\hhhnf0tr.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
#
C:\Windows\Temp\axo2mpum.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Program Files\Common Files\system\9f3df393cbbd19b\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_su5hum5r.0ed.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uaqixle3.05n.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wscg0fwl.uj4.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmo5ir42.5nw.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n50ivrfk.ipd.psm1
very short file (no magic)
#
C:\Users\user\Documents\20220521\PowerShell_transcript.932923.6StRbMiQ.20220521015018.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220521\PowerShell_transcript.932923.Pdw7Jo_f.20220521015022.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220521\PowerShell_transcript.932923.wWn7rszs.20220521015019.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_imah35ms.0df.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
#