top title background image
flash

72EED30398363-0983BNDJ0398763536.exe

Status: finished
Submission Time: 2022-05-23 11:35:56 +02:00
Malicious
Trojan
Evader
GuLoader, NanoCore

Comments

Tags

Details

  • Analysis ID:
    632155
  • API (Web) ID:
    999659
  • Analysis Started:
    2022-05-23 11:35:56 +02:00
  • Analysis Finished:
    2022-05-23 11:58:52 +02:00
  • MD5:
    511ad0297cd3e268e8d0c53c1207dc95
  • SHA1:
    aa466a3c5fb1a4c3ae77835fc3d592e8f7a0679b
  • SHA256:
    c527fc06df0bca1fe6ef47ff82e1a858af8b50877d97446c7898e5d1a80146a3
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 96
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

Third Party Analysis Engines

malicious
Score: 7/67

IPs

IP Country Detection
172.217.168.14
United States
172.217.168.33
United States
91.193.75.131
Serbia

Domains

Name IP Detection
drive.google.com
172.217.168.14
googlehosted.l.googleusercontent.com
172.217.168.33
8476.hopto.org
91.193.75.131
Click to see the 1 hidden entries
doc-0c-as-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
http://ocsp.sectigo.com0
https://sectigo.com/CPS0C
https://doc-0c-as-docs.googleusercontent.com/w
Click to see the 10 hidden entries
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
http://www.avast.com0/
https://doc-0c-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/i92dnrd5psv5u8m6hlf298ad6a41tmpe/1653299175000/00136562880816484603/*/1xOEjCOqIA-Yci9ED_I139gMqhvvo_S5Y?e=download
http://nsis.sf.net/NSIS_ErrorError
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
https://doc-0c-as-docs.googleusercontent.com/
https://doc-0c-as-docs.googleusercontent.com/%%doc-0c-as-docs.googleusercontent.com
https://mozilla.org0
https://doc-0c-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/i92dnrd5
https://doc-0c-as-docs.googleusercontent.com/B

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
Non-ISO extended-ASCII text, with NEL line terminators
#
C:\Users\user\AppData\Local\Temp\tmpE4A7.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\lang-1071.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 17 hidden entries
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\system-reboot-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\nsfC5C3.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\network-no-route-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Local\Temp\media-playback-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\mail-reply-all-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\fzshellext_64.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\format-justify-center-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Local\Temp\TREDIVER.Und
data
#
C:\Users\user\AppData\Local\Temp\Sports-Wallpapers-1.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, frames 3
#
C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\MapiProxy.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Airplane_14.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
#
C:\Users\user\AppData\Local\Temp\ARMOURY CRATE Message.VisualElementsManifest.xml
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\ANSVARHAVENDES\rapsende.exe
data
#