top title background image
flash

HkObDPju6Z.exe

Status: finished
Submission Time: 2023-06-12 21:16:06 +02:00
Malicious
Ransomware
Spreader
Evader
Spyware
BlackBasta

Comments

Tags

  • exe

Details

  • Analysis ID:
    886219
  • API (Web) ID:
    1253199
  • Original Filename:
    723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe
  • Analysis Started:
    2023-06-12 21:16:06 +02:00
  • Analysis Finished:
    2023-06-12 21:53:40 +02:00
  • MD5:
    6441d7260944bcedc5958c5c8a05d16d
  • SHA1:
    46257982840493eca90e051ff1749e7040895584
  • SHA256:
    723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 88
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301

Third Party Analysis Engines

malicious
Score: 44/69
malicious
Score: 22/37
malicious

URLs

Name Detection
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
https://www.rizonesoft.com
https://www.torproject.org/
Click to see the 3 hidden entries
http://office.micro
https://www.flos-freeware.chopenmailto:florian.balmer
https://www.flos-freeware.ch

Dropped files

Name File Type Hashes Detection
C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe
data
#
C:\MSOCache\All Users\{90160000-00E2-0409-0000-0000000FF1CE}-C\OSMUXMUI.cab
data
#
C:\MSOCache\All Users\{90160000-00E2-0409-0000-0000000FF1CE}-C\OSMUXMUI.cab.7878kr5jx (copy)
data
#
Click to see the 47 hidden entries
C:\MSOCache\All Users\{90160000-0115-0409-0000-0000000FF1CE}-C\OfficeLR.cab
data
#
C:\MSOCache\All Users\{90160000-0115-0409-0000-0000000FF1CE}-C\OfficeLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0116-0409-1000-0000000FF1CE}-C\OWOW64LR.cab
data
#
C:\MSOCache\All Users\{90160000-0116-0409-1000-0000000FF1CE}-C\OWOW64LR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-012B-0409-0000-0000000FF1CE}-C\LyncMUI.cab
data
#
C:\MSOCache\All Users\{90160000-012B-0409-0000-0000000FF1CE}-C\LyncMUI.cab.7878kr5jx (copy)
data
#
C:\Program Files (x86)\AutoIt3\Au3Check.exe
data
#
C:\Program Files (x86)\AutoIt3\Au3Info.exe
data
#
C:\Program Files (x86)\AutoIt3\Au3Info_x64.exe
data
#
C:\Program Files (x86)\AutoIt3\AutoIt.chm
data
#
C:\MSOCache\All Users\{90160000-00BA-0409-0000-0000000FF1CE}-C\GrooveLR.cab.7878kr5jx (copy)
data
#
C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe
OpenPGP Secret Key
#
C:\Program Files (x86)\AutoIt3\Uninstall.exe
COM executable for DOS
#
C:\Program Files (x86)\autoit3\AutoIt.chm.7878kr5jx (copy)
data
#
C:\Program Files\Google\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\MSBuild\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\Microsoft Office\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\Reference Assemblies\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\Windows Defender Advanced Threat Protection\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\Windows Defender\Offline\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\Windows Media Player\en-US\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\Program Files\internet explorer\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\MSOCache\All Users\{90160000-001A-0409-0000-0000000FF1CE}-C\OutlkLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab
data
#
C:\MSOCache\All Users\{90160000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab
data
#
C:\MSOCache\All Users\{90160000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0016-0409-0000-0000000FF1CE}-C\ExcelLR.cab
data
#
C:\MSOCache\All Users\{90160000-0016-0409-0000-0000000FF1CE}-C\ExcelLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0018-0409-0000-0000000FF1CE}-C\PptLR.cab
data
#
C:\MSOCache\All Users\{90160000-0018-0409-0000-0000000FF1CE}-C\PptLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0019-0409-0000-0000000FF1CE}-C\PubLR.cab
data
#
C:\MSOCache\All Users\{90160000-0019-0409-0000-0000000FF1CE}-C\PubLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-001A-0409-0000-0000000FF1CE}-C\OutlkLR.cab
data
#
C:\MSOCache\All Users\{90160000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab
data
#
C:\MSOCache\All Users\{90160000-001B-0409-0000-0000000FF1CE}-C\WordLR.cab
data
#
C:\MSOCache\All Users\{90160000-001B-0409-0000-0000000FF1CE}-C\WordLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-001B-0409-0000-0000000FF1CE}-C\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\MSOCache\All Users\{90160000-002C-0409-0000-0000000FF1CE}-C\instructions_read_me.txt
ASCII text, with CRLF line terminators
#
C:\MSOCache\All Users\{90160000-0044-0409-0000-0000000FF1CE}-C\InfLR.cab
data
#
C:\MSOCache\All Users\{90160000-0044-0409-0000-0000000FF1CE}-C\InfLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-0090-0409-0000-0000000FF1CE}-C\DCFMUI.cab
data
#
C:\MSOCache\All Users\{90160000-0090-0409-0000-0000000FF1CE}-C\DCFMUI.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-00A1-0409-0000-0000000FF1CE}-C\OnoteLR.cab
data
#
C:\MSOCache\All Users\{90160000-00A1-0409-0000-0000000FF1CE}-C\OnoteLR.cab.7878kr5jx (copy)
data
#
C:\MSOCache\All Users\{90160000-00BA-0409-0000-0000000FF1CE}-C\GrooveLR.cab
data
#