top title background image
flash

YY挂号协议.exe

Status: finished
Submission Time: 2024-06-15 20:02:07 +02:00
Malicious

Comments

Tags

  • exe

Details

  • Analysis ID:
    1457838
  • API (Web) ID:
    1457838
  • Analysis Started:
    2024-06-15 20:02:07 +02:00
  • Analysis Finished:
    2024-06-15 20:06:14 +02:00
  • MD5:
    765cf453d0cea3719b619e4c55881093
  • SHA1:
    060ae0476bbd908d08537c8b6bb24d2ec83d524c
  • SHA256:
    3d76cc27be3265077a5c15f2c76848b73148df035b7d3a3d2b9ad77232587cfd
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 37/74

URLs

Name Detection
http://www.uc.cn/ip
https://hgame.yy.com/person/p_account
https://captcha.yy.com/baidu/submit.do?appid=obj
Click to see the 39 hidden entries
https://yyfkw.cn
http://117.72.34.175:1011/?OrderID=4BA33E0B1BE84295&ipnumber=50
http://120.26.95.191:5658/
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yywebconfigData/giftDatac
http://vip.yy.com/service/web/user/info?_time=
http://vip.yy.com/vip/vcard/indexrest?_time=
http://www.yy.com/sid
https://www.xiequ.cn/index.html?dc1bbee2
http://do-dw.yy.com/user.php?sids=
https://udb.yy.com/authentication.do?action=authenticate&appid=5060&busiUrl=http%3A%2F%2Fwww.yy.com&
https://www.yy.com/gu/
http://www.uc.cn/ipIP:http://
https://nfnba.lanzoub.com/ietaw0udyhid
https://yyfkw.cn999https://nfnba.lanzoub.com/ietaw0udyhid
http://120.26.95.191:5658/http://120.26.95.191:5659/qq17336171577b2cc005c28c42472000e7863283a212&_=h
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yyweb
https://passport.baidu.com/viewlog?ak=
http://channel.yy.com/ajax/member/indexAction
https://bbs.125.la/thread-14738139-1-1.html
https://ysapi.yy.com/api/internal/nobleQuery/QueryUserInfoReq.json?data=
http://hgame.yy.com/action/getUserLoginInfo.jsondata.ownChannels
https://www.yy.com/zone/assets/total.json
http://www.yy.com/search-
http://120.26.95.191:5659/
http://www.openssl.org/V
http://www.yy.com/
http://peipei.yy.com/web/account/internal/account/list
https://www.yy.com/u/
http://bbs.125.la/
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
http://vip.yy.com/service/web/user/info?_time=vipLevel
http://hgame.yy.com/action/getUserLoginInfo.json
https://captcha.yy.com/baidu/submit.do?appid=
https://www.dmdaili.com/yaoqing/33405.html
https://passport.baidu.com/viewlog/getstyle?ak=
https://www.yy.com/zone/userinfo/getUserInfo.json
http://www.openssl.org/support/faq.html
https://hd.vip.yy.com/service/hdplatform/drawgift/202402ee1a8f/giftpagingp?drawGiftGroupId=202402ee1
https://iexui.com/downexui

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\iext1.fnr.bbs.125.la
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#