top title background image
flash

4t4y4r89UZ.exe

Status: finished
Submission Time: 2021-11-11 01:56:08 +01:00
Malicious
Ransomware
Trojan
Evader
Metasploit

Comments

Tags

  • 32
  • exe
  • trojan

Details

  • Analysis ID:
    519673
  • API (Web) ID:
    887200
  • Analysis Started:
    2021-11-11 01:56:09 +01:00
  • Analysis Finished:
    2021-11-11 02:11:54 +01:00
  • MD5:
    14c0d8425930ccec0566b04864a05670
  • SHA1:
    07fd6746417c89239e8b4b272fa350c5dc41c580
  • SHA256:
    fea538eff5bc9cd3970edda4b3ddfa0e72505b01dc207e47d8112074720fa05e
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
clean
0/100

Third Party Analysis Engines

malicious
Score: 22/66
malicious
Score: 16/35
malicious
Score: 22/28
malicious
malicious

IPs

IP Country Detection
172.67.139.144
United States
104.21.34.203
United States
104.21.79.9
United States
Click to see the 2 hidden entries
172.67.207.136
United States
172.67.196.11
United States

Domains

Name IP Detection
runmodes.com
104.21.34.203
gohnot.com
172.67.196.11
server8.trumops.com
104.21.79.9
Click to see the 4 hidden entries
trumops.com
0.0.0.0
f7873597-7b36-4441-9416-097456f134ae.uuid.trumops.com
0.0.0.0
logs.trumops.com
0.0.0.0
e0a50c60a85bfbb9ecf45bff0239aaa3.hash.trumops.com
0.0.0.0

URLs

Name Detection
http://newscommer.com/app/app.exe
https://runmodes.com/api/log
https://logs.trumops.comhttps://runmodes.com/api/loghttps://server8.trumops.comC:
Click to see the 90 hidden entries
https://dev.virtualearth.net/REST/v1/Locations
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
http://www.bloglines.com)F
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
http://archive.org/details/archive.org_bot)Mozilla/5.0
http://https://_bad_pdb_file.pdb
http://gohnot.com/61c75dbee3f325b4d87cddaf5bae3393
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://server8.trumops.com/api/poll
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dynamic.t
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://%s.xboxlive.com
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://activity.windows.comr
http://www.google.com/bot.html)Mozilla/5.0
http://yandex.com/bots)Opera/9.51
http://www.baidu.com/search/spider.htm)MobileSafari/600.1.4
http://www.archive.org/details/archive.org_bot)Opera/9.80
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
https://trumops.com/api/install-failureinvalid
https://server8.trumops.com/api/pollf
http://www.avantbrowser.com)MOT-V9mm/00.62
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
https://%s.dnet.xboxlive.com
https://dev.ditu.live.com/REST/v1/Locations
http://www.google.com/adsbot.html)Encountered
http://www.alexa.com/help/webmasters;
https://activity.windows.com
http://search.msn.com/msnbot.htm)pkcs7:
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://server8.trumops.com/api/cdn?c=3e3f6b9a36a75d40&uuid=f7873597-7b36-4441-9416-097456f134ae
https://server8.trumops.com/bots/post-ia-data?uuid=f7873597-7b36-4441-9416-097456f134ae
http://misc.yahoo.com.cn/he
https://sitescore.aiValue
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
http://yandex.com/bots)Opera/9.80
http://www.baidu.com/search/spide
https://blockchain.infoindex
http://crl.g
https://server8.trumops.comc=3e3f6b9a36a75d40&uuid=server8.trumops.com:443server8.trumops.com:443tcp
https://dev.virtualearth.net/REST/v1/Routes/Transit
http://www.google.com/feedfetcher.html)HKLM
https://dev.virtualearth.net/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://dev.ditu.live.com/mapcontrol/logging.ashx
http://help.ya
https://trumops.comif-unmodified-sinceillegal
https://retoti.com
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://trumops.comhttps://retoti.comServiceVersionServersVersionDistributorIDCampaignIDOSCaptionMic
http://www.spidersoft.com)Wget/1.9
http://www.google.com/bot.html)tls:
https://logs.trumops.com
http://devlog.gregarius.net/docs/ua)Links
http://gais.cs.ccu.edu.tw/robot.php)Gulper
https://trumops.comhttps://retoti.comhttps://trumops.comhttps://retoti.comS-1-5-21-3853321935-212556
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://raw.githubusercontent.com/spesmilo/electrum/master/electrum/servers.jsontls:
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://dev.ditu.live.com/REST/v1/Routes/
https://trumops.comhttps://retoti.comhttps://trumops.comhttps://retoti.comFirstInstallDateFirstInsta
http://search.msn.com/msnb
http://www.bingmapsportal.comsv
https://retoti.comidentifier
http://search.msn.com/msnbot.htm)msnbot/1.1
https://server8.trumops.comserver8.trumops.com:443server8.trumops.com:443tcpserver8.trumops.comws2_3
https://trumops.comhttps://retoti.com
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
http://search.msn.com/msnbot.htm)net/http:
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
http://www.googlebot.com/bot.html)Links
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
http://www.exabot.com/go/robot)Opera/9.80
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
http://builtwith.com/biup)
https://trumops.com
https://server8.trumops.com
https://turnitin.com/robot/crawlerinfo.html)gentraceback
http://www.everyfeed.c
http://grub.org)Mozilla/5.0
https://server8.trumops.comserver8.trumops.com:443server8.trumops.com:443tcpserver8.trumops.com
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://trumops.comServiceVersionServiceVersionServersVersionServersVersionDistributorIDCampaignIDOS
http://gohnot.com/61c75dbee3f325b4d87cddaf5bae3393/watchdog.exe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\csrss\injector\injector.exe
PE32+ executable (console) x86-64, for MS Windows
#
C:\Windows\rss\csrss.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 1 hidden entries
C:\Windows\windefender.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
#