top title background image
flash

dodsonimaging,file,08.11.2022.doc

Status: finished
Submission Time: 2022-08-11 17:16:10 +02:00
Malicious
Trojan
Exploiter
Evader
IcedID

Comments

Tags

  • doc
  • IcedID

Details

  • Analysis ID:
    682555
  • API (Web) ID:
    1050035
  • Analysis Started:
    2022-08-11 17:26:52 +02:00
  • Analysis Finished:
    2022-08-11 17:34:34 +02:00
  • MD5:
    db11828aed458eccfab30c367bc1bb2f
  • SHA1:
    3487931f130485c82d21e9ef4155af0a8fd46c33
  • SHA256:
    d297f78ca4fc35e899792260c98f752947f7d6b5999650a6210f4a8538a2e655
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 17/65
malicious

IPs

IP Country Detection
64.227.108.27
United States
45.8.146.139
Russian Federation

Domains

Name IP Detection
alexbionka.com
64.227.108.27

URLs

Name Detection
alexbionka.com
http://alexbionka.com/
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rma
Click to see the 9 hidden entries
http://45.8.146
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm&
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm516F-U91Z1DJNJ2U9D-823/rm3/rm3/rm
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmli
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmT&
http://45.8.146.139/fhfty/O-M--V4GO651
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmj
http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmv&

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Local\Temp\~DF4786325F45128C5F.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5C2DDEE.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9B901917.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{4D32FA97-2F49-4AD6-98C8-F0676ED8CFE3}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4221A912-2B82-4834-A4D3-95CF1F77F776}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{732CEB61-1F3E-4038-9230-0F099F2E5FCD}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\dodsonimaging,file,08.11.2022.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:56 2022, mtime=Tue Mar 8 15:45:56 2022, atime=Thu Aug 11 23:27:16 2022, length=2203466, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\Desktop\~$dsonimaging,file,08.11.2022.doc
data
#