top title background image
flash

cis-broadband invoice 08.11.22.doc

Status: finished
Submission Time: 2022-08-11 19:52:21 +02:00
Malicious
Exploiter

Comments

Tags

  • doc
  • IcedID

Details

  • Analysis ID:
    682661
  • API (Web) ID:
    1050144
  • Analysis Started:
    2022-08-11 20:09:51 +02:00
  • Analysis Finished:
    2022-08-11 20:32:35 +02:00
  • MD5:
    91ca71d98c0e42e0446e9157fc83e1f2
  • SHA1:
    b8b01ee5940864817c670187dfc1cb9a663c79a8
  • SHA256:
    373856a75b78406d26cfbb41cbbba7041bad1e56a3304ba17376b294bc773eee
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 64
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior
malicious
Score: 64
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Run Condition: Without Instrumentation

Third Party Analysis Engines

malicious
Score: 16/64
malicious
Score: 6/39

IPs

IP Country Detection
45.8.146.139
Russian Federation

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\~DF1CF4A488C21180D9.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83C87933.png
PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FAAE737A.png
PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{10C83EEE-519A-4BAE-9701-FB36EC529A4B}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A4DFC439-0F12-4756-9A4F-0DC4BA4A60ED}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CDB32EEE-51F1-404D-8EA2-3142A158663B}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cis-broadband invoice 08.11.22.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Aug 12 02:11:11 2022, length=2203257, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\Desktop\~$s-broadband invoice 08.11.22.doc
data
#