top title background image
flash

fHER4lglqY.docx

Status: finished
Submission Time: 2022-08-18 03:07:11 +02:00
Malicious
Exploiter
Evader
Follina CVE-2022-30190

Comments

Tags

Details

  • Analysis ID:
    685991
  • API (Web) ID:
    1053465
  • Analysis Started:
    2022-08-18 03:25:22 +02:00
  • Analysis Finished:
    2022-08-18 03:30:49 +02:00
  • MD5:
    6878265f91c6cb31618ad8ff45891f60
  • SHA1:
    178c99c6b3ad6e1e835b2325b0d9a023d61d6d64
  • SHA256:
    2f75f6ee9ba9ef599dff95249a32312bb457ea34d5e25dec338b803c312221a0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 15/60
malicious
Score: 8/35
malicious
Score: 20/41
malicious
malicious

IPs

IP Country Detection
178.21.112.152
Netherlands

Domains

Name IP Detection
2hell.nl
178.21.112.152

URLs

Name Detection
https://2hell.nl/follina/poc.html
https://2hell.nl/follina/poc.htmlyX

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\poc[1].htm
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3BF80B4F.htm
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4D314135.htm
HTML document, ASCII text, with CRLF line terminators
#
Click to see the 15 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{FB6581E1-1A5E-4649-84C2-3FA331ABA6D2}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\Desktop\~$ER4lglqY.docx
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\fHER4lglqY.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Aug 18 09:26:01 2022, mtime=Thu Aug 18 09:26:01 2022, atime=Thu Aug 18 09:26:11 2022, length=12260, window=hide
#
C:\Users\user\AppData\Local\Temp\{161C39B1-451E-4070-AE08-AFF8D45B0D9D}
data
#
C:\Users\user\AppData\Local\Temp\{021E1AC8-4DA2-4E7A-B16F-AFF6C99BD5E3}
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9DD68104-9F74-4147-BF67-D8C1A9A331E2}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{908054AA-4410-45BE-A60F-B0BC543AE3BB}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D6F1608A-034A-4693-92DF-9F6F675BC0BA}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{469EB5A9-1D77-4731-94E0-EE25EED167A3}.FSD
data
#