top title background image
flash

C1ZGt61uGv.docx

Status: finished
Submission Time: 2022-08-18 03:51:09 +02:00
Malicious
Exploiter
Evader
Follina CVE-2022-30190

Comments

Tags

Details

  • Analysis ID:
    686026
  • API (Web) ID:
    1053493
  • Analysis Started:
    2022-08-18 04:22:09 +02:00
  • Analysis Finished:
    2022-08-18 04:36:15 +02:00
  • MD5:
    98998af843c2c938c079a102abe6c73d
  • SHA1:
    b1a1dda90b3df0ba5f23430a6c55c48a9c3dbe9d
  • SHA256:
    b0cfd511498cbaed084fa622cfeb1a07de7478205cbff58cb40cb89091813593
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 96
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 96
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

Third Party Analysis Engines

malicious
Score: 26/57
malicious
Score: 9/35
malicious
Score: 14/40
malicious

IPs

IP Country Detection
35.186.245.55
United States
34.149.204.188
United States

Domains

Name IP Detection
dullghostwhitetwintext.karewen.repl.co
35.186.245.55

URLs

Name Detection
https://dullghostwhitetwintext.karewen.repl.co/index.html
https://dullghostwhitetwintext.karewen.repl.co/index.htmlyX

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\index[1].htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\535F33EE.htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FEAC362C.htm
HTML document, ASCII text, with very long lines
#
Click to see the 17 hidden entries
C:\Users\user\Desktop\~$ZGt61uGv.docx
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\C1ZGt61uGv.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Aug 18 10:22:03 2022, mtime=Thu Aug 18 10:22:03 2022, atime=Thu Aug 18 10:22:14 2022, length=26614, window=hide
#
C:\Users\user\AppData\Local\Temp\{6806B3C0-D11D-4BCE-84B7-B2587F6807DC}
data
#
C:\Users\user\AppData\Local\Temp\{5048B624-CC25-47D4-B88B-9B5A8E4583C5}
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D894BCB6-25AA-45DC-81E3-B0273BF56D57}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{92861601-980D-49B7-B60E-86BDABC4A51A}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{4AF4D387-AD82-4BF6-994E-7F9F57B3DDFD}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AC592AE0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\index[1].htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{ECAF6FF3-F9CF-495B-80DB-8035DEA309E7}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{82D6D04A-E2A7-42F1-89A6-CFD57F9EC766}.FSD
data
#