top title background image
flash

0mvOExDB0u.docx

Status: finished
Submission Time: 2022-08-18 09:57:13 +02:00
Malicious
Trojan
Exploiter
Evader
Follina CVE-2022-30190

Comments

Tags

  • docx

Details

  • Analysis ID:
    686188
  • API (Web) ID:
    1053663
  • Analysis Started:
    2022-08-18 10:21:37 +02:00
  • Analysis Finished:
    2022-08-18 10:27:17 +02:00
  • MD5:
    ba0bfeb5fe6552217f5dd46eaf365db2
  • SHA1:
    1f371d032ee40e1ff115f3d463246ab92b77e640
  • SHA256:
    a849eb6768d0d38975faa5e2d0ad261e80468e3ec153e3511c41c86c7d58320b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 28/60
malicious
Score: 10/35
malicious
Score: 23/39
malicious
malicious

IPs

IP Country Detection
34.126.146.169
United States

Domains

Name IP Detection
zaloapp.duckdns.org
34.126.146.169

URLs

Name Detection
https://zaloapp.duckdns.org/dkm.htmlyX
https://zaloapp.duckdns.org/dkm.html

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\dkm[1].htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\71E1C088.htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BA0768EA.htm
HTML document, ASCII text, with very long lines
#
Click to see the 16 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{54C3BB41-4824-4D76-9814-5AB27D135E39}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\Desktop\~$vOExDB0u.docx
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\0mvOExDB0u.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Aug 18 16:23:00 2022, mtime=Thu Aug 18 16:23:00 2022, atime=Thu Aug 18 16:23:11 2022, length=13980, window=hide
#
C:\Users\user\AppData\Local\Temp\{F4295DCF-A5E4-4365-A8E0-DC8DE21141CB}
data
#
C:\Users\user\AppData\Local\Temp\{6985C587-9066-4354-83B5-3F5856D587EC}
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F116EB59-8281-4971-8EDA-A57BD55E7891}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{99A334A3-9CCE-497E-9069-C0103D350D75}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{1B2D91C0-F32B-418D-958E-39DD37B1A090}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{CC68C536-9CD4-4A67-8EC7-4282F7DE8CCB}.FSD
data
#