top title background image
flash

INV_PO_12172019EX.doc

Status: finished
Submission Time: 2023-02-07 18:11:26 +01:00
Malicious
Trojan
Evader

Comments

Tags

Details

  • Analysis ID:
    800690
  • API (Web) ID:
    1167914
  • Analysis Started:
    2023-02-07 18:13:09 +01:00
  • Analysis Finished:
    2023-02-07 18:21:10 +01:00
  • MD5:
    3b7fa78ebf399bb0230590bfec589fa7
  • SHA1:
    199d4646fdbf9b5167d80ed71ce0ea406c40b018
  • SHA256:
    5c2dc72128d235ecdca49e4026ec782cdce9021c5b46ebf841000bab5ebcc129
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 43/61
malicious
Score: 14/47
malicious
malicious

IPs

IP Country Detection
103.224.212.222
Australia
162.212.129.161
United States
13.248.148.254
United States

Domains

Name IP Detection
7arasport.com
103.224.212.222
dev2.ektonendon.gr
162.212.129.161
amstaffrecords.com
0.0.0.0
Click to see the 4 hidden entries
ww38.7arasport.com
0.0.0.0
diagnostica-products.com
0.0.0.0
foozoop.com
0.0.0.0
701602.parkingcrew.net
13.248.148.254

URLs

Name Detection
https://diagnostica-products.com
http://dev2.ektonendon.gr/cgi-bin/mTTCFmVe/
http://dev2.ektonendon.gr
Click to see the 15 hidden entries
http://amstaffrecords.com
http://7arasport.com
http://foozoop.com
https://diagnostica-products.com/wp-admin/hio2u7w/
http://foozoop.com/wp-content/Qxi7iVD/
http://amstaffrecords.com/indivi
http://amstaffrecords.com/individualApi/0/
http://foozoop.com/wp
https://diagnostica-products.com/wp-admin/hio2u7w/PE
http://7arasport.com/validatefield/gj/
http://ja.com/he
http://ww38.7arasport.com
http://www.piriform.com/ccleaner
http://ww38.7arasport.com/validatefield/gj/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\~DF413F6883B338D566.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DFAAA31D5F4A1B1B2F.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\Desktop\~$V_PO_12172019EX.doc
data
#
Click to see the 16 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LDV95WB5GH1Q7ECQYL9V.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Generic INItialization configuration [doc]
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\INV_PO_12172019EX.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:59 2022, mtime=Tue Mar 8 15:45:59 2022, atime=Wed Feb 8 01:13:17 2023, length=189952, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Forms\INKEDLib.exd
data
#
C:\Users\user\AppData\Local\Temp\~DFF8750E7A0A2DF968.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD6589A193BC4C172.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7FD181C6.wmf
Windows metafile
#
C:\Users\user\AppData\Local\Temp\~DFA8E9CC93153586F4.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF9A691EC184F6B5B3.TMP
data
#
C:\Users\user\AppData\Local\Temp\Word8.0\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\VBE\INKEDLib.exd
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{98B5056E-1AC7-42C9-BDDC-599C5AB91B4A}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{4D8C8B4D-2408-4479-B193-86C1187A3D7D}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A3AE7B0F.wmf
Windows metafile
#