flash

S_974960546330.doc

Status: finished
Submission Time: 09.11.2019 00:02:23
Malicious
E-Banking Trojan
Evader
Trojan
Exploiter
Emotet

Comments

Tags

Details

  • Analysis ID:
    188700
  • API (Web) ID:
    275708
  • Analysis Started:
    09.11.2019 00:02:27
  • Analysis Finished:
    09.11.2019 00:33:59
  • MD5:
    8e733951981cca9a6e56b0c3d83605a6
  • SHA1:
    81d5062725feb14dd74c71b0c765f9c2275b0267
  • SHA256:
    1d6bd22c491db2f0407963456128a1e202d7e4198715b172fdfaa7565f186497
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
92/100

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Run Condition: Potential for more IOCs and behavior

malicious
100/100

malicious
36/61

malicious

malicious

IPs

IP Country Detection
103.209.145.164
India
116.203.228.95
Germany
104.197.113.14
United States
Click to see the 1 hidden entries
74.208.125.192
United States

Domains

Name IP Detection
eximalert.com
103.209.145.164
axocom.fr
116.203.228.95
www.eximalert.com
0.0.0.0
Click to see the 1 hidden entries
blog.innovaccer.com
104.197.113.14

URLs

Name Detection
https://axocom.fr/categorie-produit/note-8/
https://axocom.fr/my-account/lost-password/
https://axocom.fr/wp-content/themes/nielsen/theme/plugins/yit-framework/modules/faq/assets/css/yit-f
Click to see the 97 hidden entries
https://axocom.fr/categorie-produit/ipad-pro-10-5/
https://axocom.fr/?product_cat=&post_type=product&s=a7
https://axocom.fr/categorie-produit/galaxy-j5-2016/
https://axocom.fr/wp-content/uploads/2018/10/Accueil.png
https://axocom.fr/wp-content/plugins/ext_product_bundles/Scripts/back-end.js
https://axocom.fr/categorie-produit/galaxy-a8/
https://axocom.fr/categorie-produit/iphone-7/
https://axocom.fr/categorie-produit/s10-plus/
https://axocom.fr/wp-content/plugins/revslider/public/assets/js/revolution.tools.min.js
https://axocom.fr/?product_cat=&post_type=product&s=xiaomi
https://axocom.fr/categorie-produit/j7-2017/
https://axocom.fr/wp-content/themes/nielsen/theme/assets/css/shortcodes.css
https://axocom.fr/categorie-produit/nokia-8-sirocco/
https://axocom.fr/wp-content/plugins/essential-grid/public/assets/css/settings.css
https://axocom.fr/wp-content/themes/nielsen/theme/assets/bootstrap/css/bootstrap.min.css
https://axocom.fr/categorie-produit/galaxy-s6-edge-samsung/
https://axocom.fr/categorie-produit/xz1/
https://axocom.fr/?product_cat=&post_type=product&s=armband
https://axocom.fr/categorie-produit/p10-plus/
https://axocom.fr/categorie-produit/p20-lite/
https://axocom.fr/categorie-produit/j6-plus-2018/
https://axocom.fr/categorie-produit/s10/
https://axocom.fr/categorie-produit/mate-20-pro/
https://orchaskiddiesworld.com/t24dfh/ea/
https://axocom.fr/categorie-produit/nokia-7-1/
https://axocom.fr/categorie-produit/xz2/
https://axocom.fr/categorie-produit/galaxyace3/
https://axocom.fr/categorie-produit/xz1-compact/
https://axocom.fr/categorie-produit/galaxy-s9/
https://axocom.fr/categorie-produit/samsung-galaxy-s5-neo/
https://axocom.fr/categorie-produit/s10-lite/
https://axocom.fr/categorie-produit/iphone5c/
https://axocom.fr/categorie-produit/galaxy-grand-neo/
https://axocom.fr/categorie-produit/iphone-xi-11-6-1/
https://axocom.fr/my-account/
https://axocom.fr/categorie-produit/ipad-pro-12-9-2018/
https://axocom.fr/categorie-produit/xz3/
https://axocom.fr/wp-admin/maint/d01/
http://www.eximalert.com/dhxq/XweuZD/
https://axocom.fr/wp-content/plugins/rp-payment-fee-discount/assets/js/rppfd.js
https://axocom.fr/?product_cat=&post_type=product&s=redmi
https://axocom.fr/categorie-produit/y9-2019/
https://axocom.fr/categorie-produit/a70/
https://axocom.fr/categorie-produit/a9-2018/
https://axocom.fr/categorie-produit/mi-mix-2s/
https://lookup.onenote.com/lookup/geolocation/v1
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
https://hubblecontent.osi.office.net/contentsvc/browse?M
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=ImmersiveApp
https://settings.outlook.comk
https://res.getmicrosoftkey.com/api/redemptionevents
https://tasks.office.com
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile97W
https://loki.delve.office.com/api/v1/configuration/officewin32/2
https://store.office.cn/addinstemplate
http://cps.letsencrypt.org0
https://wus2-000.pagecontentsync.
https://login.windows.net/common/oauth2/authorizeash
https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3ds
https://login.windows.net/common/oauth2/authorizel1234
https://www.odwebp.svc.ms
https://graph.windows.net
http://gmpg.org/xfn/11
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.jsonMBI_SSLpeople.directory.
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
https://login.windows.net/common/oauth2/authorizeate
https://augloop.office.comLinkRequestApiPageTitleRetrievalhttps://uci.
https://login.windows.net/common/oauth2/authorizeabled
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
http://weather.service.msn.com/data.aspx
https://login.windows.net/common/oauth2/authorizesrek
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
https://login.windows.ne
https://osi.office.netst
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebookr
https://login.windows.net/common/oauth2/authorizebled
http://www.founder.com.cn/cn/bThe
https://portal.office.com/account/?ref=ClientMeControl8
https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFileBearer
https://outlook.office365.com/api/v1.0/me/Activities
https://login.windows.net/common/oauth2/authorizeP
https://clients.config.office.net/user/v1.0/android/policies
https://login.windows.net/common/oauth2/authorizeS
https://login.windows.net/common/oauth2/authorizeT
https://login.windows.net/common/oauth2/authorizeU
http://schemas.micro
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
https://hubblecontent.osi.office.net/contentsvc/api/telemetry
https://login.windows-ppe.net/common/oauth2/authorize2
https://login.windows.net/common/oauth2/authorizeal
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing48
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
https://rpsticket.partnerservices.getmicrosoftkey.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\20.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
#
C:\Config.Msi\6d2d1a.rbs
data
#
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig-office.xrm-ms
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
Click to see the 44 hidden entries
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\eb4a002353fbc1ac86da8e9babee163b_59407d34-c8c5-44df-a766-ba8a11cb1cb0
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FF7.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3EFB.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER47C6.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER54D7.tmp.txt
data
#
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\DEFEBDBC-B737-4251-9334-C6E342BB9F17
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml
XML 1.0 document, ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Office\OTele\winword.exe.db-wal
SQLite Write-Ahead Log, version 3007000
#
C:\Users\user\AppData\Local\Microsoft\Office\OTele\winword.exe.db.session
SQLite 3.x database, last written using SQLite version 3019003
#
C:\Users\user\AppData\Local\Microsoft\Office\OTele\winword.exe.db.session-journal
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\15C94362.wmf
Targa image data - Map - RLE 17 x 65536 x 0 +4 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4C0232B5.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\525DEB8B.wmf
Targa image data - Map - RLE 17 x 65536 x 0 +4 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\63709C49.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\650AA407.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\6A610368.wmf
Targa image data - Map - RLE 17 x 65536 x 0 +4 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\99A32AD.wmf
Targa image data - Map - RLE 17 x 65536 x 0 +4 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9B315810.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D5C89334.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DC92CE3F.wmf
Targa image data - Map - RLE 17 x 65536 x 0 +4 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DFEA80CA.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E0A377FB.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E2D2489E.wmf
Targa image data - Map - RLE 17 x 65536 x 0 +4 "\021"
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{8A22B304-C237-4875-9F78-FEFE501EAC34}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\Word8.0\INKEDLib.exd
data
#
C:\Users\user\AppData\Local\Temp\Word8.0\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adwvbvdd.ofg.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lqrmvvv4.jlo.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\aria-debug-384.log
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\S_974960546330.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu May 23 20:36:40 2019, mtime=Sat Nov 9 07:14:35 2019, atime=Sat Nov 9 07:14:26 2019, length=258048, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$974960546330.doc
data
#
C:\Users\user\Documents\20191109\PowerShell_transcript.424505.WmxzOq40.20191109001451.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Windows\Installer\6d2d18.msi
2
#
C:\Windows\Installer\6d2d1d.msi
2
#
C:\Windows\Installer\MSI3BBE.tmp
data
#
C:\Windows\Installer\MSI3BEE.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Windows\Installer\MSI447B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Windows\Installer\MSI571A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Windows\Logs\CBS\CBS.log
ASCII text, with CRLF line terminators
#
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
ASCII text, with CRLF line terminators
#