top title background image
flash

Invoice status update.doc

Status: finished
Submission Time: 2019-12-19 08:45:16 +01:00
Malicious
E-Banking Trojan
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    197203
  • API (Web) ID:
    292344
  • Analysis Started:
    2019-12-19 08:45:18 +01:00
  • Analysis Finished:
    2019-12-19 08:53:49 +01:00
  • MD5:
    0eec7649065a217b0b8a4fa3ff53ea99
  • SHA1:
    2f212fd68fcf57bb102b21aace876903a06e8a6e
  • SHA256:
    2360d60477d55849eefd4be532b0a8e63e97d651b73161e0df6f8401dce5356f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 17/58
malicious

IPs

IP Country Detection
139.99.68.6
Canada
103.57.247.118
India
149.129.69.72
Singapore
Click to see the 4 hidden entries
217.160.0.82
Germany
172.31.4.164
Reserved
66.229.161.86
United States
190.47.236.83
Chile

Domains

Name IP Detection
stperformance.co.uk
217.160.0.82
www.liuxuebook.com
149.129.69.72
maelkajangcanopy.com
139.99.68.6
Click to see the 2 hidden entries
jandmadventuring.servermaintain.com
103.57.247.118
stylewebcruze.online
0.0.0.0

URLs

Name Detection
http://jandmadventuring.servermaintain.com/wp-content/uploads/cjy4-j423i30-616378266/
http://190.47.236.83/TRUBj1Ha6iEkX3APm
http://66.229.161.86/LmPMoAEwgNKcGCaGJkZ
Click to see the 2 hidden entries
https://66.229.161.86:443/LmPMoAEwgNKcGCaGJkZ
http://190.47.236.83/TRUBj1Ha6iEkX3APmS

Dropped files

Name File Type Hashes Detection
C:\Users\user\498.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_0f4f5130-48fa-4204-b1c4-585fbb81cd25
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\330078E9.wmf
Targa image data - Map - RLE 28 x 65536 x 0 +5 "\004"
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\95F3F9D6.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\004"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C6C239E0-6120-4FD5-811C-5E1B6597B42A}.tmp
data
#
C:\Users\user\AppData\Local\Temp\VBE\INKEDLib.exd
data
#
C:\Users\user\AppData\Local\Temp\Word8.0\MSForms.exd
data
#
C:\Users\user\AppData\Roaming\Microsoft\Forms\INKEDLib.exd
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Invoice status update.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Sep 24 13:01:35 2017, mtime=Sun Sep 24 13:01:35 2017, atime=Thu Dec 19 06:45:54 2019, length=207872, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H5LZ99HRZVRBTJ2IMGOK.temp
data
#
C:\Users\user\Desktop\~$voice status update.doc
data
#