top title background image
flash

Enquiry.doc

Status: finished
Submission Time: 2020-01-22 23:06:14 +01:00
Malicious

Comments

Tags

Details

  • Analysis ID:
    202812
  • API (Web) ID:
    303302
  • Analysis Started:
    2020-01-22 23:06:15 +01:00
  • Analysis Finished:
    2020-01-22 23:17:30 +01:00
  • MD5:
    0a55319bb34943e0bc7be6a3472339fe
  • SHA1:
    bea0fd242c71f91310641fd9fa4f2101825de5e9
  • SHA256:
    08d553f5298a2ac817bbaba8a2a574db652679bac3e0a60862aa9bfd43970b38
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 56
System: unknown
malicious
Score: 56
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

Third Party Analysis Engines

malicious
Score: 11/56
malicious

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6518531C.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\004"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A9E93BC7.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\004"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AE470F5E.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\004"
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{ADF974D2-ACAE-49BD-8B79-296CBB4BE7F3}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F1C4F945-3CC1-4A43-A98F-CD8DBA4A5802}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Enquiry.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Sep 24 13:01:38 2017, mtime=Sun Sep 24 13:01:38 2017, atime=Wed Jan 22 21:08:15 2020, length=493433, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\Desktop\~$nquiry.doc
data
#