flash

gyF9tONev4.docm

Status: finished
Submission Time: 06.02.2020 04:37:55
Malicious
E-Banking Trojan
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    206257
  • API (Web) ID:
    309971
  • Analysis Started:
    06.02.2020 04:37:58
  • Analysis Finished:
    06.02.2020 04:47:57
  • MD5:
    0d387f09beaaac47c9f93ed5ae4d70ac
  • SHA1:
    704c706ab6150a6e94c1551a1551f775a6ef764a
  • SHA256:
    970df6100d8375af169bb259df2c7bb1ad641294e34ed57dc3ad02a38371b4c7
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

malicious

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
54/70

malicious

malicious

IPs

IP Country Detection
45.55.179.121
United States
43.255.154.93
Singapore

Domains

Name IP Detection
bolehprediksi.com
43.255.154.93

URLs

Name Detection
http://bolehprediksi.com/wp-includes/ifrEFSqSw/
http://45.55.179.121:8080/juH7pVdg5
http://45.55.179.121/juH7pVdg5
Click to see the 1 hidden entries
http://www.codeproject.com/KB/dialog/xfontdialog.aspx

Dropped files

Name File Type Hashes Detection
C:\Users\user\209.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E67C3C90.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 1429x714, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{865A8ECD-8A2F-4047-A80F-8E451B9D4094}.tmp
data
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6FBB4B8-ABB3-4144-8E55-A0B671994B5C}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D85A42E2-B179-4313-B29F-5FF96F0EAB67}.tmp
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\gyF9tONev4.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Feb 6 02:40:19 2020, mtime=Thu Feb 6 02:40:19 2020, atime=Thu Feb 6 02:40:21 2020, length=115514, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\353Y56AO688BMT1O97ES.temp
data
#
C:\Users\user\Desktop\~$F9tONev4.docm
data
#