flash

VJW-020120 SKT-020720.doc

Status: finished
Submission Time: 07.02.2020 17:15:24
Malicious
E-Banking Trojan
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    206805
  • API (Web) ID:
    311031
  • Analysis Started:
    07.02.2020 17:15:28
  • Analysis Finished:
    07.02.2020 17:24:25
  • MD5:
    aea1124c3115995ab87be337ae7266e9
  • SHA1:
    6babe35601cf321c2d7c3584e316ab3de569ead9
  • SHA256:
    0069df98a1a64a46eb806b80d82024412e5ae9987db66eb723431f8484982abd
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

malicious

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
33/60

malicious

IPs

IP Country Detection
64.71.35.51
United States
71.126.247.90
United States

Domains

Name IP Detection
supcargo.com
64.71.35.51

URLs

Name Detection
http://supcargo.com/Login/K/
http://71.126.247.90/em0StrbgyF1rMGAyHE/irxhN9ps3YEgB9agV/xAhxY/END0L/FVgPFqYg/
http://71.126.247.90/em0StrbgyF1rMGAyHE/irxhN9ps3YEgB9agV/xAhxY/END0L/FVgPFqYg/rxh
Click to see the 1 hidden entries
http://71.126.247.90/em0StrbgyF1rMGAyHE/irxhN9ps3YEgB9agV/xAhxY/END0L/FVgPFqYg/66a2

Dropped files

Name File Type Hashes Detection
C:\Users\user\657.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6EA9329C-29C3-496F-B6EB-5D5FAD906656}.tmp
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Local\Temp\imgs\cscheme.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\imgs\editdata.mso
data
#
C:\Users\user\AppData\Local\Temp\imgs\filelist.xml
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\imgs\img001.jpg
[TIFF image data, little-endian, direntries=1, copyright=RhzlbbfeqhdyIcmukumpulVvolmvzpewt], baseline, precision 8, 2000x1000, frames 3
#
C:\Users\user\AppData\Local\Temp\imgs\img002.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 624x312, frames 3
#
C:\Users\user\AppData\Local\Temp\imgs\theme.thm
Microsoft OOXML
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\VJW-020120 SKT-020720.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:42 2020, mtime=Tue Jan 28 13:45:42 2020, atime=Fri Feb 7 15:18:22 2020, length=282624, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ECB8SCSCET4668GG4AL7.temp
data
#
C:\Users\user\Desktop\~$W-020120 SKT-020720.doc
data
#