top title background image
flash

5167-31632_County_Report.rtf

Status: finished
Submission Time: 2020-02-07 22:04:49 +01:00
Malicious
E-Banking Trojan
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    206903
  • API (Web) ID:
    311216
  • Analysis Started:
    2020-02-07 22:04:53 +01:00
  • Analysis Finished:
    2020-02-07 22:12:57 +01:00
  • MD5:
    587a64ea15389253106b10b33cece896
  • SHA1:
    ef5ed938093b91719abb34225e9bace2d40660c2
  • SHA256:
    0f7cc6c4553745cc88718f715da6ffb468c0d54b359d46a43c2f1c92e4e21c64
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 32/61
malicious
Score: 9/39
malicious

IPs

IP Country Detection
98.239.119.52
United States
104.236.28.47
United States
80.86.91.91
Germany
Click to see the 2 hidden entries
64.71.35.51
United States
71.126.247.90
United States

Domains

Name IP Detection
supcargo.com
64.71.35.51

URLs

Name Detection
http://supcargo.com/Login/K/
http://104.236.28.47:8080/qTOCLk7eJB0N7wSkI/airGiD5hVE0vdcJ/
http://104.236.28.47:8080/qTOCLk7eJB0N7wSkI/airGiD5hVE0vdcJ/c
Click to see the 2 hidden entries
http://98.239.119.52/Lz5dJqzRjfNpb/GUhEYaz6Q0x/jV7aMU/fJhU7EGsJ7geuLEO2dr/
http://104.236.28.47/qTOCLk7eJB0N7wSkI/airGiD5hVE0vdcJ/

Dropped files

Name File Type Hashes Detection
C:\Users\user\657.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DC6D83A8-F891-49DD-BF67-3E833799CB0A}.tmp
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Local\Temp\imgs\cscheme.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\imgs\editdata.mso
data
#
C:\Users\user\AppData\Local\Temp\imgs\filelist.xml
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\imgs\img001.jpg
[TIFF image data, little-endian, direntries=1, copyright=RhzlbbfeqhdyIcmukumpulVvolmvzpewt], baseline, precision 8, 2000x1000, frames 3
#
C:\Users\user\AppData\Local\Temp\imgs\img002.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 624x312, frames 3
#
C:\Users\user\AppData\Local\Temp\imgs\theme.thm
Microsoft OOXML
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\5167-31632_County_Report.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:44 2020, mtime=Tue Jan 28 13:45:44 2020, atime=Fri Feb 7 20:07:24 2020, length=282112, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0W1WCZJTGURC6X2DZGBU.temp
data
#
C:\Users\user\Desktop\~$67-31632_County_Report.rtf
data
#