flash

Unpaid Invoice.9342.xls

Status: finished
Submission Time: 14.02.2020 16:14:14
Malicious
Exploiter

Comments

Tags

Details

  • Analysis ID:
    208474
  • API (Web) ID:
    314314
  • Analysis Started:
    14.02.2020 16:14:16
  • Analysis Finished:
    14.02.2020 16:26:29
  • MD5:
    dab1b5581adbd9acec31da85f46271b7
  • SHA1:
    d54a1d374eeb701b1f22a526b1e2a2bc0efec677
  • SHA256:
    c491cf960baded54d16ca2a415f188a0ce53bf300c13b7c7b89458d801b2f27a
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
52/100

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Run Condition: Potential for more IOCs and behavior

malicious
52/100

IPs

IP Country Detection
47.254.171.5
United States

Domains

Name IP Detection
doolised.xyz
47.254.171.5

URLs

Name Detection
https://doolised.xyz/DSBVhsdv78f

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4608C369-85AE-4C49-98B5-9573BF4BD356}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{C137327A-CF57-4B72-9BAF-C1E2DE36D91F}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PSORVPC2\DSBVhsdv78f[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Temp\{11EB1E52-2FD6-4C31-AC65-58AE0F5642D0}
data
#
C:\Users\user\AppData\Local\Temp\{3636B0CC-A61C-4DED-A75C-715E0FEBE268}
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\QTOZA3X7.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\T5OX72AZ.txt
ASCII text
#