flash

dokumentera.exe

Status: finished
Submission Time: 02.04.2020 14:01:41
Malicious
Trojan
Evader
Nanocore

Comments

Tags

Details

  • Analysis ID:
    219753
  • API (Web) ID:
    336355
  • Analysis Started:
    02.04.2020 14:01:42
  • Analysis Finished:
    02.04.2020 14:08:51
  • MD5:
    54eab4922369977af26e96d086134633
  • SHA1:
    a8f597f51f553613598db31e8aeca1397be85c5d
  • SHA256:
    8a90616e98ae23edd79a64f17dde8ed6152cb9ef7b917b8b266827db19c1e735
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
26/72

malicious
14/31

IPs

IP Country Detection
172.111.188.199
United States

URLs

Name Detection
http://www.apache.org/licenses/LICENSE-2.0
http://www.sajatypeworks.compor
http://www.typography.net-us
Click to see the 28 hidden entries
http://www.founder.com.cn/cn/bThe
http://www.jiyu-kobo.co.jp/O
http://www.tiro.com
http://www.goodfont.co.krL
http://www.tiro.comI
http://www.goodfont.co.kr
http://www.jiyu-kobo.co.jp/jp/
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.founder.com.cn/cn/
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.jiyu-kobo.co.jp/w
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.founder.com.cn/cnp
http://www.jiyu-kobo.co.jp/8
http://www.typography.net
http://www.jiyu-kobo.co.jp/m
http://www.jiyu-kobo.co.jp/
http://www.jiyu-kobo.co.jp/Y0
http://www.typography.net-br
http://www.fonts.com
http://www.sandoll.co.kr
http://www.zhongyicts.com.cn
http://www.sakkal.com
http://www.tiro.comic
http://www.sandoll.co.kro.kr

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dokumentera.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp1D19.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\run.dat
data
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\aKrtWHyRehAOaq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\aKrtWHyRehAOaq.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#