flash

MyTaxReturn2018.doc

Status: finished
Submission Time: 29.04.2020 23:15:29
Malicious
Ransomware
Trojan
Spyware
Exploiter
Evader
Remcos

Comments

Tags

Details

  • Analysis ID:
    226426
  • API (Web) ID:
    349370
  • Analysis Started:
    29.04.2020 23:15:30
  • Analysis Finished:
    29.04.2020 23:27:56
  • MD5:
    8a0b25bb7dc4abd5d650d38e0ec666fd
  • SHA1:
    c0c9431f35101b2423f974025298d95952b76657
  • SHA256:
    b539507e70abfac4fde82524bde125addabdd2b5b517c329bed966122d614d34
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
15/59

malicious

IPs

IP Country Detection
45.147.228.24
Germany
45.147.228.245
Germany
194.5.99.218
Netherlands

URLs

Name Detection
http://45.147.228.245/window/SUTNJeeWZ6LvRNX.exe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4RMVQH0O\SUTNJeeWZ6LvRNX[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT
data
#
C:\Users\user\AppData\Roaming\msbuilds\msbuilds.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Roaming\tdeds.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\ProgramData\hrjytrj.cmd
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C4EF6BA.png
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E7AA373.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1BFDF70E-3B70-4952-B0F0-B3990CE357A3}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{96C756A9-FA17-4F0C-A487-A9A22C7895F1}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E94362F4-94F2-429C-9DCE-80A8DDC9A76E}.tmp
data
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\OICE_F6FFD097-83D8-4528-A005-EC054F049EE9.0\FLF27A.tmp
data
#
C:\Users\user\AppData\Local\Temp\install.vbs
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\MyTaxReturn2018.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:48 2020, mtime=Tue Jan 28 13:45:48 2020, atime=Wed Apr 29 20:17:20 2020, length=288099, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OAK41UC2BZ8KPKZ5C324.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OST2HRWOO096LNG6S6ZA.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XLH8507HG9OJJ0FA5MG4.temp
data
#
C:\Users\user\AppData\Roaming\msbuilds\logs.dat
data
#
C:\Users\user\Desktop\~$TaxReturn2018.doc
data
#