flash

MyTaxReturn2018.doc

Status: finished
Submission Time: 29.04.2020 23:31:26
Malicious
Ransomware
Trojan
Spyware
Exploiter
Evader
Remcos

Comments

Tags

Details

  • Analysis ID:
    226430
  • API (Web) ID:
    349378
  • Analysis Started:
    29.04.2020 23:31:27
  • Analysis Finished:
    29.04.2020 23:41:55
  • MD5:
    8a0b25bb7dc4abd5d650d38e0ec666fd
  • SHA1:
    c0c9431f35101b2423f974025298d95952b76657
  • SHA256:
    b539507e70abfac4fde82524bde125addabdd2b5b517c329bed966122d614d34
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
15/59

malicious

IPs

IP Country Detection
45.147.228.24
Germany
45.147.228.245
Germany

URLs

Name Detection
http://45.147.228.245/window/SUTNJeeWZ6LvRNX.exe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\msbuilds\msbuilds.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\tdeds.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LAGR3INJ\SUTNJeeWZ6LvRNX[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 17 hidden entries
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0V8SWODFUGCEJ8P79YXS.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LXGI2775XI8HCDXWEJUE.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\M70VDS19IUOVJGLN72JQ.temp
data
#
C:\Users\user\Desktop\~$TaxReturn2018.doc
data
#
C:\ProgramData\hrjytrj.cmd
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A3A31154.png
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F9635945.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{83F65CC7-0F1C-4A79-B02B-E0AA660BA0C4}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8F1AA676-20E2-4C80-81E0-4F02AD62275D}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B8E5FB92-E0BF-477B-BDC8-C9E389E29762}.tmp
data
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\OICE_0753BC81-6418-4754-B00C-2D6409616907.0\FL985.tmp
data
#
C:\Users\user\AppData\Local\Temp\install.vbs
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\MyTaxReturn2018.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:48 2020, mtime=Tue Jan 28 13:45:48 2020, atime=Wed Apr 29 20:33:23 2020, length=288099, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#