flash

readme.exe

Status: finished
Submission Time: 07.05.2020 22:19:39
Malicious
Ransomware
Trojan
Spyware
Evader
Remcos

Comments

Tags

Details

  • Analysis ID:
    228452
  • API (Web) ID:
    353344
  • Analysis Started:
    07.05.2020 22:19:40
  • Analysis Finished:
    07.05.2020 22:33:59
  • MD5:
    b6c8d83223ea073c01d40fafe866466b
  • SHA1:
    3341cb5f684cb690e3a92dc8884fcb0c28bf47a3
  • SHA256:
    ae3295c31bb70b2970c9acb33c40bae503de989ed9d696842a44c866e7bafa55
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
11/79

IPs

IP Country Detection
185.140.53.21
Sweden
216.58.207.33
United States

Domains

Name IP Detection
u864246.nvpn.so
185.140.53.21
site-cdn.onenote.net
0.0.0.0
googlehosted.l.googleusercontent.com
216.58.207.33
Click to see the 1 hidden entries
doc-14-8g-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
https://doc-14-8g-docs.googleusercontent.com/y
https://doc-14-8g-docs.googleusercontent.com/docs/secuu(
https://pki.goog/repositorI
Click to see the 12 hidden entries
https://doc-14-8g-docs.googleusercontent.com/
http://ocsp.pki.goog/gts1o10
https://doc-14-8g-docs.googleusercontent.com/docs/securesc/okjaf0d96k16o2ur6os401lotlk7qdd4/6nj4b82m
https://doc-14-8g-docs.googleuse
http://pki.goog/gsr2/GTS1O1.crt0
https://doc-14-8g-docs.googleusercontent.com/#
http://crl.pki.goog/gsr2/gsr2.crl0?
http://ocsp.pki.goog/gsr202
https://pki.goog/repository/0
https://doc-14-8g-docs.googleusercontent.com/1
http://crl.pki.goog/GTS1O1.crl0
https://doc-14-8g-docs.googleusercontent.com/me

Dropped files

Name File Type Hashes Detection
C:\Users\Public\fodhelper.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
C:\Users\Public\propsys.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Windows \System32\fodhelper.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
Click to see the 17 hidden entries
C:\Users\user\AppData\Local\Htdr\Htdrset.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\remcos\logs.dat
ASCII text, with CRLF line terminators
#
C:\Users\Public\cde.bat
ASCII text, with CRLF line terminators
#
C:\Users\Public\x.bat
ASCII text, with CRLF line terminators
#
C:\Users\Public\x.vbs
ASCII text, with CRLF line terminators
#
C:\Windows \System32\propsys.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Htdr\Htdr.hta
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Htdr\Muck
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\Htdr[1]
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T7L7U67X\Htdr[1]
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W2BICE6W\Htdr[1]
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tz1t35mf.sjr.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yop40vn5.eib.ps1
ASCII text, with no line terminators
#
C:\Users\user\Documents\20200507\PowerShell_transcript.093954.RTYIdPqH.20200507222022.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\Public\Natso.bat
ASCII text, with CRLF line terminators
#
C:\Users\Public\Runex.bat
ASCII text, with CRLF line terminators
#