flash

Quotation Sheet_RFQ202011405002.doc

Status: finished
Submission Time: 14.05.2020 15:29:00
Malicious
Spyware
Exploiter
Evader
Lokibot

Comments

Tags

Details

  • Analysis ID:
    230260
  • API (Web) ID:
    356868
  • Analysis Started:
    14.05.2020 15:29:42
  • Analysis Finished:
    14.05.2020 15:37:55
  • MD5:
    a5f3d0e710a79c3e1b13345494e6c45f
  • SHA1:
    bb322bd348a704a5938d61266cd1c9851a69e703
  • SHA256:
    b3f635dac2b4d2bbd5d62164bfc9d533756d1981e475da1bd5aa61c30fbf8fd4
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
16/59

IPs

IP Country Detection
87.236.213.195
United Kingdom

Domains

Name IP Detection
admaris.ir
87.236.213.195
abass.ir
87.236.213.195

URLs

Name Detection
http://abass.ir/smartx/smartx.exe
http://admaris.ir/smart/five/fre.php
http://www.ibsensoftware.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HPLJJT0P\smartx[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\smartxox8489322.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{378F27DD-9C29-4402-9141-FD5A0686118F}.tmp
data
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A3027A46-ACF8-4B2E-80E0-A732BFF836F5}.tmp
data
#
C:\Users\user\AppData\Roaming\85CB65\5E97AF.lck
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-290172400-2828352916-2832973385-1004\ce1d9ab061b5b7ff17c765603e761dae_0f4f5130-48fa-4204-b1c4-585fbb81cd25
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Quotation Sheet_RFQ202011405002.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:45 2020, mtime=Tue Jan 28 13:45:45 2020, atime=Thu May 14 12:31:20 2020, length=4230, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\Desktop\~$otation Sheet_RFQ202011405002.doc
data
#