flash

https://onedrive.live.com/download?cid=DAC345CC0B5C7EB4&resid=DAC345CC0B5C7EB4%21167&authkey=ABUO3nW2AbK7LE8

Status: finished
Submission Time: 22.05.2020 16:28:51
Malicious
Spyware
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    232460
  • API (Web) ID:
    361168
  • Analysis Started:
    22.05.2020 16:30:00
  • Analysis Finished:
    22.05.2020 16:40:44
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: w10x64 Windows 10 64 bit v1803 with Office Professional Plus 2016, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
16/72

IPs

IP Country Detection
195.110.124.133
Italy
209.99.64.33
United States
162.0.224.132
Canada
Click to see the 1 hidden entries
198.49.23.144
United States

Domains

Name IP Detection
www.hearxy.com
162.0.224.132
clikando.com
195.110.124.133
www.twoscoopsmedia.com
209.99.64.33
Click to see the 16 hidden entries
www.worldethniko.net
0.0.0.0
www.clikando.com
0.0.0.0
www.appdlid-veriflcation.net
0.0.0.0
www.cloverhill.church
0.0.0.0
www.xiaoju3.com
0.0.0.0
www.mickschrysler.com
0.0.0.0
www.newpolarorder.net
0.0.0.0
www.jxzypmc.com
0.0.0.0
www.hippybritty.com
0.0.0.0
site-cdn.onenote.net
0.0.0.0
www.greenplanetfruits.com
0.0.0.0
www.accesibless.com
0.0.0.0
www.newrevagain.com
0.0.0.0
ext-sq.squarespace.com
198.49.23.144
onedrive.live.com
0.0.0.0
aovh8q.dm.files.1drv.com
0.0.0.0

URLs

Name Detection
http://www.cloverhill.church/p9g/?fxo8sfD=3NM8YSreLjqS/RZAgU9ET2SiP2CAQ4pcat/9bvcysN59A+Opzp9XditLA5LDq4OvQPLL&f48tQ=4hf0
http://www.twoscoopsmedia.com/p9g/
http://www.hearxy.com/p9g/?fxo8sfD=dS5HItHvnUnILck0gpW20wgJJ6a8xe78pltXe++aBg5j81AlAlDDAdvHfOzf6Wclx9jp&f48tQ=4hf0
Click to see the 16 hidden entries
http://www.clikando.com/p9g/
http://www.twoscoopsmedia.com/p9g/?fxo8sfD=wtLs5XGt91mQrVxy+aJJS9yGcTcvSllcG8Nhm8KNWr7RdonEgXYJqVEeQYFyQQkZMIlS&f48tQ=4hf0
http://www.hearxy.com/p9g/
http://www.msn.com/de-ch/?ocid=i
https://c.s-micros
https://www.google.ch/
http://www.msn.com/de-ch/
https://contextual.media.net/medianet.php
http://www.msn.com/?ocid=iehp
http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
https://aovh8q.dm.files.1drv.com/y4mdxt-uP3Vim4I9qy6ghljXtwBIrhZ8VAEUMuMSEQny4rl8Z2KWG5y0HZ8ZNNdYern
http://www.google.ch/
http://ns.adob
https://www.google.ch/?gws_rd=ssl
http://www.msn.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\Payment%20Invoice[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T7L7U67X\Payment Invoice.exe.2g5olz0.partial
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T7L7U67X\Payment Invoice.exe.2g5olz0.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Local\Temp\Gnt-hzl\colorcpluz7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\62036TRR\620logrf.ini
data
#
C:\Users\user\AppData\Roaming\62036TRR\620logri.ini
data
#
C:\Users\user\AppData\Roaming\62036TRR\620logrv.ini
data
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{59D65BEB-9C84-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{59D65BED-9C84-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T7L7U67X\Payment Invoice.exe:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF2EAA84CAF3EEF544.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFFBDB4E6854CAB3B4.TMP
data
#
C:\Users\user\AppData\Roaming\62036TRR\620logim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
MS Windows shortcut, Item id list present, Points to a file or directory, Read-Only, Directory, ctime=Wed Apr 11 22:38:20 2018, mtime=Fri May 22 22:34:36 2020, atime=Fri May 22 22:34:36 2020, length=8192, window=hide
#