flash

COVID-19 FUNDING ELIGIBILITY FORM.doc

Status: finished
Submission Time: 08.06.2020 22:07:06
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    236679
  • API (Web) ID:
    369412
  • Analysis Started:
    08.06.2020 22:07:07
  • Analysis Finished:
    08.06.2020 22:14:36
  • MD5:
    97c74a10726fd4981d3203de43dcc2a2
  • SHA1:
    432da6985222f9ace31eb15b2bef03d56f4df846
  • SHA256:
    1b410bc2457fe408e14aa1d0770feb9d2c2d59c0546118aad108071cf57c45ca
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
17/57

IPs

IP Country Detection
5.79.72.163
Netherlands

Domains

Name IP Detection
teknik.io
5.79.72.163
u.teknik.io
0.0.0.0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KW1NULI9\9Pnzw[1].jpg
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT
data
#
C:\Users\user\AppData\Roaming\COGRANT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\61AA125.png
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A82BECE2.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{24E1C005-E9C2-467C-8574-EBB235553AEF}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6DFA9B6E-BFF6-4A50-ABEB-6963368E479F}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEA46C63-E2E2-4F3A-9C52-D5F9B1AD514B}.tmp
data
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\CabE0BA.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\OICE_35138ED5-EDCD-4B97-8A47-14BA07197A73.0\FLEDC2.tmp
data
#
C:\Users\user\AppData\Local\Temp\TarE0BB.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\COVID-19 FUNDING ELIGIBILITY FORM.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Tue Jan 28 13:45:43 2020, atime=Mon Jun 8 19:08:11 2020, length=312453, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1T2WXIR1U2XGLTHY9F74.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A53N1HG3Y9O2F7Y1825A.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UB4QDDIP8FMS37FBVAXA.temp
data
#
C:\Users\user\Desktop\~$VID-19 FUNDING ELIGIBILITY FORM.doc
data
#