top title background image
flash

COVID-19 FUNDING ELIGIBILITY FORM.doc

Status: finished
Submission Time: 2020-06-08 22:07:06 +02:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    236679
  • API (Web) ID:
    369412
  • Analysis Started:
    2020-06-08 22:07:07 +02:00
  • Analysis Finished:
    2020-06-08 22:14:36 +02:00
  • MD5:
    97c74a10726fd4981d3203de43dcc2a2
  • SHA1:
    432da6985222f9ace31eb15b2bef03d56f4df846
  • SHA256:
    1b410bc2457fe408e14aa1d0770feb9d2c2d59c0546118aad108071cf57c45ca
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 17/57

IPs

IP Country Detection
5.79.72.163
Netherlands

Domains

Name IP Detection
teknik.io
5.79.72.163
u.teknik.io
0.0.0.0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KW1NULI9\9Pnzw[1].jpg
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT
data
#
C:\Users\user\AppData\Roaming\COGRANT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Temp\CabE0BA.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\Desktop\~$VID-19 FUNDING ELIGIBILITY FORM.doc
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UB4QDDIP8FMS37FBVAXA.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A53N1HG3Y9O2F7Y1825A.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1T2WXIR1U2XGLTHY9F74.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\COVID-19 FUNDING ELIGIBILITY FORM.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Tue Jan 28 13:45:43 2020, atime=Mon Jun 8 19:08:11 2020, length=312453, window=hide
#
C:\Users\user\AppData\Local\Temp\TarE0BB.tmp
data
#
C:\Users\user\AppData\Local\Temp\OICE_35138ED5-EDCD-4B97-8A47-14BA07197A73.0\FLEDC2.tmp
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\Abctfhghghghgh .scT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEA46C63-E2E2-4F3A-9C52-D5F9B1AD514B}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6DFA9B6E-BFF6-4A50-ABEB-6963368E479F}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{24E1C005-E9C2-467C-8574-EBB235553AEF}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A82BECE2.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\61AA125.png
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#