flash

Factura.docx

Status: finished
Submission Time: 09.06.2020 21:41:50
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla GuLoader

Comments

Tags

Details

  • Analysis ID:
    237101
  • API (Web) ID:
    370222
  • Analysis Started:
    09.06.2020 21:41:51
  • Analysis Finished:
    09.06.2020 21:56:07
  • MD5:
    42dbae807d20dbacc52b4530f01fec9a
  • SHA1:
    264d3851de194ca25119fa2ba788d1d1f81d1fad
  • SHA256:
    b18f96dd5b69bc677dadaadf2c1b6587412ba42a10bc6217367a12c6df5e087d
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
100/100

malicious
22/61

malicious
7/38

malicious
14/48

IPs

IP Country Detection
103.99.1.165
Viet Nam
185.92.245.159
Spain
216.58.207.33
United States

Domains

Name IP Detection
mkpksb2stdywhatsapphappentomaninliveso.duckdns.org
103.99.1.165
mail.ovidiogarcia.com
185.92.245.159
googlehosted.l.googleusercontent.com
216.58.207.33
Click to see the 1 hidden entries
doc-0o-9g-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
http://eYifB0NwlB.net
http://mkpksb2stdywhatsapphappentomaninliveso.duckdns.org/document/invoice_111334.doc
http://mkpksb2stdywhatsapphappentomaninliveso.duckdns.org/document/
Click to see the 97 hidden entries
http://www.ancert.com/cps0
http://ca.sia.it/seccli/repository/CRL.der0J
http://www.registradores.org/scr/normativa/cp_f2.htm0
http://www.signatur.rtr.at/de/directory/cps.html0
http://www.echoworx.com/ca/root2/cps.pdf0
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
http://www.a-cert.at0E
http://www.certplus.com/CRL/class3.crl0
http://www.e-me.lv/repository0
http://www.acabogacia.org/doc0
http://crl.chambersign.org/chambersroot.crl0
http://acraiz.icpbrasil.gov.br/LCRacraiz.crl0
http://www.certifikat.dk/repository0
http://www.chambersign.org1
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
http://www.diginotar.nl/cps/pkioverheid0
http://repository.swisssign.com/0
http://crl.ssc.lt/root-c/cacrl.crl0
https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
https://doc-0o-9g-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/3emi468v
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
http://ca.disig.sk/ca/crl/ca_disig.crl0
http://www.certplus.com/CRL/class3P.crl0
http://repository.infonotary.com/cps/qcps.html0$
http://www.post.trust.ie/reposit/cps.html0
http://www.certplus.com/CRL/class2.crl0
http://www.disig.sk/ca/crl/ca_disig.crl0
http://ocsp.infonotary.com/responder.cgi0V
http://www.sk.ee/cps/0
http://www.certicamara.com0
http://www.globaltrust.info0=
https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E
http://crl.pki.goog/GTS1O1.crl0
http://www.ssc.lt/cps03
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0=
http://ocsp.pki.gva.es0
http://crl.oces.certifikat.dk/oces.crl0
http://crl.ssc.lt/root-b/cacrl.crl0
http://www.certicamara.com/dpc/0Z
http://crl.pki.wellsfargo.com/wsprca.crl0
http://ocsp.pki.goog/gts1o10
http://www.dnie.es/dpc0
http://www.rootca.or.kr/rca/cps.html0
http://pki.goog/gsr2/GTS1O1.crt0
http://www.trustcenter.de/guidelines0
http://ocsp.pki.goog/gsr202
http://pki-root.ecertpki.cl/CertEnroll/E-CERT%20ROOT%20CA.crl0
http://www.globaltrust.info0
https://pki.goog/repository/0
http://certificates.starfieldtech.com/repository/1604
http://www.certplus.com/CRL/class3TS.crl0
http://www.entrust.net/CRL/Client1.crl0
http://www.entrust.net/CRL/net1.crl0
https://www.catcert.net/verarrel
http://www.disig.sk/ca0f
http://www.e-szigno.hu/RootCA.crl
http://www.signatur.rtr.at/current.crl0
http://www.sk.ee/juur/crl/0
http://crl.chambersign.org/chambersignroot.crl0
http://crl.xrampsecurity.com/XGCA.crl0
http://www.quovadis.bm0
http://crl.ssc.lt/root-a/cacrl.crl0
http://www.trustdst.com/certificates/policy/ACES-index.html0
http://www.firmaprofesional.com0
http://crl.pki.goog/gsr2/gsr2.crl0?
https://www.netlock.net/docs
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
http://crl.entrust.net/2048ca.crl0
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
http://cps.chambersign.org/cps/publicnotaryroot.html0
http://www.e-trust.be/CPS/QNcerts
http://www.certicamara.com/certicamaraca.crl0
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
http://fedir.comsign.co.il/crl/ComSignCA.crl0
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0
http://ocsp.entrust.net03
http://cps.chambersign.org/cps/chambersroot.html0
http://www.acabogacia.org0
https://ca.sia.it/seccli/repository/CPS0
http://crl.securetrust.com/SGCA.crl0
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
http://crl.securetrust.com/STCA.crl0
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0
http://www.certicamara.com/certicamaraca.crl0;
http://www.e-szigno.hu/RootCA.crt0
http://www.quovadisglobal.com/cps0
http://mkpksb2stdywhatsapphappentomaninliveso.duckdns.org/mkpk2doc/regasm.exe
https://doc-0o-9g-docs.googleusercontent.com/mi
http://www.valicert.com/1
http://www.e-szigno.hu/SZSZ/0
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAII.crl0
https://ocsp.quovadisoffshore.com0
http://ocsp.entrust.net0D
http://cps.chambersign.org/cps/chambersignroot.html0
http://ca.sia.it/secsrv/repository/CRL.der0J
https://sectigo.com/CPS0
http://crl.entrust.net/server1.crl0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PZODCLB6\regasm[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
Click to see the 24 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B7D4FD39-A891-42FA-8D55-15B9E1CF9220}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{43D5BFD7-D340-4123-9392-8F06781B49CD}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5RH4U7DH\invoice_111334[1].doc
Rich Text Format data, unknown version
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\92651CB6.doc
Rich Text Format data, unknown version
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{03464B4C-4B2B-4221-8905-3A6694C8D9FC}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{88E114AE-22D3-47BE-96D0-AC46C105AB75}.tmp
dBase III DBT, version number 0, next free block index 7536653
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B81ECDC0-B29D-4E8A-8113-91428485A371}.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabEA42.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\TarEA43.tmp
data
#
C:\Users\user\AppData\Local\Temp\{C24A8970-5222-48BB-804D-013004BB39CD}
data
#
C:\Users\user\AppData\Local\Temp\{DDF4B9B3-767D-48A2-B6B4-A4615EAAA4C3}
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Factura.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:45 2020, mtime=Tue Jan 28 13:45:45 2020, atime=Tue Jun 9 18:42:10 2020, length=11762, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document on mkpksb2stdywhatsapphappentomaninliveso.duckdns.org.url
MS Windows 95 Internet shortcut text (URL=<http://mkpksb2stdywhatsapphappentomaninliveso.duckdns.org/document/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\invoice_111334.doc.url
MS Windows 95 Internet shortcut text (URL=<http://mkpksb2stdywhatsapphappentomaninliveso.duckdns.org/document/invoice_111334.doc>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\KACMWFJ5.txt
ASCII text
#
C:\Users\user\Desktop\~$actura.docx
data
#