flash

PQ.411.xls

Status: finished
Submission Time: 30.06.2020 17:08:26
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    242320
  • API (Web) ID:
    380359
  • Analysis Started:
    30.06.2020 17:08:27
  • Analysis Finished:
    30.06.2020 17:19:51
  • MD5:
    10dfe870c55418f760bb649a7b015b8c
  • SHA1:
    27988f3bc5c83e83912e43db709914e3399f97a8
  • SHA256:
    9d3fcc86eedbe152ee398bfc4ef95a9dd16e6448e07ae4cc65bc932631459d2c
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
88/100

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Run Condition: Potential for more IOCs and behavior

malicious
80/100

IPs

IP Country Detection
134.122.4.1
United States
103.212.121.67
India
45.40.152.13
United States
Click to see the 1 hidden entries
167.99.107.207
United States

Domains

Name IP Detection
designerremodeling.com
45.40.152.13
septatechnology.com
103.212.121.67
helpdallas.org
167.99.107.207
Click to see the 1 hidden entries
healsoul.thememove.com
134.122.4.1

Dropped files

Name File Type Hashes Detection
C:\Users\Public\EaPtWQ.html
ASCII text, with very long lines, with no line terminators
#
C:\Users\Public\Neu.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
Click to see the 14 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1OGOKHA0\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4P0F9XS0\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EMZSFHLB\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\59030000
data
#
C:\Users\user\AppData\Local\Temp\CabB02A.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\TarB035.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Sun May 31 14:09:27 2020, atime=Sun May 31 14:09:27 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PQ.411.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Sun May 31 14:09:27 2020, atime=Sun May 31 14:09:27 2020, length=137728, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\A1130000
Applesoft BASIC program data, first line number 16
#
C:\Users\Public\FBI.txt
ASCII text, with CRLF line terminators
#