flash

pay4999.xls

Status: finished
Submission Time: 30.06.2020 17:36:49
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    242332
  • API (Web) ID:
    380383
  • Analysis Started:
    30.06.2020 17:36:50
  • Analysis Finished:
    30.06.2020 17:52:11
  • MD5:
    5934615fa45f1a7823adcd8caf92f495
  • SHA1:
    693ab2b6783e77528792743210a5999ed38864e8
  • SHA256:
    cc9e611a324ac6d7da1ae84616d7f41d12f0026aa7fbc53daac0f92c4c8394c9
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113)

malicious
88/100

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Run Condition: Potential for more IOCs and behavior

malicious
80/100

IPs

IP Country Detection
134.122.4.1
United States
103.212.121.67
India
45.40.152.13
United States
Click to see the 1 hidden entries
167.99.107.207
United States

Domains

Name IP Detection
designerremodeling.com
45.40.152.13
septatechnology.com
103.212.121.67
helpdallas.org
167.99.107.207
Click to see the 1 hidden entries
healsoul.thememove.com
134.122.4.1

Dropped files

Name File Type Hashes Detection
C:\Users\Public\S7BJaQa.html
ASCII text, with very long lines, with no line terminators
#
C:\Users\Public\tfpm.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
Click to see the 14 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FCHMIQQ4\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPQHCSV4\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q9TVVS96\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\81430000
data
#
C:\Users\user\AppData\Local\Temp\CabE6EE.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\TarE6EF.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Sun May 31 14:37:39 2020, atime=Sun May 31 14:37:39 2020, length=12288, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\pay4999.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:50 2020, mtime=Sun May 31 14:37:39 2020, atime=Sun May 31 14:37:39 2020, length=136192, window=hide
#
C:\Users\user\Desktop\82430000
Applesoft BASIC program data, first line number 16
#
C:\Users\Public\bYdo.txt
ASCII text, with CRLF line terminators
#