top title background image
flash

SecuriteInfo.com.Exploit.Siggen2.12943.15385.doc

Status: finished
Submission Time: 2020-08-01 21:39:31 +02:00
Malicious
Phishing
E-Banking Trojan
Trojan
Spyware
Evader
Emotet MailPassView

Comments

Tags

Details

  • Analysis ID:
    255710
  • API (Web) ID:
    406960
  • Analysis Started:
    2020-08-02 00:14:53 +02:00
  • Analysis Finished:
    2020-08-02 00:29:48 +02:00
  • MD5:
    36fea8be4bf559852cc841616ff794d8
  • SHA1:
    8aad9e4cb79ba290cae31a510e3b744367f5326d
  • SHA256:
    43b649f8d39c8356d4c4920c61581ed58f90e56954ed5f90481f3b09cd059be0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
50.31.160.189
United States
185.94.252.13
Germany
73.116.193.136
United States
Click to see the 2 hidden entries
162.144.105.201
United States
88.217.172.65
Germany

Domains

Name IP Detection
jkncrew.com
50.31.160.189
cdn.onenote.net
0.0.0.0
asf-ris-prod-neurope.northeurope.cloudapp.azure.com
168.63.67.155
Click to see the 1 hidden entries
jmlandscapingservice.com
162.144.105.201

URLs

Name Detection
https://185.94.252.13:443/c30TGt0oZY/nRvqNsTCJE4pySgd7H9/WUA2QRQo37JD/
https://185.94.252.13:443/I4YV/
http://jkncrew.com/cgi-bin/KhSO16ZAAf/
Click to see the 73 hidden entries
https://185.94.252.13:443/Buooish6GSBz/
https://185.94.252.13:443/slt8tXRcU9gh/qyntj3OcAf/jnuisYRQq2a/sBeCxff09ks/TxrMGiSDda3t/
https://185.94.252.13:443/L9ZtGO/
http://185.94.252.13:443/L9ZtGO/
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations
https://profile.xboxlive.com/users/batch/profile/settings
http://88.217.172.65:443/yfWOtgOeLqG/iUyst3sJZ1/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
http://www.windowsphone.com/
https://dev.virtualearth.net/REST/v1/Routes/
https://login.li
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
http://wellformedweb.org/CommentAPI/
http://jimlowry.com/dlqCTc01p/
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
http://185.94.252.13:443/Buooish6GSBz/
http://88.217.172.65:443/yfWOtgOeLqG/iUyst3sJZ1/lj:J
https://dev.ditu.live.com/REST/v1/Locations
http://185.94.252.13/c30TGt0oZY/nRvqNsTCJE4pySgd7H9/WUA2QRQo37JD/
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
http://88.217.172.65:443/yfWOtgOeLqG/iUyst3sJZ1/5
http://tile-service.we:443/I4YV/
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
http://88.217.172.65:443/yfWOtgOeLqG/iUyst3sJZ1//
https://88.217.172.65:443/yfWOtgOeLqG/iUyst3sJZ1/
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://dev.virtualearth.net/REST/v1/Routes/Transit
http://185.94.252.13/slt8tXRcU9gh/qyntj3OcAf/jnuisYRQq2a/sBeCxff09ks/TxrMGiSDda3t/HY
https://dynamic.t
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
http://jmlandscapingservice.com/content/fhGAfKs/
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://dev.ditu.live.com/mapcontrol/logging.ashx
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
http://88.217.172.65:443/yfWOtgOeLqG/iUyst3sJZ1/R
http://www.nirsoft.net
http://185.94.252.13:443/slt8tXRcU9gh/qyntj3OcAf/jnuisYRQq2a/sBeCxff09ks/TxrMGiSDda3t/A
https://dev.virtualearth.net/REST/v1/Routes/Walking
http://185.94.252.13/L9ZtGO/
http://73.116.193.136/22ARPUlpcy1K/v9gsqJESJYy5WDmmDPc/93xOnbVnEqPkGBJ/
http://185.94.252.13:443/L9ZtGO/x
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://live.xbox.com/purchase/xbox/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://dev.ditu.live.com/REST/v1/Routes/
http://185.94.252.13/I4YV/
https://appexmapsappupdate.blob.core.windows.net
https://login.windows.net/common
http://johnkeanestudios.com/r00t/vAWElRm/
http://185.94.252.13:443/slt8tXRcU9gh/qyntj3OcAf/jnuisYRQq2a/sBeCxff09ks/TxrMGiSDda3t/
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
http://185.94.252.13:443/I4YV/
http://www.bingmapsportal.com
http://www.lesliemontenegro.com/wp-includes/I1hHqDE6/
http://www.nirsoft.net/
https://picsart.com/privacy-policy?hl=en
https://login.yahoo.com/config/login
http://88.217.172.65/yfWOtgOeLqG/iUyst3sJZ1/
http://185.94.252.13:443/c30TGt0oZY/nRvqNsTCJE4pySgd7H9/WUA2QRQo37JD/
https://storeedgefd.dsx.mp.microsoft.c
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
http://73.116.193.136/22ARPUlpcy1K/v9gsqJESJYy5WDmmDPc/93xOnbVnEqPkGBJ/Q
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
http://www.xbox.com/

Dropped files

Name File Type Hashes Detection
C:\Windows\SysWOW64\olecli32\KernelBaseoe.exe
PE32+ executable (console) x86-64, for MS Windows
#
C:\Users\user\545.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Documents\20200802\PowerShell_transcript.579569.3ZGnUeWK.20200802001556.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
Click to see the 31 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\ISO690Nmerical.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\ISO690.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\MLASeventhEditionOfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\SIST02.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\TURABIAN.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\MSO1033.acl
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Siggen2.12943.15385.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Aug 2 06:15:42 2020, mtime=Sun Aug 2 06:15:51 2020, atime=Sun Aug 2 06:15:46 2020, length=182272, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Directory, ctime=Sun Aug 2 06:15:49 2020, mtime=Sun Aug 2 06:16:56 2020, atime=Sun Aug 2 06:16:56 2020, length=0, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
#
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.Siggen2.12943.15385.doc
data
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
data
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\IEEE2006OfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\HarvardAnglia2008OfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GostTitle.XSL
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GostName.XSL
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GB.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\CHICAGO.XSL
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\APASixthEditionOfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qawxgynt.ra3.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxya0hg2.u0d.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\A714.tmp
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\6EB7E834-42D4-42B1-AFB5-2B61D5279354
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1ab8740e, page size 16384, DirtyShutdown, Windows version 10.0
#