flash

gEmfqRhF5A.doc

Status: finished
Submission Time: 17.08.2020 18:50:45
Malicious
E-Banking Trojan
Trojan
Evader
Emotet

Comments

Tags

  • doc
  • emotet
  • epoch2

Details

  • Analysis ID:
    269490
  • API (Web) ID:
    434199
  • Analysis Started:
    18.08.2020 01:37:21
  • Analysis Finished:
    18.08.2020 01:48:10
  • MD5:
    fc579910c8aff0f1ed43c504df1ad50b
  • SHA1:
    396b6c8f4990ca63769063c407deeac0b4d7bf61
  • SHA256:
    84a330ed2f11b4e9eb2457f5667d9722fc79a4d00de0c564ac00406c0164e8b0
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

IPs

IP Country Detection
68.44.137.144
United States
69.30.203.214
United States
112.213.89.143
Viet Nam

Domains

Name IP Detection
eepvn.com
112.213.89.143

URLs

Name Detection
https://api.diagnosticssdf.office.com
https://login.microsoftonline.com/
https://shell.suite.office.com:1443
Click to see the 97 hidden entries
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
https://dev.ditu.live.com/REST/v1/Routes/
https://t0.tiles.ditu.live.com/tiles/gen
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
https://cdn.entity.
https://wus2-000.contentsync.
https://clients.config.office.net/user/v1.0/tenantassociationkey
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://powerlift.acompli.net
https://rpsticket.partnerservices.getmicrosoftkey.com
https://lookup.onenote.com/lookup/geolocation/v1
https://cortana.ai
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://cloudfiles.onenote.com/upload.aspx
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
https://entitlement.diagnosticssdf.office.com
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
https://api.aadrm.com/
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
http://www.xbox.com/
https://ofcrecsvcapi-int.azurewebsites.net/
http://69.30.203.214:8080/KzS9c4VY7MK88tDA/epq6xqfMb5j/1w9Dtgs5CNvrJ/
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://storeedgefd.dsx.mp.microsoft.c
http://www.hulu.com/terms
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
https://api.microsoftstream.com/api/
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
http://eepvn.com/con7ext_sym404/agbx_a2n7_pmie9uf/
https://cr.office.com
https://havanmobile.vn/wp-admin/d5x_y_4uoweoinb/
https://appexmapsappupdate.blob.core.windows.net
https://portal.office.com/account/?ref=ClientMeControl
http://www.bingmapsportal.com
https://ecs.office.com/config/v2/Office
https://graph.ppe.windows.net
https://res.getmicrosoftkey.com/api/redemptionevents
https://powerlift-user.acompli.net
https://tasks.office.com
https://officeci.azurewebsites.net/api/
https://login.windows.net/common
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
https://www.hulu.com/do-not-sell-my-info
https://store.office.cn/addinstemplate
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://wus2-000.pagecontentsync.
https://outlook.office.com/autosuggest/api/v1/init?cvid=
https://dev.virtualearth.net/REST/v1/Routes/
https://globaldisco.crm.dynamics.com
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://store.officeppe.com/addinstemplate
https://dev0-api.acompli.net/autodetect
https://www.odwebp.svc.ms
https://api.powerbi.com/v1.0/myorg/groups
https://web.microsoftstream.com/video/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://profile.xboxlive.com/users/batch/profile/settings
https://graph.windows.net
https://dataservice.o365filtering.com/
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
http://mjk-s.com.ua/wp-content/wr_pgu_kqegor6f/
https://officesetup.getmicrosoftkey.com
https://analysis.windows.net/powerbi/api
https://prod-global-autodetect.acompli.net/autodetect
http://www.hulu.com/privacy
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
https://outlook.office365.com/autodiscover/autodiscover.json
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://dynamic.t
http://cricfc.com/wp-admin/gmdmq_9w8l_ek/
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
http://weather.service.msn.com/data.aspx
https://apis.live.net/v5.0/
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://management.azure.com
https://incidents.diagnostics.office.com
https://clients.config.office.net/user/v1.0/ios
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://live.xbox.com/purchase/xbox/
https://insertmedia.bing.office.net/odc/insertmedia
https://o365auditrealtimeingestion.manage.office.com
http://69.30.203.214/KzS9c4VY7MK88tDA/epq6xqfMb5j/1w9Dtgs5CNvrJ/
https://outlook.office365.com/api/v1.0/me/Activities
https://incidents.diagnosticssdf.office.com
https://asgsmsproxyapi.azurewebsites.net/
https://clients.config.office.net/user/v1.0/android/policies
https://entitlement.diagnostics.office.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\X5cqpizh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Documents\20200818\PowerShell_transcript.376483.tBvygj5G.20200818013822.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
#
Click to see the 29 hidden entries
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x2334d0e2, page size 16384, DirtyShutdown, Windows version 10.0
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B652D5AA-60AF-474D-BADA-A958A52FF69B
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfpvdfpi.if5.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_isvzcog3.fkz.psm1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\APASixthEditionOfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\CHICAGO.XSL
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GB.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GostName.XSL
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\GostTitle.XSL
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\HarvardAnglia2008OfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\IEEE2006OfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\ISO690.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\ISO690Nmerical.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\MLASeventhEditionOfficeOnline.xsl
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\SIST02.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Bibliography\Style\TURABIAN.XSL
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\MSO1033.acl
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Directory, ctime=Tue Aug 18 07:38:13 2020, mtime=Tue Aug 18 07:39:21 2020, atime=Tue Aug 18 07:39:21 2020, length=0, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\gEmfqRhF5A.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 18 07:38:09 2020, mtime=Tue Aug 18 07:38:15 2020, atime=Tue Aug 18 07:38:12 2020, length=241664, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
#
C:\Users\user\Desktop\~$mfqRhF5A.doc
data
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
data
#