IOCReport

loading gif

Files

File Path
Type
Category
Malicious
280072109764552.doc
Rich Text Format data, unknown version
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\09867654270721.PDF[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\name.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{238E66D8-299E-4B99-A605-44EE5B79BCDD}.tmp
data
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B83DDB5-D064-451A-A615-F9D5A3E063B2}.tmp
data
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E2185495-5638-43A1-A616-4B202C23444A}.tmp
data
dropped
clean
C:\Users\user\AppData\Local\Temp\bhv53DC.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x63a10f1a, page size 32768, DirtyShutdown, Windows version 6.1
dropped
clean
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\280072109764552.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17 2020, mtime=Wed Aug 26 14:08:17 2020, atime=Wed Jul 28 23:00:39 2021, length=2202571, window=hide
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
clean
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
dropped
clean
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
dropped
clean
C:\Users\user\Desktop\~$0072109764552.doc
data
dropped
clean
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
malicious
C:\Users\user\AppData\Roaming\name.exe
'C:\Users\user\AppData\Roaming\name.exe'
malicious
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
clean

URLs

Name
IP
Malicious
http://ns.adobe.c/s
unknown
clean
http://crl.entrust.net/server1.crl0
unknown
clean
http://ocsp.entrust.net03
unknown
clean
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
clean
http://pki.goog/gsr2/GTS1O1.crt0
unknown
clean
http://www.diginotar.nl/cps/pkioverheid0
unknown
clean
http://n.f
unknown
clean
https://pki.goog/repository/0
unknown
clean
http://schema.org/WebPage
unknown
clean
http://ns.adobede
unknown
clean
http://ftp.vngpack.com
unknown
clean
https://www.google.com
unknown
clean
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
clean
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
clean
http://ns.ao
unknown
clean
http://crl.pki.goog/GTS1O1core.crl0
unknown
clean
http://whatismyipaddress.com/-
unknown
clean
https://www.google.com/accounts/servicelogin
unknown
clean
http://www.%s.comPA
unknown
clean
https://login.yahoo.com/config/login
unknown
clean
http://www.site.com/logs.php
unknown
clean
http://crl.pki.goog/gsr2/gsr2.crl0?
unknown
clean
http://www.nirsoft.net/
unknown
clean
http://ocsp.entrust.net0D
unknown
clean
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
clean
https://secure.comodo.com/CPS0
unknown
clean
https://www.google.com/
unknown
clean
http://crl.entrust.net/2048ca.crl0
unknown
clean
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vecvietnam.com.vn
103.255.237.180
malicious
ftp.vngpack.com
45.141.152.18
malicious
3.246.11.0.in-addr.arpa
unknown
malicious
www.google.com
142.250.203.100
clean

IPs

IP
Domain
Country
Malicious
103.255.237.180
vecvietnam.com.vn
Viet Nam
malicious
45.141.152.18
ftp.vngpack.com
Romania
malicious
142.250.203.100
www.google.com
United States
clean

Registry

Path
Value
Malicious
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
Hidden
malicious
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
jq9
clean
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
MTTT
clean
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
2s9
clean