top title background image
flash

SecuriteInfo.com.Exploit.Rtf.Obfuscated.16.20877.rtf

Status: finished
Submission Time: 2020-09-15 20:40:09 +02:00
Malicious
Trojan
Spyware
Exploiter
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    285939
  • API (Web) ID:
    467049
  • Analysis Started:
    2020-09-15 20:40:10 +02:00
  • Analysis Finished:
    2020-09-15 20:51:56 +02:00
  • MD5:
    4ef5fdb1b7c6dccd281fe0d5ffa7e4e0
  • SHA1:
    0894521569d2f24ae65c683975955eb3bc899936
  • SHA256:
    68fd625e6c7c05c9300c163f1d711e8334432cd0f13ba71307ccabd1fb0cdb1b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 32/68
malicious
Score: 29/48
malicious

IPs

IP Country Detection
155.159.203.193
South Africa
194.180.224.87
unknown
185.68.16.40
Ukraine
Click to see the 3 hidden entries
23.227.38.64
Canada
104.28.23.124
United States
213.136.64.212
Germany

Domains

Name IP Detection
www.cdershoushichang.com
155.159.203.193
www.yumesouko.xyz
104.28.23.124
www.ok2cash.com
185.68.16.40
Click to see the 7 hidden entries
gooddns.ir
194.180.224.87
shops.myshopify.com
23.227.38.64
www.cosyduck.com
213.136.64.212
www.bestselfietools.com
0.0.0.0
www.davabeauty.com
0.0.0.0
www.studentsofboogaloo.com
0.0.0.0
www.hiperwindow.com
121.254.178.253

URLs

Name Detection
http://www.davabeauty.com/0tog/?MTd0k8=FRMdZtA03hs0gRd&RJ=nfXISCjhjC7s0tDIdrvvWtjdlx5A9d/AXTr4p7e2+56EZLe0ecvQjkjYCZKFZM5AeaaxXA==
http://www.ok2cash.com/0tog/?RJ=OQGtohwKn+lRlmd4vLt4lhfw+lOrC1vuoFIiMf/fjCRrEB73gAumdJEpsOpIso/KEKmMWw==&MTd0k8=FRMdZtA03hs0gRd&faoo=rBWlxtr0
http://google.pchome.com.tw/
Click to see the 97 hidden entries
http://search.nifty.com/
http://www.gmarket.co.kr/
http://search.ebay.com/
http://search.yahoo.co.jp/favicon.ico
http://openimage.interpark.com/interpark.ico
http://search.sify.com/
http://www.ozu.es/favicon.ico
http://espanol.search.yahoo.com/
http://uk.search.yahoo.com/
http://www.rambler.ru/favicon.ico
http://list.taobao.com/browse/search_visual.htm?n=15&q=
http://searchresults.news.com.au/
http://browse.guardian.co.uk/favicon.ico
http://www.pchome.com.tw/favicon.ico
http://busca.buscape.com.br/favicon.ico
http://sads.myspace.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://www.amazon.de/
http://www.ceneo.pl/
http://search.auction.co.kr/
http://www.google.it/
http://suche.t-online.de/
http://search.centrum.cz/
http://www.target.com/
http://search.espn.go.com/
http://investor.msn.com/
http://search.ipop.co.kr/favicon.ico
http://search.interpark.com/
http://suche.freenet.de/favicon.ico
http://search.seznam.cz/favicon.ico
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://cgi.search.biglobe.ne.jp/
http://www.tesco.com/
http://www.iask.com/
http://search.orange.co.uk/favicon.ico
http://buscador.terra.es/
http://www.priceminister.com/favicon.ico
http://search.yahoo.co.jp
http://auto.search.msn.com/response.asp?MT=
http://cnweb.search.live.com/results.aspx?q=
http://busca.orange.es/
http://www.asharqalawsat.com/
http://images.joins.com/ui_c/fvc_joins.ico
http://search.ebay.it/
http://www.univision.com/
http://www.soso.com/
http://www.google.cz/
http://www.google.si/
http://www.iis.fhg.de/audioPA
http://msk.afisha.ru/
http://%s.com
http://image.excite.co.jp/jp/favicon/lep.ico
http://search.ebay.in/
http://img.shopzilla.com/shopzilla/shopzilla.ico
https://www.cosyduck.com/0tog/?MTd0k8=FRMdZtA03hs0gRd&RJ=F9TREL9h7zvHBUcwPq92ct
http://in.search.yahoo.com/
http://rover.ebay.com
http://fr.search.yahoo.com/
http://asp.usatoday.com/
http://www.sogou.com/favicon.ico
http://www.mozilla.com0
http://www.msn.com/?ocid=iehps
http://search.yahoo.com/favicon.ico
http://buscar.ya.com/
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
http://www3.fnac.com/favicon.ico
http://www.dailymail.co.uk/
http://www.nifty.com/favicon.ico
http://www.rambler.ru/
http://www.mtv.com/
http://search.ebay.de/
http://www.merlin.com.pl/favicon.ico
http://www.mercadolivre.com.br/
http://search.daum.net/
http://search.chol.com/favicon.ico
http://www.ask.com/
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
http://busca.igbusca.com.br/
http://search.about.com/
http://kr.search.yahoo.com/
http://buscar.ozu.es/
http://www.clarin.com/favicon.ico
http://search.msn.co.jp/results.aspx?q=
http://search.naver.com/favicon.ico
http://www.cjmall.com/
http://www.abril.com.br/favicon.ico
http://cgi.search.biglobe.ne.jp/favicon.ico
http://search.hanafos.com/favicon.ico
http://www.google.ru/
http://search.naver.com/
http://it.search.dada.net/favicon.ico
http://www.etmall.com.tw/favicon.ico
http://www.ya.com/favicon.ico
http://www.windows.com/pctv.
http://search.rediff.com/
http://busca.igbusca.com.br//app/static/images/favicon.ico

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bobbyx[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\bobys4665.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EC948C2F-5218-4A38-A692-F6FECB16C1E9}.tmp
data
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F5188A82-B174-499E-B3BD-E7523F18DF93}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Rtf.Obfuscated.16.20877.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 16 02:40:37 2020, mtime=Wed Sep 16 02:40:37 2020, atime=Wed Sep 16 02:40:39 2020, length=394251, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.Rtf.Obfuscated.16.20877.rtf
data
#