top title background image
flash

PhishInABarrel.doc

Status: finished
Submission Time: 2020-09-26 16:05:14 +02:00
Malicious
Exploiter
Evader

Comments

Tags

Details

  • Analysis ID:
    290381
  • API (Web) ID:
    475862
  • Analysis Started:
    2020-09-26 16:05:18 +02:00
  • Analysis Finished:
    2020-09-26 16:09:59 +02:00
  • MD5:
    dba08325359f68b13164977df0c0c443
  • SHA1:
    ae8901764520fedb5c790df660aecf38d97d8cae
  • SHA256:
    02515010ed03229db70dead5510a90d16bb4e671756312b573910f13952a840b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 38/62
malicious
Score: 24/48
malicious

Domains

Name IP Detection
aluga-design.htb
0.0.0.0
evil.htb
0.0.0.0
madding.htb
0.0.0.0
Click to see the 2 hidden entries
wepfunds.htb
0.0.0.0
lewistonsports.htb
0.0.0.0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4AB681F7-B28F-4AE5-86AD-026C320EA73C}.tmp
data
#
C:\Users\user\AppData\Local\Temp\imgs\cscheme.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\imgs\editdata.mso
data
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Temp\imgs\filelist.xml
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\imgs\img001.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 670x272, frames 3
#
C:\Users\user\AppData\Local\Temp\imgs\img002.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 624x253, frames 3
#
C:\Users\user\AppData\Local\Temp\imgs\theme.thm
Microsoft OOXML
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PhishInABarrel.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Wed Aug 26 14:08:14 2020, atime=Sat Sep 26 22:05:36 2020, length=91648, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EMPXIFH9PQ48OHT6NBLK.temp
data
#
C:\Users\user\Desktop\~$ishInABarrel.doc
data
#