top title background image
flash

YB-8233 Medical report Covid-19.doc

Status: finished
Submission Time: 2020-10-08 06:25:26 +02:00
Malicious
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    294878
  • API (Web) ID:
    484871
  • Analysis Started:
    2020-10-08 06:33:33 +02:00
  • Analysis Finished:
    2020-10-08 06:46:29 +02:00
  • MD5:
    5c122f437792044602513293c000f2ee
  • SHA1:
    5248540917b666a5b29e17bd0a3f48e449c55c43
  • SHA256:
    13aba609d1713710eb16c919ad9cd66fbc0ff4c429d10f461999d7420c83d214
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 45/61
malicious
Score: 25/38
malicious
Score: 27/29
malicious
malicious

IPs

IP Country Detection
71.72.196.159
United States
118.67.244.60
India
134.209.36.254
United States

Domains

Name IP Detection
dheeranet.com
118.67.244.60

URLs

Name Detection
http://134.209.36.254:8080/f7YD1hNm/kOjJqGsox2tyoGm3/5IIuqslJ51QysDt7g/
http://dheeranet.com/Pej/
http://www.%s.comPA
Click to see the 1 hidden entries
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.

Dropped files

Name File Type Hashes Detection
C:\Users\user\DFbqmK5\A_jz4O5\Kvc2gdn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BD6F1D23-4E04-4856-9DA8-291722E1F767}.tmp
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\YB-8233 Medical report Covid-19.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:11 2020, mtime=Wed Aug 26 14:08:11 2020, atime=Thu Oct 8 12:34:31 2020, length=167424, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q2RI3ZU4PYVIQ7IJA9E6.temp
data
#
C:\Users\user\Desktop\~$-8233 Medical report Covid-19.doc
data
#