top title background image
flash

OD29081792Y_COVID-19_SARS-CoV-2.doc

Status: finished
Submission Time: 2020-10-20 19:35:30 +02:00
Malicious
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    301278
  • API (Web) ID:
    498576
  • Analysis Started:
    2020-10-20 19:36:17 +02:00
  • Analysis Finished:
    2020-10-20 19:43:17 +02:00
  • MD5:
    d1fcf31c2fe944f130aefab45c1aec24
  • SHA1:
    bd993106342e00b1a7fc1e37cf630d0f7ccf6132
  • SHA256:
    a5e702d8c15eeeb6ff8dc94c5f594cf254931d5356baa2cc393211565a45e822
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 33/62
malicious
Score: 18/48

IPs

IP Country Detection
75.188.96.231
United States
34.216.212.23
United States
185.245.99.2
Germany
Click to see the 3 hidden entries
102.130.115.168
South Africa
37.130.113.153
Turkey
172.67.207.127
United States

Domains

Name IP Detection
mantaspesadas.com
34.216.212.23
zakariabek.com
185.245.99.2
etkindedektiflik.com
37.130.113.153
Click to see the 2 hidden entries
ozonerenovaters.co.za
102.130.115.168
sezard.com
172.67.207.127

URLs

Name Detection
http://75.188.96.231/II02T/NCbinDn35e4UpIvZ/
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Click to see the 2 hidden entries
http://mantaspesadas.com/wp-includes/agV/
https://www.cloudflare.com/5xx-error-landing

Dropped files

Name File Type Hashes Detection
C:\Users\user\Ucj49ms\Xsi8l8u\Wr01eygv7.exe
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58918 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
Click to see the 11 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4AB98AA7-B28F-4AE5-86AD-026C320EA73C}.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabAE2B.tmp
Microsoft Cabinet archive data, 58918 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\TarAE2C.tmp
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\OD29081792Y_COVID-19_SARS-CoV-2.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Aug 26 14:08:13 2020, atime=Wed Oct 21 01:36:34 2020, length=157696, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\225NMRNSFKA2K6AQLTRE.temp
data
#
C:\Users\user\Desktop\~$29081792Y_COVID-19_SARS-CoV-2.doc
data
#