flash

WFCDopUaDQ.exe

Status: finished
Submission Time: 15.11.2020 08:03:18
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

Details

  • Analysis ID:
    316987
  • API (Web) ID:
    535775
  • Analysis Started:
    15.11.2020 08:10:03
  • Analysis Finished:
    15.11.2020 08:23:14
  • MD5:
    a79e92cc145ea8407a4ed30fee0a912b
  • SHA1:
    7a8ea767226ef0da7ed927f9e1a8b57418cdb916
  • SHA256:
    6e576c6aee1a0e3adf5e36c0ae52d1eda0ec0171fe8163bb0983f62a0e23c0da
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
46/72

malicious
19/37

malicious
34/48

malicious

URLs

Name Detection
http://pomf.cat/upload.php&https://a.pomf.cat/
http://pomf.cat/upload.php
http://pomf.cat/upload.phpCContent-Disposition:
Click to see the 18 hidden entries
https://contextual.media
https://a.pomf.cat/
https://login.microsoftonline.com/common/oauth2/authorize?client_id=
https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
https://contextual.media.net/checksync.php?&vsSync=1bh
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=58648497779
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
https://contextual.media.net/checksync.php?&vsSync=1&cs=
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
https://login.yahoo.com/config/login
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
http://www.nirsoft.net
http://www.nirsoft.net/
https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5864849777998;gt
http://bot.whatismyipaddress.com/
https://contextual.m

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\chrome\microsoft.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeviceProperties.url
MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\user\AppData\Local\Temp\chrome\DeviceProperties.vbs>), ASCII text, with CR line terminators
#
C:\Users\user\AppData\Local\Temp\3d7b2230-2812-c499-6f9c-e0286170e62b
ASCII text, with no line terminators
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Temp\chrome\DeviceProperties.vbs
ASCII text, with CR line terminators
#
C:\Users\user\AppData\Local\Temp\tmp7A6D.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmp9AD.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#