flash

DOC.exe

Status: finished
Submission Time: 18.11.2020 14:01:48
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe
  • NanoCore
  • RAT

Details

  • Analysis ID:
    319643
  • API (Web) ID:
    541077
  • Analysis Started:
    18.11.2020 14:12:30
  • Analysis Finished:
    18.11.2020 14:19:55
  • MD5:
    6ad10f04afb24c96187b76129225c00c
  • SHA1:
    561fed791a4a4a10ec9889e3e30f0c4e0db80fd0
  • SHA256:
    c8d2f56a87705f11451e14e6ed7fe90a5b995b3e7f668811fb2f43a8f4325579
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
9/48

IPs

IP Country Detection
23.105.131.162
United States

URLs

Name Detection
http://www.zhongyicts.com.cnue
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
Click to see the 58 hidden entries
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.jiyu-kobo.co.jp/Webd
http://www.jiyu-kobo.co.jp/jp/0
http://www.tiro.com
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
http://www.carterandcone.com
http://www.sajatypeworks.com
http://www.jiyu-kobo.co.jp/9
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.jiyu-kobo.co.jp/jp/f
http://www.fontbureau.comcom
http://www.jiyu-kobo.co.jp/0
http://www.fontbureau.com0
http://www.galapagosdesign.com/DPlease
http://www.jiyu-kobo.co.jp/Y0
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.jiyu-kobo.co.jp/Regux
http://www.sakkal.com
http://www.carterandcone.como.Z
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.galapagosdesign.com/
http://www.fontbureau.comF
http://www.jiyu-kobo.co.jp/S
http://www.fontbureau.com/f
http://www.sajatypeworks.comeuG
http://www.jiyu-kobo.co.jp/J
http://www.galapagosdesign.com/A
http://www.fontbureau.comsiefx
http://www.fontbureau.comlicdS
http://www.jiyu-kobo.co.jp/jp/
http://www.jiyu-kobo.co.jp/Conn
http://www.carterandcone.coml
http://www.fontbureau.com.TTFJ
http://www.founder.com.cn/cn/
http://www.carterandcone.comizey
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn
http://www.jiyu-kobo.co.jp/x
http://www.fontbureau.com/designers/frere-jones.html
http://www.sajatypeworks.comte?
http://www.jiyu-kobo.co.jp/anie
http://www.jiyu-kobo.co.jp/Y0so
http://www.jiyu-kobo.co.jp/
http://www.fontbureau.com/designers8
http://www.fontbureau.comgrita9
http://www.jiyu-kobo.co.jp/h
http://www.fontbureau.comFm.
http://www.jiyu-kobo.co.jp/f
http://www.fontbureau.comgretaJ

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\DOC.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp3870.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\CZOIAvjovs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 4 hidden entries
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
data
#