top title background image
flash

Statement.doc

Status: finished
Submission Time: 2021-01-27 19:01:56 +01:00
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

  • doc

Details

  • Analysis ID:
    345151
  • API (Web) ID:
    592207
  • Analysis Started:
    2021-01-27 19:11:33 +01:00
  • Analysis Finished:
    2021-01-27 19:25:04 +01:00
  • MD5:
    854716b6ff05f02534960443c94340a1
  • SHA1:
    6955e99f687a65747a95745b721c43543f3cf389
  • SHA256:
    1421f7c867ff97c915fab1236fe5277b3116b426c0102f805fab25ef19fc681c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 27/60
malicious
Score: 27/46

IPs

IP Country Detection
84.38.135.158
Latvia
46.243.219.32
Netherlands

Domains

Name IP Detection
dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu
46.243.219.32
manojvashanava234.sytes.net
84.38.135.158

URLs

Name Detection
http://manojvashanava234.sytes.net/WAH.exe
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.

Dropped files

Name File Type Hashes Detection
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmp6D54.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
Non-ISO extended-ASCII text, with no line terminators
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Roaming\JNM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68A17DB9.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{08186652-BACB-4000-A55F-0BCBA7498F21}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{55454834-8E09-401E-A760-1A1C7B299BE3}.tmp
data
#
C:\Users\user\AppData\Local\Temp\tmp5A32.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Statement.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Thu Jan 28 02:12:38 2021, length=111234, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$atement.doc
data
#