top title background image
flash

payment_advice.doc

Status: finished
Submission Time: 2021-02-23 16:50:15 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla

Comments

Tags

  • doc

Details

  • Analysis ID:
    356799
  • API (Web) ID:
    615580
  • Analysis Started:
    2021-02-23 16:53:01 +01:00
  • Analysis Finished:
    2021-02-23 17:09:20 +01:00
  • MD5:
    0ea6e37e930278b71774ae91d68bb879
  • SHA1:
    5e3721c21b04c30c0f2d3b7e83b7bb506fd55cb8
  • SHA256:
    3fda6eb4d90828826854806f1956d0d4a20bf5f95eb917370ff05ba5ba1dde66
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 21/48
malicious

IPs

IP Country Detection
150.95.81.183
Singapore
103.35.120.75
India
172.67.172.17
United States

Domains

Name IP Detection
mail.tpcdel.com
103.35.120.75
tunedinblog.com
150.95.81.183
coroloboxorozor.com
172.67.172.17

URLs

Name Detection
http://tunedinblog.com/wp-includes/twox.exe
https://n2pGpXVLT5FR.net
http://coroloboxorozor.com/base/4AE44766E50C275550C63C95498C19FE.html
Click to see the 6 hidden entries
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://coroloboxorozor.com
http://coroloboxorozor.com/base/C56E2AF17B6C065E85DB9FFDA54E4A78.html
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://mail.tpcdel.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\twox67345.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B08F3ED-537D-406E-B057-1B1541B1D39D}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C67C7B4A-7023-4170-93C2-146687425423}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\payment_advice.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Aug 26 14:08:13 2020, atime=Tue Feb 23 23:53:35 2021, length=326273, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$yment_advice.doc
data
#