top title background image
flash

QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.doc

Status: finished
Submission Time: 2021-02-25 07:25:36 +01:00
Malicious
Trojan
Exploiter
Evader
Nanocore GuLoader

Comments

Tags

  • doc

Details

  • Analysis ID:
    358179
  • API (Web) ID:
    618353
  • Analysis Started:
    2021-02-25 07:28:29 +01:00
  • Analysis Finished:
    2021-02-25 07:38:25 +01:00
  • MD5:
    bc1c94e783483f1c218efb5dcaf5f67e
  • SHA1:
    7747c98d3d2da16f6e8b2fc56bd0e84532e3a543
  • SHA256:
    d1e84cab5bf5eadd159b04374dce5a78a0e93156086475d41ad86665357dfc66
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 30/71
malicious
Score: 13/47

IPs

IP Country Detection
67.199.248.10
United States
194.5.98.202
Netherlands
5.79.72.163
Netherlands

Domains

Name IP Detection
bit.ly
67.199.248.11
teknik.io
5.79.72.163
onedrive.live.com
0.0.0.0
Click to see the 2 hidden entries
ibkebw.dm.files.1drv.com
0.0.0.0
u.teknik.io
0.0.0.0

URLs

Name Detection
194.5.98.202
https://u.teknik.io/wREzo.txt
Click to see the 17 hidden entries
https://onedrive.live.com/
http://bit.ly/2ZKf4aq
https://ibkebw.dm.files.1drv.com/y4mkt1ePYl5p-A97ciot0bQ59hcBfLkczVR077g5LVTnsSoRxe1bs39ErOjDRD_qmHQ
http://crl.entrust.net/2048ca.crl0
https://onedrive.live.com/download?cid=802AC8A73EEC8C8E&resid=802AC8A73EEC8C8E%21110&authkey=AK1w6-P
https://secure.comodo.com/CPS0
https://ibkebw.dm.files.1drv.com/
http://ocsp.entrust.net0D
https://ibkebw.dm.files.1drv.com/y
http://www.diginotar.nl/cps/pkioverheid0
http://www.%s.comPA
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
https://onedrive.live.com/E
http://ocsp.entrust.net03
http://crl.entrust.net/server1.crl0
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0

Dropped files

Name File Type Hashes Detection
C:\Users\Public\69577.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\subfolder1\filename1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\wREzo[1].txt
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 22 hidden entries
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
data
#
C:\Users\user\AppData\Local\Temp\tmp9445.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp80F5.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\~$OTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.doc
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Y5D8BEZV.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\LIP8714C.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Aug 26 14:08:13 2020, atime=Thu Feb 25 14:28:30 2021, length=967360, window=hide
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
data
#
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\TarBF0D.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabBF0C.tmp
Microsoft Cabinet archive data, 59134 bytes, 1 file
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C2D3EB9C-AB70-4784-8852-5C03B64EE05D}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{24864F90-30CA-4646-ACFF-79FC9E14ADCB}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0863C5D3-5908-4917-8F28-8909E0160183}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2ZKf4aq[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 59134 bytes, 1 file
#