top title background image
flash

RFQ ..doc

Status: finished
Submission Time: 2021-04-12 14:19:20 +02:00
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla

Comments

Tags

  • doc

Details

  • Analysis ID:
    385437
  • API (Web) ID:
    672973
  • Analysis Started:
    2021-04-12 14:22:06 +02:00
  • Analysis Finished:
    2021-04-12 14:32:22 +02:00
  • MD5:
    8648267830a23e39c5bc162f4ad72f85
  • SHA1:
    6a0436200203698fbb93170bb93ddc794d5f968e
  • SHA256:
    a1b7cd862762ff80cf95b544e80dfc6f887d9e0e9a8fffeec7c2574812b917d6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious

IPs

IP Country Detection
203.167.7.88
Philippines
198.54.122.60
United States

Domains

Name IP Detection
rotronics.com.ph
203.167.7.88
mail.privateemail.com
198.54.122.60

URLs

Name Detection
http://rotronics.com.ph/docxxx/dec/ZhIOjFmINIXbKXm.exe
http://ZAGYny.com
http://WWI0qtWzJvCpYcgDStzT.org
Click to see the 41 hidden entries
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.certicamara.com/certicamaraca.crl0;
http://www.e-szigno.hu/RootCA.crt0
http://www.sk.ee/cps/0
http://www.e-szigno.hu/SZSZ/0
http://www.quovadis.bm0
http://www.%s.comPA
http://mail.privateemail.com
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAII.crl0
http://ocsp.entrust.net0D
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://secure.comodo.com/CPS0
https://www.netlock.net/docs
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://servername/isapibackend.dll
http://crl.entrust.net/2048ca.crl0
http://www.e-trust.be/CPS/QNcerts
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
http://127.0.0.1:HTTP/1.1
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
http://DynDns.comDynDNS
http://www.e-me.lv/repository0
https://sectigo.com/CPS0
http://www.acabogacia.org/doc0
http://crl.entrust.net/server1.crl0
http://ocsp.sectigo.com0
http://WWI0qtWzJvCpYcgDStzT.orgDL
http://www.certicamara.com/certicamaraca.crl0
http://ocsp.entrust.net03
http://www.ancert.com/cps0
http://www.dnie.es/dpc0
http://www.acabogacia.org0
https://rca.e-szigno.hu/ocsp0-
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
http://www.diginotar.nl/cps/pkioverheid0
http://repository.swisssign.com/0
http://crl.lt/root-c/cacrl.crl0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ZhIOjFmINIXbKXm[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmpBFD6.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\cAFIUeWyVQPJe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58596 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{73207C3D-FA20-48C4-87C4-17800DB89026}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EC948C2F-5218-4A38-A66D-F6FECB16C1E9}.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabCA24.tmp
Microsoft Cabinet archive data, 58596 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\TarCA25.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RFQ ..LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:18 2020, mtime=Wed Aug 26 14:08:18 2020, atime=Mon Apr 12 20:22:35 2021, length=762054, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$RFQ ..doc
data
#