flash

Documents_111651917_375818984.xls

Status: finished
Submission Time: 04.05.2021 01:05:35
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    403285
  • API (Web) ID:
    708724
  • Analysis Started:
    04.05.2021 01:05:36
  • Analysis Finished:
    04.05.2021 01:21:45
  • MD5:
    72526a505496a9b7da9a6c9651dbda5e
  • SHA1:
    84cf963666314eee0d8ad1ef09e5462a66e3ccbf
  • SHA256:
    3c20530c13d6736ec705786d1694052b2abf42bf87d3bbc359ea95b343fcf681
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
88/100

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run Condition: Potential for more IOCs and behavior

malicious
100/100

IPs

IP Country Detection
18.222.240.99
United States
104.21.64.132
United States
54.163.9.216
United States

Domains

Name IP Detection
otusmail.com
104.21.64.132

URLs

Name Detection
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
http://www.certplus.com/CRL/class3.crl0
http://www.e-me.lv/repository0
Click to see the 97 hidden entries
http://www.acabogacia.org/doc0
http://crl.chambersign.org/chambersroot.crl0
http://ocsp.suscerte.gob.ve0
http://www.postsignum.cz/crl/psrootqca2.crl02
http://crl.dhimyotis.com/certignarootca.crl0
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
https://18.222.240.99/qOh
http://www.chambersign.org1
http://www.pkioverheid.nl/policies/root-policy0
http://repository.swisssign.com/0
http://www.suscerte.gob.ve/lcr0#
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
http://crl.ssc.lt/root-c/cacrl.crl0
http://postsignum.ttc.cz/crl/psrootqca2.crl0
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
http://ca.disig.sk/ca/crl/ca_disig.crl0
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
http://www.certplus.com/CRL/class3P.crl0
http://www.suscerte.gob.ve/dpc0
http://www.certeurope.fr/reference/root2.crl0
http://www.certplus.com/CRL/class2.crl0
http://www.disig.sk/ca/crl/ca_disig.crl0
http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
http://www.defence.gov.au/pki0
http://www.sk.ee/cps/0
http://www.globaltrust.info0=
http://www.anf.es
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
http://pki.registradores.org/normativa/index.htm0
http://policy.camerfirma.com0
http://www.ssc.lt/cps03
http://ocsp.pki.gva.es0
http://www.anf.es/es/address-direccion.html
https://www.anf.es/address/)1(0&
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
https://18.222.240.99/hOg
http://ca.mtin.es/mtin/ocsp0
http://crl.ssc.lt/root-b/cacrl.crl0
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
http://www.certicamara.com/dpc/0Z
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
http://crl.pki.wellsfargo.com/wsprca.crl0
https://18.222.240.99/update/infoy
https://wwww.certigna.fr/autorites/0m
http://www.dnie.es/dpc0
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
http://ca.mtin.es/mtin/DPCyPoliticas0
https://www.anf.es/AC/ANFServerCA.crl0
http://www.globaltrust.info0
http://certificates.starfieldtech.com/repository/1604
http://acedicom.edicomgroup.com/doc0
http://www.certplus.com/CRL/class3TS.crl0
https://crl.anf.es/AC/ANFServerCA.crl0
http://www.certeurope.fr/reference/pc-root2.pdf0
http://ac.economia.gob.mx/last.crl0G
https://www.catcert.net/verarrel
http://www.disig.sk/ca0f
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
http://www.e-szigno.hu/RootCA.crl
http://www.sk.ee/juur/crl/0
http://crl.chambersign.org/chambersignroot.crl0
http://crl.xrampsecurity.com/XGCA.crl0
http://certs.oati.net/repository/OATICA2.crl0
http://crl.oces.trust2408.com/oces.crl0
http://www.quovadis.bm0
https://eca.hinet.net/repository0
http://crl.ssc.lt/root-a/cacrl.crl0
http://certs.oaticerts.com/repository/OATICA2.crl
http://www.trustdst.com/certificates/policy/ACES-index.html0
http://certs.oati.net/repository/OATICA2.crt0
http://www.accv.es00
http://www.pkioverheid.nl/policies/root-policy-G20
https://www.netlock.net/docs
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
https://18.222.240.99/
http://www.e-trust.be/CPS/QNcerts
http://ocsp.ncdc.gov.sa0
http://html4/loose.dtd
http://fedir.comsign.co.il/crl/ComSignCA.crl0
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
http://www.datev.de/zertifikat-policy-int0
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
https://repository.luxtrust.lu0
http://cps.chambersign.org/cps/chambersroot.html0
http://www.acabogacia.org0
http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
http://www.firmaprofesional.com/cps0
http://www.uce.gub.uy/acrn/acrn.crl0
http://.css
http://crl.securetrust.com/SGCA.crl0
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
https://18.222.240.99/versal
http://www.agesic.gub.uy/acrn/acrn.crl0)
https://18.222.240.99/gO~
http://crl.securetrust.com/STCA.crl0
http://www.rcsc.lt/repository0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\vegas[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\bsdnbsej.dbw
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58596 bytes, 1 file
#
Click to see the 10 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\2[1].json
Non-ISO extended-ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\2[1].json
Non-ISO extended-ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\fOhFGX570RDgmgTtbgZ5[1]
data
#
C:\Users\user\AppData\Local\Temp\ECA40000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 17:12:41 2019, mtime=Mon May 3 22:13:16 2021, atime=Mon May 3 22:13:16 2021, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Documents_111651917_375818984.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 06:35:51 2020, mtime=Mon May 3 22:13:16 2021, atime=Mon May 3 22:13:16 2021, length=127488, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
#
C:\Users\user\Desktop\CDA40000
Applesoft BASIC program data, first line number 16
#