top title background image
flash

Allignright_companyprofile.doc

Status: finished
Submission Time: 2021-05-04 20:16:08 +02:00
Malicious
Trojan
Adware
Exploiter
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • doc

Details

  • Analysis ID:
    404236
  • API (Web) ID:
    710604
  • Analysis Started:
    2021-05-04 20:30:17 +02:00
  • Analysis Finished:
    2021-05-04 20:48:19 +02:00
  • MD5:
    5a0c6dd1f7bbc5272f2ced270e2d4d8a
  • SHA1:
    9f553e08793745277db8a0d3aa82a63b7526a28b
  • SHA256:
    fbc12470553e748b10dd0e1a15c6e28a1e777b626757349e46031f7e0608b8e6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 29/70
malicious
Score: 6/32
malicious
Score: 13/29

IPs

IP Country Detection
52.218.240.113
United States

Domains

Name IP Detection
s3-us-west-2-r-w.amazonaws.com
52.218.240.113
api.telegram.org
149.154.167.220
miolouno.s3-us-west-2.amazonaws.com
0.0.0.0

URLs

Name Detection
http://miolouno.s3-us-west-2.amazonaws.com/mad.exe
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://www.windows.com/pctv.
Click to see the 13 hidden entries
http://investor.msn.com
http://www.msnbc.com/news/ticker.txt
http://www.icra.org/vocabulary/.
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://investor.msn.com/
http://www.piriform.com/ccleaner
https://api.telegram.org/bot1774464259:AAF9FzZxHVqbPEcJ50c3sNsdvyt_OEQ0GcA/
http://www.%s.comPA
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.hotmail.com/oe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip

Dropped files

Name File Type Hashes Detection
C:\Windows\Resources\Themes\Aero\Shell\eCD9cjXnQ68Ged31T2X6ac6dL39YG124d98OXa10c044\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bw6d8Paf6bOV36xS4N6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\CTF loader_es.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 25 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mad[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\87BC13303IWXGUS4CPWO.temp
data
#
C:\Users\user\Desktop\~$lignright_companyprofile.doc
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YDKB60LKBB2QYZ2W32L3.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WW5Z4WAT6CR6JFY4TKYI.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WPSOBZIDEVVPSMUD2QNK.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VXTSKOASU3HTN9MNZWSX.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P6I517PCOBHL4J9OQ9E0.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KWITJSS33AUNENZNHP1F.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KNRKHEKRLNGFHX3WL0DL.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KATDANGR9NGCXMK3FXBM.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G8WMKAIS4RP0UU7V5CJM.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AX9LQTWXBI1OLIGT87K1.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\83F00AO61JO8JVBNZZNG.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4YKYB2VKZ9SALOEP6IHD.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\14LJSV38HUMSQNNUJ4FI.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0B643QLK5ZML9R9E3HST.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Allignright_companyprofile.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17 2020, mtime=Wed Aug 26 14:08:17 2020, atime=Wed May 5 02:30:36 2021, length=2960089, window=hide
#
C:\Users\user\AppData\Local\Temp\1048825.cvr
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9A867ADF-3614-4635-BF44-6C9AC8D8FC42}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{784A4D1B-DE8E-4300-98F0-AE5841A8170E}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{08186652-BACB-4000-A55F-0BCBA7498F21}.tmp
data
#