flash

PL_503_13_570.docx

Status: finished
Submission Time: 04.05.2021 21:30:44
Malicious
Trojan
Spyware
Exploiter
Evader
Vidar

Comments

Tags

Details

  • Analysis ID:
    404284
  • API (Web) ID:
    710717
  • Analysis Started:
    04.05.2021 21:32:59
  • Analysis Finished:
    04.05.2021 21:45:37
  • MD5:
    158e499db47d9c6a56449c86f3b1596f
  • SHA1:
    6d0e9274649112ec7e9a757168b7de6eb2c48ff2
  • SHA256:
    5e7fe9a4eb6dc098b6ed28b083d277455d66a515e7c78b270ad0515a90279f45
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
20/55

malicious
22/47

IPs

IP Country Detection
198.98.60.43
United States
31.210.20.6
Netherlands

URLs

Name Detection
https://discord.com/6
http://198.98.60.43/3.jpg
https://discord.com/:
Click to see the 24 hidden entries
http://198.98.60.43/5.jpg
http://www.%s.comPA
http://198.98.60.43/4.jpg
http://198.98.60.43/6.jpg
http://198.98.60.43/main.php
http://ocsp.thawte.com0
http://31.210.20.6/3/Sugvt.exe
http://198.98.60.43/1.jpg
http://www.mozilla.com0
https://discord.com/
http://198.98.60.43/7.jpg
http://198.98.60.43/2.jpg
http://198.98.60.43/
https://discord.com/2
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://crl.thawte.com/ThawteTimestampingCA.crl0
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
https://duckduckgo.com/chrome_newtab
http://www.mozilla.com/en-US/blocklist/
https://duckduckgo.com/ac/?q=
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
https://ac.ecosia.org/autocomplete?q=

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\Sugvt[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\toqqx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 22 hidden entries
C:\Users\user\toqqx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\ProgramData\826308279625120\temp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\ProgramData\843743064682002\_8437430646.zip
Zip archive data, at least v2.0 to extract
#
C:\ProgramData\843743064682002\cookies\Google Chrome_Default.txt
ASCII text, with CRLF line terminators
#
C:\ProgramData\843743064682002\cookies\Mozilla Firefox_7xwghk55.default.txt
ASCII text, with very long lines, with CRLF line terminators
#
C:\ProgramData\843743064682002\screenshot.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\ProgramData\843743064682002\system.txt
ASCII text, with CRLF line terminators
#
C:\ProgramData\843743064682002\temp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\ProgramData\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4C112D4.png
PNG image data, 288 x 424, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B4C77723-97C0-4A14-814E-1968BCE52029}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FDB545E2-A1F4-4D0B-BC71-CA4D3862B689}.tmp
Targa image data - RLE 65536 x 65536 x 0 ""
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PL_503_13_570.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Wed May 5 03:33:33 2021, length=96745, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$_503_13_570.docx
data
#