top title background image
flash

1c60a1e9_by_Libranalysis.rtf

Status: finished
Submission Time: 2021-05-12 11:29:41 +02:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    412069
  • API (Web) ID:
    779675
  • Analysis Started:
    2021-05-12 11:32:45 +02:00
  • Analysis Finished:
    2021-05-12 11:47:02 +02:00
  • MD5:
    1c60a1e972aaa5a3eb15c0adc2de7ead
  • SHA1:
    921fed27f6b23f7f810ee03eeefb91634a295592
  • SHA256:
    605e84b01e008da482a744feb468d9dd842148850fda1694a6772b6e38cc6c82
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 15/47

IPs

IP Country Detection
209.143.158.10
United States
75.2.115.196
United States
202.210.8.86
Japan
Click to see the 5 hidden entries
157.55.173.72
United States
184.168.131.241
United States
107.155.89.74
United States
44.230.85.241
United States
34.102.136.180
United States

Domains

Name IP Detection
4520oceanviewavenue.com
184.168.131.241
betsysellsswfl.com
107.155.89.74
ethereumdailypay.com
209.143.158.10
Click to see the 12 hidden entries
www.applewholesales.com
75.2.115.196
www.thepocket-onlinelesson.xyz
202.210.8.86
boostcoachingonline.com
184.168.131.241
www.boostcoachingonline.com
0.0.0.0
www.foreverjsdesigns.com
0.0.0.0
www.southernbrushworks.com
0.0.0.0
www.ethereumdailypay.com
0.0.0.0
www.qqkit.net
0.0.0.0
www.4520oceanviewavenue.com
0.0.0.0
www.betsysellsswfl.com
0.0.0.0
uixie.porkbun.com
44.230.85.241
southernbrushworks.com
34.102.136.180

URLs

Name Detection
httP://157.55.17
httP://157.55.173.72/go
http://www.4520oceanviewavenue.com/a8si/?yxl4A=IJB8SptPOV&bzrD=O3o1U+q5oLWwAo4csM4kzZFzuvGZx18F2JtzSgoGolufYTqxaY4hRtZqS8lk7vb9Od8wBg==
Click to see the 20 hidden entries
http://www.applewholesales.com/a8si/?bzrD=UJpr1KJ3cAfqwplpJdbkHVupvAtN4HJ9rDw4p7p43guJdlFHza1zzh6114vkMzwZ//7Ijg==&yxl4A=IJB8SptPOV
httP://157.55.
http://www.betsysellsswfl.com/a8si/?bzrD=tsBWpGsRZmy7d7x2nhlySyt7kUJXdizctJsfNrtXFEv4lF0eOqcyqbf0nJIyY4rkKVxBEQ==&yxl4A=IJB8SptPOV
http://www.boostcoachingonline.com/a8si/?yxl4A=IJB8SptPOV&bzrD=4F1bkU/FiIiIeThn0vTtPD5XJl4c4IZLVeanHLI3MyhQ3xDAQVTSUto06Vs10btJG4UKsg==
http://www.thepocket-onlinelesson.xyz/a8si/?bzrD=AKlWb4F2uLtjtixCEtxovY3lKx8NV8ATEUdUvfUwC6/Iyc/MbMvmSS41f7GTUiSOdXxAeQ==&yxl4A=IJB8SptPOV
httP://157.55.173.72/goose/docsc.exe
http://www.ethereumdailypay.com/a8si/?yxl4A=IJB8SptPOV&bzrD=SdeqJz6wjaIyYsu9X1DHbU17V+TmiEx/wZfEfcHGPKPVmfA4v4050PCPps/OkVYskoJ4SA==
httP://157.55.173.72/goose/docsc
www.rogegalmish.com/a8si/
http://157.55.173.72/goose/docsc.exe
http://www.foreverjsdesigns.com/a8si/?bzrD=k28hoff2RzuOUW33PbGIPtKRPUr4n64pf9qOap2xi7OmRFd8c0vHG7pxTFlCjwyFI3/RUg==&yxl4A=IJB8SptPOV
httP://157.55.173.72/goose/do
http://www.piriform.com/ccleanerhttp://KK
httP://157.55.173.72/goose/docsc.exePE1
http://www.piriform.com/ccleaner
http://www.%s.comPA
http://www.southernbrushworks.com/a8si/?yxl4A=IJB8SptPOV&bzrD=gy017r9A0psIMOBT0kV1AOcU5MENAfyqIllJOlDTSwkHuwjyB7K4Ynwu+ZK1UfHNgI+yKg==
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://157.55.173.72

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\docsc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Abctfhghgdghgh .ScT
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\docsc[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 14 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\1c60a1e9_by_Libranalysis.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed May 12 17:33:27 2021, mtime=Wed May 12 17:33:27 2021, atime=Wed May 12 17:33:32 2021, length=366007, window=hide
#
C:\Users\user\Desktop\~$60a1e9_by_Libranalysis.rtf
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NEKL7LLMA2OV4UGS2LPM.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L17W9ZNBCUQUI8JBPCTD.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DMR481T3UO04FSSHR3G3.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\OICE_A3A241B7-2F36-435D-B046-C9F74B3487D8.0\FLDA58.tmp
370 sysV pure executable
#
C:\Users\user\AppData\Local\Temp\Abctfhghgdghgh .ScT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEE3E709-76F5-433D-BD56-9523C4C9DC31}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9CA5B12C-492C-4E57-AED2-0E7798ADDEF4}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8ADCC7F3-349E-46EF-BF24-C3A751787722}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F3A4D79D.png
370 sysV pure executable
#