top title background image
flash

RFL_PO 69002.doc

Status: finished
Submission Time: 2021-06-11 07:35:23 +02:00
Malicious
Exploiter
Trojan
Evader
FormBook

Comments

Tags

  • doc

Details

  • Analysis ID:
    433026
  • API (Web) ID:
    800630
  • Analysis Started:
    2021-06-11 07:35:25 +02:00
  • Analysis Finished:
    2021-06-11 07:50:00 +02:00
  • MD5:
    ee4431e2c986dcac3fc8078c674ba65e
  • SHA1:
    64aa75122963e38f52739ba819788e4bfcfb3651
  • SHA256:
    4219dd0fbae4f8d9e9964eac82293fefc6a7f1b75242473f6347daed349198a2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 84
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

Third Party Analysis Engines

malicious
Score: 9/60
malicious
Score: 9/35
malicious
Score: 16/29

IPs

IP Country Detection
31.210.20.45
Netherlands

URLs

Name Detection
http://www.soso.com/
http://ariadna.elmundo.es/
http://service2.bfast.com/
Click to see the 97 hidden entries
http://search.centrum.cz/favicon.ico
http://www.iask.com/
http://search.orange.co.uk/favicon.ico
http://www.target.com/
http://auto.search.msn.com/response.asp?MT=
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
http://cnweb.search.live.com/results.aspx?q=
http://busca.orange.es/
https://clients.config.office.net/user/v1.0/android/policies
https://outlook.office365.com/api/v1.0/me/Activities
https://devnull.onenote.com
https://o365auditrealtimeingestion.manage.office.com
http://www.google.si/
http://search.nifty.com/
http://www.founder.com.cn/cn/bThe
http://www.gmarket.co.kr/
http://search.yahoo.co.jp/favicon.ico
http://openimage.interpark.com/interpark.ico
https://wus2.contentsync.
http://search.sify.com/
http://www.ozu.es/favicon.ico
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
http://search.msn.com/results.aspx?q=
https://augloop.office.com
http://www.cdiscount.com/favicon.ico
https://onedrive.live.com/embed?
http://www.amazon.co.uk/
https://visio.uservoice.com/forums/368202-visio-on-devices
http://www.linternaute.com/favicon.ico
http://www.cnet.com/favicon.ico
http://ie.search.yahoo.com/os?command=
https://api.cortana.ai
http://www.etmall.com.tw/
http://www.taobao.com/favicon.ico
http://list.taobao.com/
http://uk.search.yahoo.com/
http://search.goo.ne.jp/favicon.ico
https://skyapi.live.net/Activity/
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
http://www.kkbox.com.tw/
http://search.daum.net/favicon.ico
http://www.servicios.clarin.com/
http://www.ceneo.pl/favicon.ico
http://it.search.yahoo.com/
http://www.tiscali.it/favicon.ico
http://www.cdiscount.com/
http://www.news.com.au/favicon.ico
http://in.search.yahoo.com/
https://store.office.cn/addinstemplate
http://it.search.dada.net/favicon.ico
http://www.etmall.com.tw/favicon.ico
http://www.ya.com/favicon.ico
http://www.msn.com/?ocid=iehpg
https://tasks.office.com
https://res.getmicrosoftkey.com/api/redemptionevents
http://busca.igbusca.com.br//app/static/images/favicon.ico
http://msk.afisha.ru/
http://www.galapagosdesign.com/DPlease
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
http://img.shopzilla.com/shopzilla/shopzilla.ico
http://search.hanafos.com/favicon.ico
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
http://fr.search.yahoo.com/
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
http://www.fontbureau.com/designers
https://lookup.onenote.com/lookup/geolocation/v1
https://rpsticket.partnerservices.getmicrosoftkey.com
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
http://www.dailymail.co.uk/
http://www.merlin.com.pl/favicon.ico
http://www.mercadolivre.com.br/
http://sads.myspace.com/
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
http://www.rambler.ru/favicon.ico
http://list.taobao.com/browse/search_visual.htm?n=15&q=
http://google.pchome.com.tw/
http://www.msn.com/?ocid=iehp1
http://browse.guardian.co.uk/favicon.ico
http://www.pchome.com.tw/favicon.ico
http://weather.service.msn.com/data.aspx
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
https://secure.comodo.com/CPS0L
https://ncus.contentsync.
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
http://search.chol.com/favicon.ico
http://www.amazon.de/
http://search.auction.co.kr/
http://www.google.it/
http://www.ask.com/
https://graph.windows.net
http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
http://buscar.ozu.es/
https://www.odwebp.svc.ms
http://search.msn.co.jp/results.aspx?q=
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
http://cgi.search.biglobe.ne.jp/favicon.ico

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\nothinglittle.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RFL_PO 69002.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:03:43 2020, mtime=Fri Jun 11 13:41:17 2021, atime=Fri Jun 11 13:41:14 2021, length=428544, window=hide
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nothinglittle.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\26C2BCD2-E8F6-49A5-B037-8B38394825D2
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{B54863EA-DCB1-40F2-82C0-0033BFBBA29B}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xyghfd3f.ne3.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zlxsqdho.sxz.ps1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W7MKASODXYUB7NTL3O4Z.temp
data
#
C:\Users\user\Desktop\~$L_PO 69002.doc
data
#
C:\Users\user\Documents\20210611\PowerShell_transcript.061544._jjnsaz8.20210611074123.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#