flash

5.dll

Status: finished
Submission Time: 07.07.2021 10:40:22
Malicious
Trojan
Ursnif

Comments

Tags

  • dll

Details

  • Analysis ID:
    445164
  • API (Web) ID:
    812753
  • Analysis Started:
    07.07.2021 10:40:23
  • Analysis Finished:
    07.07.2021 10:50:36
  • MD5:
    fceb6a51be4205d11be1491f6e263cae
  • SHA1:
    0abb60d37fac49912172c5385ff58e049520eb53
  • SHA256:
    c521dd937ce9b2e8bda2fa915bae5b5be0e150a8b82e3b2bfb1cdbc60a8326c4
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
84/100

malicious
15/67

IPs

IP Country Detection
40.101.137.98
United States
52.97.152.210
United States
52.97.144.2
United States
Click to see the 2 hidden entries
52.97.233.2
United States
40.97.116.82
United States

Domains

Name IP Detection
outlook.com
40.97.116.82
HHN-efz.ms-acdc.office.com
40.101.137.98
FRA-efz.ms-acdc.office.com
52.97.152.210
Click to see the 2 hidden entries
www.outlook.com
0.0.0.0
outlook.office365.com
0.0.0.0

URLs

Name Detection
https://outlook.office365.com/grower/GwIQZ7VTU_2B0dEDGXi3usO/98Jy_2Fhjs/9ADdwnOA_2BxxHdxk/bJ6tUkE3rK

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD6AF35A-DF4A-11EB-90E5-ECF4BB570DC9}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BD6AF35C-DF4A-11EB-90E5-ECF4BB570DC9}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BD6AF35E-DF4A-11EB-90E5-ECF4BB570DC9}.dat
Microsoft Word Document
#
Click to see the 4 hidden entries
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF3A99C7AD2702480D.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF48F8DB99852E5824.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFBADD8EC8FEBD51BA.TMP
data
#