top title background image
flash

280072109764552.doc

Status: finished
Submission Time: 2021-07-28 16:29:43 +02:00
Malicious
Phishing
Trojan
Spyware
Exploiter
Evader
HawkEye MailPassView

Comments

Tags

  • doc

Details

  • Analysis ID:
    455555
  • API (Web) ID:
    823127
  • Analysis Started:
    2021-07-28 17:00:20 +02:00
  • Analysis Finished:
    2021-07-28 17:14:30 +02:00
  • MD5:
    ae01f0cc63c8a3b7bb239976c56788c3
  • SHA1:
    cd86bb62ab645cab4d20ec8a931ca9e84801ea36
  • SHA256:
    fde845dc869db03ce766a34d4d325cfb60ea5e605244e823fcfea5b3135aacb7
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 14/45
malicious

IPs

IP Country Detection
103.255.237.180
Viet Nam
45.141.152.18
Romania
142.250.203.100
United States

Domains

Name IP Detection
vecvietnam.com.vn
103.255.237.180
ftp.vngpack.com
45.141.152.18
3.246.11.0.in-addr.arpa
0.0.0.0
Click to see the 1 hidden entries
www.google.com
142.250.203.100

URLs

Name Detection
http://ns.ao
http://crl.entrust.net/2048ca.crl0
https://www.google.com/
Click to see the 25 hidden entries
https://secure.comodo.com/CPS0
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://ocsp.entrust.net0D
http://www.nirsoft.net/
http://crl.pki.goog/gsr2/gsr2.crl0?
http://www.site.com/logs.php
https://login.yahoo.com/config/login
http://www.%s.comPA
https://www.google.com/accounts/servicelogin
http://whatismyipaddress.com/-
http://crl.pki.goog/GTS1O1core.crl0
http://ns.adobe.c/s
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
https://www.google.com
http://ftp.vngpack.com
http://ns.adobede
http://schema.org/WebPage
https://pki.goog/repository/0
http://n.f
http://www.diginotar.nl/cps/pkioverheid0
http://pki.goog/gsr2/GTS1O1.crt0
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
http://ocsp.entrust.net03
http://crl.entrust.net/server1.crl0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\09867654270721.PDF[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\name.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{238E66D8-299E-4B99-A605-44EE5B79BCDD}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B83DDB5-D064-451A-A615-F9D5A3E063B2}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E2185495-5638-43A1-A616-4B202C23444A}.tmp
data
#
C:\Users\user\AppData\Local\Temp\bhv53DC.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x63a10f1a, page size 32768, DirtyShutdown, Windows version 6.1
#
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\280072109764552.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17 2020, mtime=Wed Aug 26 14:08:17 2020, atime=Wed Jul 28 23:00:39 2021, length=2202571, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
#
C:\Users\user\Desktop\~$0072109764552.doc
data
#