top title background image
flash

NEW PO1100372954 -.doc

Status: finished
Submission Time: 2021-08-02 10:41:37 +02:00
Malicious
Phishing
Trojan
Spyware
Exploiter
Evader
NanoCore AveMaria

Comments

Tags

  • doc

Details

  • Analysis ID:
    457815
  • API (Web) ID:
    825395
  • Analysis Started:
    2021-08-02 10:59:02 +02:00
  • Analysis Finished:
    2021-08-02 11:15:28 +02:00
  • MD5:
    afe48e30fc3f12c2b6ad7d19ae1fff8e
  • SHA1:
    2ded99867d8b3e9499b10743ae732efec19ccc8e
  • SHA256:
    ecef57afce8a7d5eed2080401da0ce36d67c2493cf1385b432a6bf0a65f6e521
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 7/35
malicious
Score: 12/28
malicious

IPs

IP Country Detection
203.159.80.186
Netherlands
203.159.80.165
Netherlands

Domains

Name IP Detection
newhosteeeee.ydns.eu
203.159.80.186
sdafsdffssffs.ydns.eu
203.159.80.186
hutyrtit.ydns.eu
203.159.80.165
Click to see the 1 hidden entries
hhjhtggfr.duckdns.org
203.159.80.186

URLs

Name Detection
httP://newhosteeeee.ydns.eu/putt
httP://newhosteeeee.ydns.eu/p
http://newhosteeeee.ydns.eu/putty.exe
Click to see the 16 hidden entries
http://hutyrtit.ydns.eu/microC.exe
httP://newhosteeeee.ydns.eu/putty.exePE
httP://newhosteeeee.ydns.eu/putty.exe
http://ja.com/
https://github.com/syohex/java-simple-mine-sweeper
https://github.com/syohex/java-simple-mine-sweeperC:
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.%s.comPA
http://www.piriform.com/ccleaner
http://java.co
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://www.piriform.com/ccleaner.
http://newhosteeeee.ydns.eu
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.icra.org/vocabulary/.

Dropped files

Name File Type Hashes Detection
C:\Program Files\Microsoft DN1\sqlmap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\ProgramData\images.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\microC[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 32 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\putty[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\putty.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\iBCrDCK.i.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
International EBCDIC text, with no line terminators, with overstriking
#
C:\Users\user\AppData\Local\Temp\abdtfhghgdghgh .ScT
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\settings.bak
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\490281AC8GSCNCH37UYE.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms. (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LOCAUF6YJEF7K6W8Y37G.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RA5AG9965KYDVANTRM0T.temp
data
#
C:\Users\user\AppData\Roaming\zbEIIaj.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\zzoj.CG.tmp
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\Desktop\~$W PO1100372954 -.doc
data
#
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\NEW PO1100372954 -.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Mon Aug 2 16:59:36 2021, length=234750, window=hide
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\storage.dat
data
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\settings.bin
data
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
data
#
C:\Users\user\AppData\Local\Temp\abdtfhghgdghgh .ScT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\OICE_9306262C-FECE-4A9E-949D-FCC308D5F5A8.0\FLD93F.tmp
370 sysV pure executable
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E195593A-72A2-4470-89E8-B7D87A58E0E0}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEE3E709-76F5-433D-BD56-9523C4C9DC31}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2631CAF7-C3D4-4848-8C82-E142953DDA5E}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9029FF63.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\11DB366A.png
370 sysV pure executable
#
C:\Users\user\AppData\Local\Microsoft Vision\02-08-2021_11.00.14
data
#
C:\Program Files\Microsoft DN1\rdpwrap.ini
ASCII text, with CRLF line terminators
#