flash

PO-14092021.doc

Status: finished
Submission Time: 14.09.2021 13:09:04
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

Details

  • Analysis ID:
    483042
  • API (Web) ID:
    850615
  • Analysis Started:
    14.09.2021 13:15:31
  • Analysis Finished:
    14.09.2021 13:29:04
  • MD5:
    93abec14185d380695f65beaaca97b84
  • SHA1:
    c18eaeac2c4371dd8e79de62ce60a7b7767f995a
  • SHA256:
    e73b710e825a32ebe4122240ecac87eff1bc76fe130fc41fc5858dafaf96d3b7
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
16/58

malicious
11/28

malicious

IPs

IP Country Detection
185.239.243.112
Moldova Republic of
31.210.20.61
Netherlands

Domains

Name IP Detection
lg-tv.tk
185.239.243.112
blackbladeinc52.ddns.net
31.210.20.61

URLs

Name Detection
http://lg-tv.tk/plugmanzx.exe
blackbladeinc52.ddns.net
Backup Connection Host
Click to see the 2 hidden entries
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmp3709.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
Non-ISO extended-ASCII text, with no line terminators
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Roaming\RWbqWnnjDWI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\plugmangd5693.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{33484DAD-E27E-45D9-8C45-49A85BDC4F7E}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EE6AB4D1-7B2E-4321-A676-4477150FF17C}.tmp
data
#
C:\Users\user\AppData\Local\Temp\tmp2DF5.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp3FEE.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO-14092021.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:57 2021, mtime=Mon Aug 30 20:08:57 2021, atime=Tue Sep 14 19:16:15 2021, length=19250, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$-14092021.doc
data
#