top title background image
flash

catalogue_2021_samples_list_revise_ol.doc

Status: finished
Submission Time: 2021-09-28 21:14:23 +02:00
Malicious
Phishing
Trojan
Spyware
Exploiter
Evader
AveMaria UACMe

Comments

Tags

  • AveMariaRAT
  • doc

Details

  • Analysis ID:
    492615
  • API (Web) ID:
    860186
  • Analysis Started:
    2021-09-28 21:16:41 +02:00
  • Analysis Finished:
    2021-09-28 21:30:32 +02:00
  • MD5:
    84c45c2b0e94b8d1d064e739150ba84c
  • SHA1:
    f6a98ac4e50a89495626b5eaebb85d1116554faa
  • SHA256:
    7b5572ae246bcd3f6ee0375e1e7a8c8d4287dae4ca1803d72ae427d8ecc93a32
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 25/56
malicious
Score: 14/45
malicious

IPs

IP Country Detection
152.67.253.163
United States
13.92.100.20
United States
13.92.100.208
United States

URLs

Name Detection
httP://13.92.1
http://13.92.100.208/doc/doc.exe
httP://13.92.100.208/doc/doc.exe
Click to see the 11 hidden entries
httP://13.92.100.208/do
httP://13.92.100
152.67.253.163
httP://13.92.100.208/doc/doc.exePE
httP://13.92.100.208/doc/doc.
http://www.piriform.com/ccleaner
http://www.%s.comPA
http://www.piriform.com/ccleanerhttp://www.piriform.com/
http://13.92.100.208
http://www.piriform.com/ccleanerhttp://www.piriform.coL
https://github.com/syohex/java-simple-mine-sweeper

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\maBdogbw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\doc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT
data
#
Click to see the 19 hidden entries
C:\Users\user\AppData\Local\Temp\tmp2C00.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$talogue_2021_samples_list_revise_ol.doc
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KALU1MUBXB5ZLB042YQK.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AEIVZJ3XSV20N2BPRI8G.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7T64VM0QKZYD09V16F0X.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msk (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms2- (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\catalogue_2021_samples_list_revise_ol.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Wed Sep 29 03:17:20 2021, length=548674, window=hide
#
C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7C6B73EA-9387-4E02-9B96-A36EA329C5C4}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3F2A7B0C-5922-426F-95EB-087369317B68}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{023FDC9E-1C42-46A7-9085-716C914A6086}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\84C9F23E.wmf
Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\160C60F1.png
370 sysV pure executable
#