top title background image
flash

Reconfirm The Details.doc

Status: finished
Submission Time: 2021-11-25 18:06:16 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla

Comments

Tags

  • doc

Details

  • Analysis ID:
    528737
  • API (Web) ID:
    896259
  • Analysis Started:
    2021-11-25 18:14:04 +01:00
  • Analysis Finished:
    2021-11-25 18:25:59 +01:00
  • MD5:
    9a7ea1172bf1250005e0fefce04f604f
  • SHA1:
    3df0782fc6ace41e15ca7c98277c79c128453d10
  • SHA256:
    80071fbb7234239c46ced3c6f0fd9aa7dbeafe79d7bfeed7993d51a69c4da006
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 13/44

IPs

IP Country Detection
208.91.198.143
United States
208.91.199.225
United States
208.91.199.223
United States
Click to see the 2 hidden entries
173.232.204.89
United States
208.91.199.224
United States

Domains

Name IP Detection
us2.smtp.mailhostbox.com
208.91.199.224

URLs

Name Detection
httP://173.232.2
httP://173.232.204.89/taskmg.
httP://173.232.204.89/t
Click to see the 21 hidden entries
http://173.232.204.89/taskmg.exe
httP://173.232.204.89/taskmg.exe
httP://173.232
http://EW9kaPSTVWDzFNsliGsC.org
http://java.cohe
httP://173.232.204.89/taskmg.exePE
http://servername/isapibackend.dll
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
https://api.ipify.org%
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://GwvXXB.com
http://www.piriform.com/ccleanerv
http://www.%s.comPA
https://api.ipify.org%GETMozilla/5.0
http://127.0.0.1:HTTP/1.1
http://173.232.204.89
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://EW9kaPSTVWDzFNsliGsC.org(Zgt
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://DynDns.comDynDNS
http://java.co_w

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\taskmg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\gZfDBpJYZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\abdtfhghgeghDp .ScT
data
#
Click to see the 23 hidden entries
C:\Users\user\AppData\Local\Temp\tmp3054.tmp
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\taskmg[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\~$confirm The Details.doc
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U7TXBSPCBZC5YKNEVYY5.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SX36BOTN39J9C9J03BTG.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SSOY99TCA63S5VSW1UNJ.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QOH1SFJ01YDJGSRFKM6L.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms. (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Reconfirm The Details.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:56 2021, mtime=Mon Aug 30 20:08:56 2021, atime=Fri Nov 26 01:14:15 2021, length=393215, window=hide
#
C:\Users\user\AppData\Roaming\2wi3pnqf.bid\Firefox\Profiles\7xwghk55.default\cookies.sqlite
SQLite 3.x database, user version 7, last written using SQLite version 3017000
#
C:\Users\user\AppData\Roaming\2wi3pnqf.bid\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\abdtfhghgeghDp .ScT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C8C94021-4E02-4955-8AF8-3AD414138F04}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6B5678D1-0902-45B5-A7D8-811025AE74F7}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4DFB1A07-CB4F-472F-B236-A3BF6A79B957}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{2A2CF84F-B5BA-43C4-A797-10CB765CC9B0}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\867A2AEC.wmf
Targa image data - Map - RLE 1569 x 65536 x 0 +2 "\005"
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3263CED7.png
370 sysV pure executable
#