top title background image
flash

MT_1O1_SWIFt.doc

Status: finished
Submission Time: 2021-11-25 18:06:16 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla

Comments

Tags

  • doc

Details

  • Analysis ID:
    528738
  • API (Web) ID:
    896260
  • Analysis Started:
    2021-11-25 18:17:26 +01:00
  • Analysis Finished:
    2021-11-25 18:29:23 +01:00
  • MD5:
    9a802b83f597cbb0adaabed57442bc50
  • SHA1:
    b2b9b3fb8a423885f2971fe557637ab7bf84f53d
  • SHA256:
    a3f600d0d1de53ee5f125b1fe51f90c393f74125767abe5bb7cb07725124d76d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

IPs

IP Country Detection
208.91.198.143
United States
208.91.199.225
United States
173.232.204.89
United States
Click to see the 1 hidden entries
208.91.199.224
United States

Domains

Name IP Detection
us2.smtp.mailhostbox.com
208.91.199.224

URLs

Name Detection
httP://173.232.2
httP://173.232.204.89/t
httP://173.232
Click to see the 12 hidden entries
http://173.232.204.89/task.exe
httP://173.232.204.89/task.ex
httP://173.232.204.89/task.exe
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://173.232.204.89
httP://173.232.204.89/task.exePE
http://www.piriform.com/ccleaner
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://servername/isapibackend.dll

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\task.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\SzfukVRF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\abdtfhghgeghDp .ScT
data
#
Click to see the 24 hidden entries
C:\Users\user\AppData\Local\Temp\tmp3794.tmp
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\task[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\Desktop\~$_1O1_SWIFt.doc
data
#
C:\Users\user\AppData\Roaming\nfaaxqn4.3to\Firefox\Profiles\7xwghk55.default\cookies.sqlite
SQLite 3.x database, user version 7, last written using SQLite version 3017000
#
C:\Users\user\AppData\Roaming\nfaaxqn4.3to\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UHZRB3V0JU1J7RFEXRK5.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SWTEXUYGJII0O8O9V6FS.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O2YN4D646O0GDJJK3ZZ8.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msar (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms. (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2BTQ2CWP06U44J4VW23J.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\MT_1O1_SWIFt.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:55 2021, mtime=Mon Aug 30 20:08:55 2021, atime=Fri Nov 26 01:18:12 2021, length=393131, window=hide
#
C:\Users\user\AppData\Local\Temp\abdtfhghgeghDp .ScT:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EBB6311B-66D7-463B-B2C9-86511D155F63}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E96B34F0-7523-4243-9DA6-1F3FD956FE04}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AEBC8812-958C-44EE-8AED-8858BB920BA5}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{CE51F4FB-5B7A-4326-8F7C-4F6978BC9343}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B006329.png
370 sysV pure executable
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\15885F16.wmf
Targa image data - Map - RLE 1569 x 65536 x 0 +2 "\005"
#