top title background image
flash

RFQ-18072 QPHN .doc

Status: finished
Submission Time: 2021-12-02 18:25:26 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • doc
  • Formbook

Details

  • Analysis ID:
    532835
  • API (Web) ID:
    900355
  • Analysis Started:
    2021-12-02 18:34:56 +01:00
  • Analysis Finished:
    2021-12-02 18:47:17 +01:00
  • MD5:
    dc496cbd7363e5eaded70c3b82d945b4
  • SHA1:
    1cba05eefbf3dd00f0e09591e676b9d2674319be
  • SHA256:
    7398809e85fd3717f942bae422ed238f230d214359819afe88ae28e619b3b7b1
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 7/45
malicious

IPs

IP Country Detection
192.0.78.24
United States
162.159.134.233
United States

Domains

Name IP Detection
eminkoy.com
192.0.78.24
www.eminkoy.com
0.0.0.0
www.towne-kitchen.com
0.0.0.0
Click to see the 2 hidden entries
google.com
172.217.168.14
cdn.discordapp.com
162.159.134.233

URLs

Name Detection
www.getyourshoponline.com/t3t2/
http://www.eminkoy.com/t3t2/?YTX8m6=X/AHJ1G8CzET27bRNAkcy2zo056pG+X2bUgtrIM6Usdw2LVzhx3zymRQr/cABPSK+z/Wow==&GZS=5jiXYnvXE6
http://schemas.openformatrg/package/2006/content-t
Click to see the 16 hidden entries
http://servername/isapibackend.dll
http://schemas.open
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.%s.comPA
http://investor.msn.com/
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
https://cdn.discordapp.com/attachments/915347845752705109/915799800740462662/mono.jpg
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://schemas.openformatrg/package/2006/r
http://www.icra.org/vocabulary/.
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com
http://scas.openformatrg/drawml/2006/main
http://www.windows.com/pctv.

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{582F6110-BFFF-4A00-AFCC-377131C85BB6}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\Client.vbs
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Client.vbs:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mono[1].jpg
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BDFCFD8E-5D0B-4E49-95FE-9EC3FCEBDEC2}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FC8F9541-11E4-44D3-9FC5-A237F7994E65}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RFQ-18072 QPHN .LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Fri Dec 3 01:35:19 2021, length=2186552, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JY9EL42KE7ZQ9VG6UU1W.temp
data
#
C:\Users\user\Desktop\~$Q-18072 QPHN .doc
data
#