top title background image
flash

PO-DOC_MDR0307_019.doc

Status: finished
Submission Time: 2022-01-12 13:06:29 +01:00
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

  • doc

Details

  • Analysis ID:
    551723
  • API (Web) ID:
    919235
  • Analysis Started:
    2022-01-12 13:24:59 +01:00
  • Analysis Finished:
    2022-01-12 13:37:24 +01:00
  • MD5:
    4f272fdc3b700db5f177238fa35c36d1
  • SHA1:
    a84e9d00f1c4f553e7ff362de09ffedd95f3812f
  • SHA256:
    d6c1c2c9b1c34a828b5c0caeab60fff25aa0cadc2e833175c721b0566d2ea823
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 26/58
malicious
Score: 23/43
malicious
malicious

IPs

IP Country Detection
212.192.246.251
Russian Federation
2.58.149.41
Netherlands

Domains

Name IP Detection
nsayers4rm382.bounceme.net
212.192.246.251
kizitox.cf
2.58.149.41

URLs

Name Detection
http://kizitox.cf/plugmanzx.exe
nsayers4rm382.bounceme.net
127.0.0.1
Click to see the 4 hidden entries
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://google.com
http://servername/isapibackend.dll

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\plugmanzx[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{52150FD1-5CC4-4E37-8779-B8CDDC719BF6}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Roaming\plugmandcio8974.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 19 hidden entries
C:\Users\user\AppData\Local\Temp\tmp5800.tmp
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
data
#
C:\Users\user\AppData\Roaming\GVujWCI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Desktop\~$-DOC_MDR0307_019.doc
data
#
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0I4QYEQKG9GOSY7Y4V5C.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO-DOC_MDR0307_019.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:57 2021, mtime=Mon Aug 30 20:08:57 2021, atime=Wed Jan 12 20:25:16 2022, length=30467, window=hide
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\storage.dat
data
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\settings.bin
data
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\settings.bak
data
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
data
#
C:\Users\user\AppData\Local\Temp\tmpCBC2.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmpC5EA.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F9B2DBE1-15F4-4D40-9F85-BB60A6C1DBB6}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEE970F3-FF5B-46FC-8C2B-AC41464B46E8}.tmp
data
#