top title background image
flash

PO789.doc

Status: finished
Submission Time: 2022-01-13 18:12:35 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • doc
  • Formbook

Details

  • Analysis ID:
    552782
  • API (Web) ID:
    920304
  • Analysis Started:
    2022-01-13 18:16:09 +01:00
  • Analysis Finished:
    2022-01-13 18:30:07 +01:00
  • MD5:
    6c28e31d32e97db724188025636ac25e
  • SHA1:
    c5818d1883785293dfab00d2c1389b82cc74ad60
  • SHA256:
    c24d7ca6493677f640cf6d4a90c746f949749f46e45873d77a71b94ab707a21f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 34/59
malicious
Score: 12/35
malicious
Score: 22/41
malicious
malicious

IPs

IP Country Detection
2.58.149.41
Netherlands
23.227.38.74
Canada
109.94.209.123
Russian Federation
Click to see the 2 hidden entries
91.195.240.13
Germany
34.102.136.180
United States

Domains

Name IP Detection
peak-tv.tk
2.58.149.41
www.extraordinarymiracle.com
109.94.209.123
www.realstakepool.com
91.195.240.13
Click to see the 5 hidden entries
shops.myshopify.com
23.227.38.74
www.muzicalbox.com
0.0.0.0
www.prestigiousuniforms.com
0.0.0.0
muzicalbox.com
34.102.136.180
www.danielkcarter.store
172.67.181.75

URLs

Name Detection
http://peak-tv.tk/medicomzx.exe
http://www.extraordinarymiracle.com/md4m/?o6=g4mIzHCmTqQfqybpH+qy2JB4BTiy5veIhmlYwoI1p7WHXjRjdWpxwA0RJbk1Zi8DwkVpDA==&WZ8=Jpspdz90i
http://www.realstakepool.com/md4m/?o6=iivCXU6wK9iYddcjehmaxCiNBPMMgXmeZKHdMU3TLXq0dC3uGVX9MdG5RNTIsnXyIv0bSw==&WZ8=Jpspdz90i
Click to see the 40 hidden entries
www.carbonfiber.cloud/md4m/
http://www.prestigiousuniforms.com/md4m/?o6=p4xWrkA40RaAiMZ6Ntaaay3F30x2NdNJQ5dt1rIhfvyBUiMTXG+B7J0pDtQSIysgwfDsvA==&WZ8=Jpspdz90i
http://www.fatcow.com/free-icons/
http://www.small-icons.com/packs/16x16-free-application-icons.htm
http://splashyfish.com/icons/
http://www.piriform.com/ccleanerhttp://www.piriform.com/cclea
http://www.msn.com/?ocid=iehp01l
http://investor.msn.com/
http://www.msn.com/?ocid=iehp
http://www.msn.com/de-de/?ocid=iehp
http://www.gnome.org/
http://www.icra.org/vocabulary/.
http://www.muzicalbox.com/md4m/?o6=iLbGWxMFXdgKEpL2TSMWaw9OaDtRDyXHkSE5TtIvNbs2aDnrNryG0VWzTBZoyEuMZj5Q2g==&WZ8=Jpspdz90i
http://www.piriform.com/ccleaner
http://computername/printers/printername/.printer
http://led24.de/iconset/
http://www.%s.comPA
http://www.autoitscript.com/autoit3
https://support.mozilla.org
http://servername/isapibackend.dll
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://investor.msn.com
http://www.msnbc.com/news/ticker.txt
http://wellformedweb.org/CommentAPI/
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
https://visualpharm.com/must_have_icon_set/
https://github.com/proviq/lusrmgr/Chttps://github.com/proviq/lusrmgr
http://www.iis.fhg.de/audioPA
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1LMEM
https://github.com/proviq/lusrmgr
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://www.hotmail.com/oe
http://treyresearch.net
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
http://p.yusukekamiyamane.com/
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://java.sun.com
https://github.com/proviq/lusrmgr/
http://www.windows.com/pctv.
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\medicomzx[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{828CF0EA-BCAC-4336-9A41-FE0BC8A11CE4}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Roaming\medicomsh78694.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 6 hidden entries
C:\Users\user\Desktop\~$PO789.doc
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8CA50CAD-0168-40C5-9DE5-3A2EB92A8144}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A1ACA359-D73C-4E90-86E8-AE0089CF8F67}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO789.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Fri Jan 14 01:16:16 2022, length=21489, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#