=
flash

3.ppam

Status: finished
Submission Time: 14.01.2022 12:12:20
Malicious
Exploiter
Evader
Trojan
AgentTesla

Comments

Tags

  • ppam

Details

  • Analysis ID:
    553159
  • API (Web) ID:
    920681
  • Analysis Started:
    14.01.2022 12:12:21
  • Analysis Finished:
    14.01.2022 12:28:31
  • MD5:
    df075573f3546a582d5f4c690a469d9d
  • SHA1:
    60c1884b11d4eb05f687e077adadcd749b7a488d
  • SHA256:
    4337ff8e652f6fe6b0a8d0a01a67c23764a3bf31eb9ae5fca8826f246d1de2ed
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
56/100

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run Condition: Potential for more IOCs and behavior

malicious
100/100

malicious
11/43

malicious

IPs

IP Country Detection
207.32.217.137
United States
104.16.202.237
United States
142.250.186.129
United States
Click to see the 5 hidden entries
67.199.248.17
United States
104.16.203.237
United States
34.102.176.152
United States
199.91.155.3
United States
67.199.248.11
United States

Domains

Name IP Detection
www.j.mp
0.0.0.0
5940e470-33c6-4a99-b802-7f11323388a6.usrfiles.com
0.0.0.0
www.mediafire.com
104.16.202.237
Click to see the 7 hidden entries
bit.ly
67.199.248.11
blogspot.l.googleusercontent.com
142.250.186.129
j.mp
67.199.248.17
gcp.media-router.wixstatic.com
34.102.176.152
download2262.mediafire.com
199.91.155.3
p26ynn.blogspot.com
0.0.0.0
p6tbbb.blogspot.com
0.0.0.0

URLs

Name Detection
https://api.diagnosticssdf.office.com
http://127.0.0.1:HTTP/1.1
https://login.microsoftonline.com/
Click to see the 97 hidden entries
https://shell.suite.office.com:1443
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
https://autodiscover-s.outlook.com/
https://roaming.edog.
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
https://cdn.entity.
https://api.addins.omex.office.net/appinfo/query
https://clients.config.office.net/user/v1.0/tenantassociationkey
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
https://powerlift.acompli.net
https://rpsticket.partnerservices.getmicrosoftkey.com
https://lookup.onenote.com/lookup/geolocation/v1
https://cortana.ai
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://cloudfiles.onenote.com/upload.aspx
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
http://www.j.mp/asasdjiasjdiasjasdasddik
https://entitlement.diagnosticssdf.office.com
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
https://api.aadrm.com/
https://ofcrecsvcapi-int.azurewebsites.net/
https://www.mediafire.com/file/nm9ysba5ejf20r8/6.dll/file
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
https://api.microsoftstream.com/api/
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
https://cr.office.com
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
https://portal.office.com/account/?ref=ClientMeControl
https://graph.ppe.windows.net
https://res.getmicrosoftkey.com/api/redemptionevents
https://powerlift-frontdesk.acompli.net
https://tasks.office.com
https://officeci.azurewebsites.net/api/
https://p26ynn.blogspot.com/atom.xml
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
https://5940e470-33c6-4a99-b802-7f11323388a6.usrfiles.com/ugd/5940e4_979408a19b03449f8221c8f8d235fa55.txt
http://kVEmyA.com
https://store.office.cn/addinstemplate
https://api.aadrm.com
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
https://go.micro
https://outlook.office.com/autosuggest/api/v1/init?cvid=
https://globaldisco.crm.dynamics.com
http://bit.ly/asasdjiasjdiasjasdasddik
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://dev0-api.acompli.net/autodetect
https://www.odwebp.svc.ms
https://api.powerbi.com/v1.0/myorg/groups
https://web.microsoftstream.com/video/
https://api.addins.store.officeppe.com/addinstemplate
https://graph.windows.net
https://dataservice.o365filtering.com/
https://officesetup.getmicrosoftkey.com
https://analysis.windows.net/powerbi/api
https://prod-global-autodetect.acompli.net/autodetect
https://outlook.office365.com/autodiscover/autodiscover.json
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
https://ncus.contentsync.
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
https://www.mediafire.com/file/5avuvurhf9r42y3/6.dll/file
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
http://weather.service.msn.com/data.aspx
https://apis.live.net/v5.0/
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
https://management.azure.com
https://outlook.office365.com
https://wus2.contentsync.
http://207.32.217.137:8081x&bq(
https://incidents.diagnostics.office.com
https://p6tbbb.blogspot.com/atom.xml
https://clients.config.office.net/user/v1.0/ios
https://insertmedia.bing.office.net/odc/insertmedia
https://o365auditrealtimeingestion.manage.office.com
https://outlook.office365.com/api/v1.0/me/Activities
https://api.office.net
https://incidents.diagnosticssdf.office.com
https://asgsmsproxyapi.azurewebsites.net/
https://clients.config.office.net/user/v1.0/android/policies
https://entitlement.diagnostics.office.com
http://207.32.217.137:8081/n/p6df/asshole/08e40c81aa01a5cf.php127.0.0.1POST
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
https://substrate.office.com/search/api/v2/init
https://outlook.office.com/
https://storage.live.com/clientlogs/uploadlocation
https://outlook.office365.com/
https://webshell.suite.office.com
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
https://substrate.office.com/search/api/v1/SearchHistory
https://download2262.mediafire.com/1rxjqgtrygkg/5avuvurhf9r42y3/6.dll
https://management.azure.com/
https://login.windows.net/common/oauth2/authorize
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
https://download2262.mediafire.com/u45xa78x9nkg/5avuvurhf9r42y3/6.dll

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\3.ppam.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 23 14:11:42 2021, mtime=Fri Jan 14 19:19:42 2022, atime=Fri Jan 14 19:19:24 2022, length=12137, window=hide
#
C:\Users\user\Desktop\~$3.ppam
data
#
C:\Users\user\Pictures\notnice.ps1
ASCII text, with CRLF line terminators
#
Click to see the 26 hidden entries
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\8C01FE73-17BC-469B-9266-AF90E081EBE6
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aslmsvnf.ger.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fdnca5x3.uvv.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jde4l4rg.xur.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5ax1rj2.edq.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_toqs3qr1.2zp.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_txdgbers.q4d.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucm40ytk.tsg.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzzf3cwh.xmg.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\~DF1369462A1EE99835.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF85570804A0D29ED2.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DF9BC36A1CA590193F.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DF9DBD3B75C3E39F13.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFAD037A81745781F0.TMP
data
#
C:\Users\user\AppData\Roaming\Microsoft\Forms\POWERPNT.box
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2IDCQDM3N311XDK6HX9H.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H9YDYMUH59Q25R60FLIG.temp
data
#
C:\Users\user\Documents\20220114\PowerShell_transcript.651689.83OSY4Al.20220114122046.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220114\PowerShell_transcript.651689.LhIXpgD7.20220114121949.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220114\PowerShell_transcript.651689.TDo_fU7j.20220114122054.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220114\PowerShell_transcript.651689.x22XD8Wy.20220114122042.txt
HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#