=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

BL Copy.doc

Status: finished
Submission Time: 2022-01-24 13:10:08 +01:00
Malicious
Trojan
Exploiter
GuLoader

Comments

Tags

  • doc

Details

  • Analysis ID:
    558760
  • API (Web) ID:
    926285
  • Analysis Started:
    2022-01-24 13:10:13 +01:00
  • Analysis Finished:
    2022-01-24 13:17:56 +01:00
  • MD5:
    2fea7c43cd327113333de7ff54800979
  • SHA1:
    b2cf7c97bbfec5b765ee9402f57440910ec89e8b
  • SHA256:
    6ed3aca39d91726d1f16ecb2fa8fc5cc38fa4cce1355bfd5186d2a22769e806c
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
16/58

malicious
9/43

malicious

malicious

IPs

IP Country Detection
131.153.37.3
United States

Domains

Name IP Detection
margos.org
131.153.37.3

URLs

Name Detection
http://margos.org/dda/SYNT.exe
4,0,414120409,0000000000089000,00000104,00000010,00020000,00000000,1,0
https://bangladeshshoecity.com/im
Click to see the 1 hidden entries
http://nsis.sf.net/NSIS_ErrorError

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SYNT[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Roaming\Puportd92.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{573B2821-EBC2-4E0A-8D46-4D648AF74F39}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D4F37F31-6975-4B52-BDB7-988DCA18729A}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DF251CD5-FF6C-451C-B429-835255A63BB9}.tmp
data
#
C:\Users\user\AppData\Local\Temp\Stenkastenes.dat
DOS executable (COM)
#
C:\Users\user\AppData\Local\Temp\gamer.txt
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\nsq4443.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\BL Copy.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Mon Jan 24 20:10:17 2022, length=1786089, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$L Copy.doc
data
#