=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

lUkTchBi9r.rtf

Status: finished
Submission Time: 2022-01-27 10:53:07 +01:00
Malicious
Trojan
Exploiter
Evader
GuLoader

Comments

Tags

  • rtf

Details

  • Analysis ID:
    561321
  • API (Web) ID:
    928846
  • Analysis Started:
    2022-01-27 10:54:17 +01:00
  • Analysis Finished:
    2022-01-27 11:01:38 +01:00
  • MD5:
    4f51af14d712b6214c64090a79cb228b
  • SHA1:
    6bf1f72ade16239db6cc14d13191b11278308dd6
  • SHA256:
    7a3188668cd5ef9ed4e17d9f41a9b5eb22690eb9d6151caf9933f121bfbcedbe
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
29/54

malicious
22/43

malicious

malicious

IPs

IP Country Detection
172.245.119.43
United States

URLs

Name Detection
https://bangladeshshoecity.com/images/2w
http://172.245.119.43/344/vbc.exe
http://nsis.sf.net/NSIS_ErrorError

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{B32AB2E9-05F1-4F55-B3EB-076D90494645}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0496D1D0-60A5-4F47-A148-E865F3816FAF}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5E110DC0-3FB3-4FCA-B33A-F5DC88334AB4}.tmp
data
#
C:\Users\user\AppData\Local\Temp\Bosporus5.dat
DOS executable (COM)
#
C:\Users\user\AppData\Local\Temp\gamer.txt
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\nsb88D0.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\lUkTchBi9r.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 27 17:54:15 2022, mtime=Thu Jan 27 17:54:15 2022, atime=Thu Jan 27 17:54:19 2022, length=25648, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$kTchBi9r.rtf
data
#