top title background image
flash

New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm

Status: finished
Submission Time: 2024-07-22 15:50:09 +02:00
Malicious
Exploiter
Evader
Trojan
Spyware

Comments

Tags

  • docm

Details

  • Analysis ID:
    1478411
  • API (Web) ID:
    1478411
  • Analysis Started:
    2024-07-22 15:50:15 +02:00
  • Analysis Finished:
    2024-07-22 16:11:31 +02:00
  • MD5:
    dd2100dfa067caae416b885637adc4ef
  • SHA1:
    499f8881f4927e7b4a1a0448f62c60741ea6d44b
  • SHA256:
    803727ccdf441e49096f3fd48107a5fe55c56c080f46773cd649c9e55ec1be61
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 88
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

Third Party Analysis Engines

malicious
Score: 10/38

IPs

IP Country Detection
172.104.160.126
United States
239.255.255.250
Reserved
142.250.186.164
United States

Domains

Name IP Detection
www.google.com
142.250.186.164

URLs

Name Detection
http://172.104.160.126:8099/payload2.txt
http://172.104.160.126:8099
http://172.104.160.126:5000/Uploadss
Click to see the 33 hidden entries
http://172.104.160.
http://172.104.160.126:8099/pay
http://172.104.160.126:8099/pay0
http://172.104.160.126:8099/payload2.txton
https://aka.ms/vs/17/release/vc_redist.x64.exe
https://curl.se/docs/alt-svc.html#
https://curl.se/docs/copyright.htmlD
https://curl.se/docs/hsts.html#
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
http://172.104.160.126:8099/payload2.txtr
https://ac.ecosia.org/autocomplete?q=
http://172.104.160.126:8099/payload2.txts
https://curl.se/P
https://curl.se/docs/http-cookies.html#
http://172.104.160.126:8099/payload2.txt6
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
http://172.104.160.126:8099/payload2.txto
https://curl.se/docs/hsts.html
https://duckduckgo.com/chrome_newtab
https://curl.se/docs/sslcerts.htmlcurl
https://curl.se/docs/sslcerts.html
https://www.ecosia.org/newtab/
https://curl.se/docs/alt-svc.html
http://172.104.160.126:5000/Upl
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://172.104.160.126:8099/payload2.txt-oC:
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://172.104.160.126:80X99
https://curl.se/docs/http-cookies.html
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
https://duckduckgo.com/ac/?q=
https://curl.se/libcurl/c/curl_easy_setopt.html
http://172.104.160.126:8099/payload2.txt6ov

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRC0000.tmp
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Temp\curl.txt
PEM certificate
#
C:\Users\user\AppData\Local\Temp\mscorsvc.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Temp\mscorsvc.txt
PEM certificate
#
C:\Users\user\Downloads\MsftRecoveryToolForCSv2.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
#