Malicious
Malicious

9d119a5ac367be7dd43ed0ffff7d2167

MS Office Document
|
MD5: 9d119a5ac367be7dd43ed0ffff7d2167
|
Size: 3.48 MB
|
application/vnd.ms-office

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
9d119a5ac367be7dd43ed0ffff7d2167
Sha1
c6fe8aff5653b0e51ec4d66be5388d9c0a04e096
Sha256
ceffb43a1accb587a4d7dcff57320c74d60cdd7c73cdc287518fe2e269390258
Sha384
46453993c95ef63aca171088fc72b2f3ad72cb726c1d178059271a4a069c32ed0081b881b8bec2ddac29b7259f69875a
Sha512
30cb2922d9039977bd967261690de113ec8098babb2bdbc337dac789c52eff963c0667db42a8187995206e4057126f5d855d0c1a3ee076bcd4ba3445cd4e1a10
SSDeep
98304:XAfwrtyw4veHjPMNaHYpN0njSTBIMV39ZAs:wZeH9WGn0jd
TLSH
8EF5AE123989C673E5BF93305969C73A92F97EA1377344CB63E49E2E0E319C14636B12
File Structure
Root Entry
Malicious
䡀䆒䑲
䡀䌏䈯
䡀㲞䈝䗻
䡀䈖䌧䠤
䡀䌋䄱䜵
䡀䌍䏤䊲
䡀䕎䒵䠵
䌋䄱䜵㷾䚨
䌋䄱䜵㾾䠳
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䈛䌪䗶䜵
䡀䋌䆨㫮䛲
䡀䋜䕲䆷䗸
䡀䒌䗱䒵䠯
䡀䓞䕪䇤䠨
䡀䕙䓲䕨䜷
䆒䑲㲾䒦䈾䈻
䌋䄱䜵䌾䉱䠲
䡀䆊䌷䑲䈝䗻
䡀䈝䗻䗜䏼䠨
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䌋䄱䜵䅾䑤䈱䠵
䌋䄱䜵䇾䄬䒯䠪
䌋䄱䜵䗾䅤䄥䎦
䡀㼿䕷䑬㭪䗤䠤
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[Base64-Block]
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䄛䌧㫲䗸䒷䠱
䡀䒌䗱䒵㮯䈹䗱
䡀䕌䄨䈷䒏䇯䕨
䡀䘌䗶䐲䆊䌷䑲
䡀䙎䑨㶷䓤䌳䊱
䌋䄱䜵䆾䐲䏳䗨䠬
䌋䄱䜵䆾䖸䌷䒦䠱
䌋䄱䜵䈾䆻䄯䌰䠦
䌋䄱䜵䌾䖱䌷䒦䠱
䌋䄱䜵䕾䐨䙲䆬䠲
䌋䄱䜵䕾䓨䌤䌵䠦
[Authenticode]_c7fbe3cc.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
䡀䄕䑸䋦䒌䇱䗬䒬䠱
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䒌䗱䒵㬯䑲䌧䌷䑲
[Authenticode]_17eabfa7.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0002
ID:1033
䌋䄱䜵䆾䇰䌯䎱䕤䒵䠺
[Authenticode]_d070495c.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
_RDATA
.rsrc
.reloc
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
䡀䒋䗲䗶䄵䓳䕨㲞䈜䘴䑨䈦
[Authenticode]_90727de2.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
䌋䄱䜵㻾㠓㥁㠁㧃䟀䐬䟪䄰䑬䞁䓭䠪
䌋䄱䜵㻾㠓㥁㠁㧃䟀䐬䟪䄰䑬䞁䓭䠪-preview.png
DigitalSignature
䌋䄱䜵㹾䚲䕨䋜䏨㼯䕦䓬㵷䘤䆱䈫䞵䏧䠯
[Authenticode]_1d5a3372.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
SummaryInformation
MsiDigitalSignatureEx
Artefacts
Name
Value
URLs in VB Code - #1

http://t2.symcb.com0

URLs in VB Code - #2

http://t1.symcb.com/ThawtePCA.crl0

URLs in VB Code - #3

http://tl.symcb.com/tl.crl0

URLs in VB Code - #4

https://www.thawte.com/cps0/

URLs in VB Code - #5

https://www.thawte.com/repository0W

URLs in VB Code - #6

http://tl.symcb.com/tl.crt0

URLs in VB Code - #7

https://www.advancedinstaller.com

URLs in VB Code - #8

https://d.symcb.com/cps0%

URLs in VB Code - #9

https://d.symcb.com/rpa0

URLs in VB Code - #10

http://s.symcd.com06

URLs in VB Code - #11

http://s.symcb.com/universal-root.crl0

URLs in VB Code - #12

https://d.symcb.com/rpa0@

URLs in VB Code - #13

http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0

URLs in VB Code - #14

http://ts-ocsp.ws.symantec.com0

URLs in VB Code - #15

http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0

URLs in VB Code - #16

http://schemas.microsoft.com/SMI/2005/WindowsSettings

URLs in VB Code - #17

https://dnot.sh/

URLs in VB Code - #18

https://main45.b-cdn.net/new26/MicrosoftEdgeUpdateTaskMachineCoreB.msi

URLs in VB Code - #19

https://main45.b-cdn.net/new26/monitor

URLs in VB Code - #20

https://main45.b-cdn.net/new26/new30h.jar

URLs in VB Code - #21

http://www.microsoft.com/pkiops/crl/Microsoft%20ID%20Verified%20CS%20EOC%20CA%2001.crl0

URLs in VB Code - #22

http://www.microsoft.com/pkiops/certs/Microsoft%20ID%20Verified%20CS%20EOC%20CA%2001.crt0

URLs in VB Code - #23

http://oneocsp.microsoft.com/ocsp0f

URLs in VB Code - #24

http://www.microsoft.com/pkiops/Docs/Repository.htm0

URLs in VB Code - #25

http://www.microsoft.com/pkiops/crl/Microsoft%20ID%20Verified%20Code%20Signing%20PCA%202021.crl0

URLs in VB Code - #26

http://www.microsoft.com/pkiops/certs/Microsoft%20ID%20Verified%20Code%20Signing%20PCA%202021.crt0

URLs in VB Code - #27

http://oneocsp.microsoft.com/ocsp0

URLs in VB Code - #28

http://www.microsoft.com/pkiops/crl/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crl0

URLs in VB Code - #29

http://www.microsoft.com/pkiops/certs/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crt0

URLs in VB Code - #30

http://www.microsoft.com/pkiops/crl/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crl0y

URLs in VB Code - #31

http://www.microsoft.com/pkiops/certs/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crt0

URLs in VB Code - #1

http://t2.symcb.com0

URLs in VB Code - #2

http://t1.symcb.com/ThawtePCA.crl0

URLs in VB Code - #3

http://tl.symcb.com/tl.crl0

URLs in VB Code - #4

https://www.thawte.com/cps0/

URLs in VB Code - #5

https://www.thawte.com/repository0W

URLs in VB Code - #6

http://tl.symcb.com/tl.crt0

URLs in VB Code - #7

https://www.advancedinstaller.com

URLs in VB Code - #8

https://d.symcb.com/cps0%

URLs in VB Code - #9

https://d.symcb.com/rpa0

URLs in VB Code - #10

http://s.symcd.com06

URLs in VB Code - #11

http://s.symcb.com/universal-root.crl0

URLs in VB Code - #12

https://d.symcb.com/rpa0@

URLs in VB Code - #13

http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0

URLs in VB Code - #14

http://ts-ocsp.ws.symantec.com0

URLs in VB Code - #15

http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0

9d119a5ac367be7dd43ed0ffff7d2167 (3.48 MB)
File Structure
Root Entry
Malicious
䡀䆒䑲
䡀䌏䈯
䡀㲞䈝䗻
䡀䈖䌧䠤
䡀䌋䄱䜵
䡀䌍䏤䊲
䡀䕎䒵䠵
䌋䄱䜵㷾䚨
䌋䄱䜵㾾䠳
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䈛䌪䗶䜵
䡀䋌䆨㫮䛲
䡀䋜䕲䆷䗸
䡀䒌䗱䒵䠯
䡀䓞䕪䇤䠨
䡀䕙䓲䕨䜷
䆒䑲㲾䒦䈾䈻
䌋䄱䜵䌾䉱䠲
䡀䆊䌷䑲䈝䗻
䡀䈝䗻䗜䏼䠨
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䌋䄱䜵䅾䑤䈱䠵
䌋䄱䜵䇾䄬䒯䠪
䌋䄱䜵䗾䅤䄥䎦
䡀㼿䕷䑬㭪䗤䠤
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[Base64-Block]
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䄛䌧㫲䗸䒷䠱
䡀䒌䗱䒵㮯䈹䗱
䡀䕌䄨䈷䒏䇯䕨
䡀䘌䗶䐲䆊䌷䑲
䡀䙎䑨㶷䓤䌳䊱
䌋䄱䜵䆾䐲䏳䗨䠬
䌋䄱䜵䆾䖸䌷䒦䠱
䌋䄱䜵䈾䆻䄯䌰䠦
䌋䄱䜵䌾䖱䌷䒦䠱
䌋䄱䜵䕾䐨䙲䆬䠲
䌋䄱䜵䕾䓨䌤䌵䠦
[Authenticode]_c7fbe3cc.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
䡀䄕䑸䋦䒌䇱䗬䒬䠱
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䒌䗱䒵㬯䑲䌧䌷䑲
[Authenticode]_17eabfa7.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0002
ID:1033
䌋䄱䜵䆾䇰䌯䎱䕤䒵䠺
[Authenticode]_d070495c.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
_RDATA
.rsrc
.reloc
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
䡀䒋䗲䗶䄵䓳䕨㲞䈜䘴䑨䈦
[Authenticode]_90727de2.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
䌋䄱䜵㻾㠓㥁㠁㧃䟀䐬䟪䄰䑬䞁䓭䠪
䌋䄱䜵㻾㠓㥁㠁㧃䟀䐬䟪䄰䑬䞁䓭䠪-preview.png
DigitalSignature
䌋䄱䜵㹾䚲䕨䋜䏨㼯䕦䓬㵷䘤䆱䈫䞵䏧䠯
[Authenticode]_1d5a3372.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
SummaryInformation
MsiDigitalSignatureEx
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
URLs in VB Code - #1

http://t2.symcb.com0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #2

http://t1.symcb.com/ThawtePCA.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #3

http://tl.symcb.com/tl.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #4

https://www.thawte.com/cps0/

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #5

https://www.thawte.com/repository0W

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #6

http://tl.symcb.com/tl.crt0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #7

https://www.advancedinstaller.com

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #8

https://d.symcb.com/cps0%

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #9

https://d.symcb.com/rpa0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #10

http://s.symcd.com06

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #11

http://s.symcb.com/universal-root.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #12

https://d.symcb.com/rpa0@

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #13

http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #14

http://ts-ocsp.ws.symantec.com0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #15

http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #16

http://schemas.microsoft.com/SMI/2005/WindowsSettings

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #17

https://dnot.sh/

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #18

https://main45.b-cdn.net/new26/MicrosoftEdgeUpdateTaskMachineCoreB.msi

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #19

https://main45.b-cdn.net/new26/monitor

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #20

https://main45.b-cdn.net/new26/new30h.jar

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #21

http://www.microsoft.com/pkiops/crl/Microsoft%20ID%20Verified%20CS%20EOC%20CA%2001.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #22

http://www.microsoft.com/pkiops/certs/Microsoft%20ID%20Verified%20CS%20EOC%20CA%2001.crt0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #23

http://oneocsp.microsoft.com/ocsp0f

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #24

http://www.microsoft.com/pkiops/Docs/Repository.htm0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #25

http://www.microsoft.com/pkiops/crl/Microsoft%20ID%20Verified%20Code%20Signing%20PCA%202021.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #26

http://www.microsoft.com/pkiops/certs/Microsoft%20ID%20Verified%20Code%20Signing%20PCA%202021.crt0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #27

http://oneocsp.microsoft.com/ocsp0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #28

http://www.microsoft.com/pkiops/crl/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crl0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #29

http://www.microsoft.com/pkiops/certs/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crt0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #30

http://www.microsoft.com/pkiops/crl/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crl0y

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #31

http://www.microsoft.com/pkiops/certs/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crt0

9d119a5ac367be7dd43ed0ffff7d2167

URLs in VB Code - #1

http://t2.symcb.com0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #2

http://t1.symcb.com/ThawtePCA.crl0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #3

http://tl.symcb.com/tl.crl0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #4

https://www.thawte.com/cps0/

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #5

https://www.thawte.com/repository0W

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #6

http://tl.symcb.com/tl.crt0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #7

https://www.advancedinstaller.com

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #8

https://d.symcb.com/cps0%

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #9

https://d.symcb.com/rpa0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #10

http://s.symcd.com06

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #11

http://s.symcb.com/universal-root.crl0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #12

https://d.symcb.com/rpa0@

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #13

http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #14

http://ts-ocsp.ws.symantec.com0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

URLs in VB Code - #15

http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0

9d119a5ac367be7dd43ed0ffff7d2167 > Root Entry > 䌋䄱䜵䄾䆬䖸䄷䗦䇾䏯

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙