top title background image
flash

#confirmación+y+corrección+de+la+direccion.xls

Status: finished
Submission Time: 2022-05-27 12:00:11 +02:00
Malicious
Trojan
Exploiter
Evader
GuLoader

Comments

Tags

  • xlsx

Details

  • Analysis ID:
    635062
  • API (Web) ID:
    1002566
  • Analysis Started:
    2022-05-27 12:01:07 +02:00
  • Analysis Finished:
    2022-05-27 12:08:23 +02:00
  • MD5:
    3fed4357a9a31f6d784d90e0e2828cef
  • SHA1:
    b10fe00a3142c331aa805a78b5e01e9fa73d9c6b
  • SHA256:
    bc03e79179795e31ba88934475f0746f25a7382a157ab005a54cae03b83c797d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 34/62
malicious
Score: 7/22
malicious
Score: 24/41
malicious
malicious

IPs

IP Country Detection
2.56.57.22
Netherlands

URLs

Name Detection
http://2.56.57.22/droidttrre.exeP
http://2.56.57.22/droidttrre.exe
http://2.56.57.22/yendexoriginwithoutfilter_rctcon218.bin
Click to see the 21 hidden entries
http://2.56.57.22/droidttrre.exej
http://2.56.57.22/droidttrre.exeooC:
http://www.nero.com
https://github.com/dotnet/runtime
http://www.certum.pl/CPS0
http://www.symauth.com/cps0(
http://nsis.sf.net/NSIS_ErrorError
http://www.avast.com0/
http://repository.certum.pl/ctnca2.cer09
http://crl.certum.pl/ctnca2.crl0l
http://subca.ocsp-certum.com01
http://crl.certum.pl/ctsca2021.crl0o
http://subca.ocsp-certum.com02
http://ocsp.thawte.com0
http://www.symauth.com/rpa00
http://subca.ocsp-certum.com05
http://crl.certum.pl/ctnca.crl0k
http://repository.certum.pl/ctsca2021.cer0
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://repository.certum.pl/ctnca.cer09
http://creativecommons.org/licenses/by-sa/4.0/

Dropped files

Name File Type Hashes Detection
C:\Users\user\Desktop\~$#confirmaci#U00f3n+y+correcci#U00f3n+de+la+direccion.xls
data
#
C:\Users\user\AppData\Roaming\venxajlddf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\droidttrre[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Local\Temp\Undergangsstemningen.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF483FEDB67C914879.TMP
data
#
C:\Users\user\AppData\Local\Temp\p11-kit-trust.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsoF8F7.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\multimedia-volume-control-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\lang-1045.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\krista.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\folder-publicshare.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Temp\avutil-54.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\REPREHENSION.Deb
data
#
C:\Users\user\AppData\Local\Temp\MsMpLics.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Fecundify.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
#
C:\Users\user\AppData\Local\Temp\BD3.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\APPEASINGLY.ned
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\91FDCC81.png
PNG image data, 731 x 391, 8-bit/color RGB, interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\869A5E80.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#