flash

PO-08784 xlsx.vbe

Status: finished
Submission Time: 2022-11-28 17:57:17 +01:00
Malicious
Exploiter
Trojan
Spyware
Evader
AgentTesla, GuLoader

Comments

Tags

  • GuLoader
  • vbe

Details

  • Analysis ID:
    755441
  • API (Web) ID:
    1122721
  • Analysis Started:
    2022-11-28 17:57:24 +01:00
  • Analysis Finished:
    2022-11-28 18:28:02 +01:00
  • MD5:
    266115592f966240c14dfeeec624bdf5
  • SHA1:
    455a06b52d8e8f46d9a80067d3d1b1ea23036d65
  • SHA256:
    1df8d51920f7e386c6b86379363cc42dd86fe47a933e36cecd23c7b08d3118e2
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
72/100

System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

malicious
100/100

malicious
9/91

malicious

IPs

IP Country Detection
185.31.121.136
Bulgaria
54.91.59.199
United States
192.185.145.188
United States

Domains

Name IP Detection
ftp.mcmprint.net
185.31.121.136
api.ipify.org.herokudns.com
54.91.59.199
b3solutionscws.com
192.185.145.188
Click to see the 1 hidden entries
api.ipify.org
0.0.0.0

URLs

Name Detection
https://api.ipify.orgftp://ftp.mcmprint.netklogz
http://www.apache.org/licenses/LICENSE-2.0.html
https://github.com/Pester/Pester
Click to see the 17 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://contoso.com/Icon
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
https://contoso.com/License
https://nuget.org/nuget.exe
https://contoso.com/
https://api.ipify.org/
https://aka.ms/pscore6lB
http://oqyPj4HORVpk3nSGGk.netXy
http://pesterbdd.com/images/Pester.png
http://oqyPj4HORVpk3nSGGk.net
http://b3solutionscws.com/wp-admin/includes/UtXRqIMUipDp192.pfb
https://api.ipify.org
http://nuget.org/NuGet.exe
http://127.0.0.1:HTTP/1.1
http://kmbImL.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\3uneeqsg\3uneeqsg.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\3uneeqsg\3uneeqsg.0.cs
Unicode text, UTF-8 (with BOM) text, with very long lines (1075), with no line terminators
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Temp\3uneeqsg\3uneeqsg.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\3uneeqsg\3uneeqsg.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\3uneeqsg\CSC7012D3CA523F4D77AF1E1BF90852658.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\RES6FA6.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Nov 28 18:13:31 2022, 1st section name ".debug$S"
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m3npi4ip.vsh.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zft31ohr.hmb.ps1
ASCII text, with no line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#