top title background image
flash

ACP-2210825ORDER.xls

Status: finished
Submission Time: 2022-11-29 08:09:12 +01:00
Malicious
Trojan
Exploiter
Evader
GuLoader

Comments

Tags

  • xls

Details

  • Analysis ID:
    755822
  • API (Web) ID:
    1123097
  • Analysis Started:
    2022-11-29 08:11:40 +01:00
  • Analysis Finished:
    2022-11-29 08:18:35 +01:00
  • MD5:
    6c84860292e2a4d210396b7012be9b8a
  • SHA1:
    7061c26320bf8836b55ac660860fa0937ae8f48e
  • SHA256:
    cadae8bf6a2bcf1ee630695a250a481d22d0b6d409832f60070b118dfc3bca75
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 17/63
malicious
malicious

IPs

IP Country Detection
172.245.34.91
United States

URLs

Name Detection
http://172.245.34.91/5643/VBC.exe
http://172.245.34.91/5643/VBC.exej
http://172.245.34.91/5643/VBC.exel
Click to see the 2 hidden entries
http://nsis.sf.net/NSIS_ErrorError
http://172.245.34.91/5643/VBC.exehhC:

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\Vatersotiges\Knoglemarvsundersgelsen\Armoniac\libgiognutls.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\~DF688530565CAD41F4.TMP
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Nov 29 05:27:07 2022, Security: 1
#
Click to see the 17 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\VBC[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C6BD8529.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\Vatersotiges\Knoglemarvsundersgelsen\Armoniac\Urokkeligheden.Ord114
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\Obeyeo.Bib
data
#
C:\Users\user\AppData\Local\Temp\~DFEB3257B002629434.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF357B58C09F937A89.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF15E3E53C3844A1B8.TMP
data
#
C:\Users\user\AppData\Local\Temp\nsp5B93.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BC7C3885.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9BAF1916.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\95D0DCC2.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\628281DB.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A546E2A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\489D37C8.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2C485423.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A84DD94.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1F090A1F.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#