top title background image
flash

d0ნ.xls

Status: finished
Submission Time: 2023-03-20 10:29:11 +01:00
Malicious
Ransomware
Trojan
Spyware
Exploiter
Evader
FormBook

Comments

Tags

  • CVE-2017-11882
  • xls

Details

  • Analysis ID:
    830388
  • API (Web) ID:
    1197490
  • Original Filename:
    P72215_შეთავაზება_7_კოდი-სგან.xls
  • Analysis Started:
    2023-03-20 10:32:12 +01:00
  • Analysis Finished:
    2023-03-20 10:46:00 +01:00
  • MD5:
    4f1aac12084426a909da47a49cf59193
  • SHA1:
    2eaf1072958ea81e87c86b5ec7a63228d623854b
  • SHA256:
    b861cc02ce6ad439e78219a4a0c154188de055794950d3e5d7fc51178f72971c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 12/39
malicious
malicious

IPs

IP Country Detection
78.141.192.145
France
161.97.163.8
United States
103.189.202.84
unknown
Click to see the 2 hidden entries
94.176.104.86
Romania
45.33.6.223
United States

Domains

Name IP Detection
www.bitservicesltd.com
161.97.163.8
white-hat.uk
94.176.104.86
gritslab.com
78.141.192.145
Click to see the 4 hidden entries
www.white-hat.uk
0.0.0.0
www.gritslab.com
0.0.0.0
www.222ambking.org
91.195.240.94
www.sqlite.org
45.33.6.223

URLs

Name Detection
http://www.un-object.com/u2kb/
http://white-hat.uk/u2kb/?MX=PXfMycAZpTAipct8YcIlv
http://www.un-object.com/u2kb/www.un-object.com
Click to see the 97 hidden entries
http://103.189.202.84/889r12/vbc.exehhC:
http://www.gritslab.com/u2kb/
http://www.bitservicesltd.com/u2kb/www.bitservicesltd.com
http://www.fclaimrewardccpointq.shop/u2kb/
http://www.fclaimrewardccpointq.shop/u2kb/www.fclaimrewardccpointq.shop
http://103.189.202.84/889r12/vbc.exer
http://www.bitservicesltd.com/u2kb/
http://www.avisrezervee.com/u2kb/www.avisrezervee.com
http://www.ecomofietsen.com/u2kb/www.ecomofietsen.com
http://www.avisrezervee.com/u2kb/
http://www.bitservicesltd.com/u2kb/?MX=rr+sOBvEXsBdGevUkpEFvjOGSuYjzi1YNHmXivr92FQhRIIYsedR2a+6GoV1WAKeGdj+MTdX512lJXnwfbSEi+kURcMlXNjU4ipRv+g=&uFI_=sroxa_9G7qh93
http://103.189.202.84/889r12/vbc.exej
http://www.shapshit.xyz/u2kb/
http://www.energyservicestation.com/u2kb/www.energyservicestation.com
http://www.ecomofietsen.com/u2kb/-wA
http://www.white-hat.uk/u2kb/www.white-hat.uk
http://www.gritslab.com/u2kb/?MX=ydCzFiH7iMWnz6xHMbeyIS2EYayY5efYQUsmgPEoYCSsyD6HgT3yOGCjssC2N8mKn+GjINYvhr7iKNK7QGdClLf278PMkWXjYWxIQds=&uFI_=sroxa_9G7qh93
http://www.white-hat.uk/u2kb/?MX=PXfMycAZpTAipct8YcIlv+jRzdgnyvgF2k7967nf/qU1A0mUqq9Jlnm9rK8XSf3D04yKTuePtKPnTC045fzMwSdM+ozxnu9rCO36QPo=&uFI_=sroxa_9G7qh93
http://103.189.202.84/889r12/vbc.exe
http://www.thedivinerudraksha.com/u2kb/www.thedivinerudraksha.com
http://www.thedivinerudraksha.com/u2kb/
http://www.ecomofietsen.com/u2kb/
http://www.gritslab.com/u2kb/www.gritslab.com
http://www.avisrezervee.com
http://www.thewildphotographer.co.uk/u2kb/
http://www.bitservicesltd.com
http://www.germanreps.comReferer:
http://investor.msn.com/
http://www.energyservicestation.com/u2kb/
http://www.germanreps.com/u2kb/5fQ
http://www.employerseervices.com/u2kb/www.employerseervices.com
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://www.icra.org/vocabulary/.
http://www.sqlite.org/2017/sqlite-dll-win32-x86-3170000.zip
http://www.thedivinerudraksha.com
http://www.ecomofietsen.com
http://www.energyservicestation.com
https://duckduckgo.com/chrome_newtab
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://localizability/practices/XMLConfiguration.asp
http://www.222ambking.org/u2kb/l
http://www.piriform.com/ccleaner1SPS0
http://ocsp.thawte.com0
http://www.employerseervices.com/u2kb/EJ
http://www.employerseervices.com/u2kb/
https://crash-reports.mozilla.com/submit?id=
http://wellformedweb.org/CommentAPI/
http://www.gritslab.comReferer:
http://www.white-hat.uk/u2kb/
http://investor.msn.com
http://www.shapshit.xyzReferer:
http://www.222ambking.org/u2kb/www.222ambking.org
http://www.sqlite.org/copyright.html.
http://www.thewildphotographer.co.uk
http://www.gritslab.com
http://www.hotmail.com/oe
http://www.piriform.com/ccleanerv
http://www.%s.comPA
http://www.younrock.comReferer:
http://www.mygloballojistik.online/u2kb/
http://nsis.sf.net/NSIS_ErrorError
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://www.younrock.com
http://www.222ambking.orgReferer:
http://www.windows.com/pctv.
http://servername/isapibackend.dll
http://www.autoitscript.com/autoit3
http://computername/printers/printername/.printer
http://www.avisrezervee.comReferer:
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.white-hat.uk
http://www.energyservicestation.comReferer:
http://www.fclaimrewardccpointq.shopReferer:
http://www.germanreps.com
http://treyresearch.net
http://www.mozilla.com0
http://www.iis.fhg.de/audioPA
https://duckduckgo.com/ac/?q=
http://www.white-hat.ukReferer:
http://www.shapshit.xyz
http://www.mygloballojistik.onlineReferer:
http://www.mygloballojistik.online
http://www.thewildphotographer.co.uk/u2kb/www.thewildphotographer.co.uk
http://www.piriform.com/ccleanerq
http://localizability/practices/XML.asp
http://www.bitservicesltd.comReferer:
http://www.msnbc.com/news/ticker.txt
http://www.un-object.comReferer:
http://www.thewildphotographer.co.uk/u2kb/t
http://www.222ambking.org/u2kb/
http://www.employerseervices.com
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://java.sun.com
https://www.google.com/favicon.ico
http://www.mygloballojistik.online/u2kb/www.mygloballojistik.online
http://www.thedivinerudraksha.comReferer:

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\mcwfy.exe
PE32 executable (console) Intel 80386, for MS Windows
#
Click to see the 71 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\333 (2).emf:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\333 (3).emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Temp\333 (3).emf:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\87F4.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\HI4NJ046K
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 4, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 4
#
C:\Users\user\AppData\Local\Temp\333 (2).emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Temp\README (2).txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\README (2).txt:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\README (3).txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\README (3).txt:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4596E15B-44F2-46EC-B7F0-548B7E499F6A}.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsl9C8E.tmp
data
#
C:\Users\user\AppData\Local\Temp\o0whqph.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
#
C:\Users\user\AppData\Local\Temp\ortnkgsjk.g
data
#
C:\Users\user\AppData\Local\Temp\sqlite3.def
ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8A733322-1ED0-47A6-9275-656451DAAFBA}.tmp
data
#
C:\Users\user\AppData\Local\Temp\~DFAEEDEE6F10B6AFDD.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_storei
data
#
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
data
#
C:\Users\user\AppData\Local\Temp\~DFF502807A3587CE89.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFF43C2C98E1EF8FBE.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DFF3DB96A6682A15C6.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DFCE59EB4D76CCBC89.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFCD0A74EBC3B8D0D3.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\ytljtt.f
data
#
C:\Users\user\AppData\Local\Temp\~DF4DCF212DAF54DAAA.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DF3759C9448D2ED5D7.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DF2613BCA6826298A5.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\~DF105CE6962F655752.TMP
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\yy.txt:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\yy.txt
ASCII text, with very long lines (599), with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\yy (2).txt:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\yy (2).txt
ASCII text, with very long lines (599), with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1A5CF463.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\86F058AC.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\76C63CD.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6E32DE56.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5607C5D.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 965x543, components 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5001E027.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F49BF6A.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3DC2DB08.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\29F24F69.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\93918E5F.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\sqlite-dll-win32-x86-3170000[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
#
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheRdr65536.dat
data
#
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
#
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000, file counter 15, database pages 15, cookie 0x5, schema 4, UTF-8, version-valid-for 15
#
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
#
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF41d356.TMP (copy)
ASCII text
#
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
#
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0001.tmp
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRO0000.doc
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRL0002.tmp (copy)
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD3923.tmp
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD3923.docx (copy)
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD2913.tmp
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0005.docx (copy)
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0004.tmp
Microsoft Word 2007+
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0003.docx (copy)
Microsoft Word 2007+
#
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\data_1
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RO0000.doc
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RD3923.docx
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RD0005.docx
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~$RD0003.docx
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DB46BBB0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BBE8D3E.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B336EBFC.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A58FA7F1.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#