top title background image
flash

Unpaid Invoice.9342.xls

Status: finished
Submission Time: 2020-02-14 16:14:14 +01:00
Malicious
Exploiter

Comments

Tags

Details

  • Analysis ID:
    208474
  • API (Web) ID:
    314314
  • Analysis Started:
    2020-02-14 16:14:16 +01:00
  • Analysis Finished:
    2020-02-14 16:26:29 +01:00
  • MD5:
    dab1b5581adbd9acec31da85f46271b7
  • SHA1:
    d54a1d374eeb701b1f22a526b1e2a2bc0efec677
  • SHA256:
    c491cf960baded54d16ca2a415f188a0ce53bf300c13b7c7b89458d801b2f27a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 52
System: unknown
malicious
Score: 52
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
47.254.171.5
United States

Domains

Name IP Detection
doolised.xyz
47.254.171.5

URLs

Name Detection
https://doolised.xyz/DSBVhsdv78f

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4608C369-85AE-4C49-98B5-9573BF4BD356}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{C137327A-CF57-4B72-9BAF-C1E2DE36D91F}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PSORVPC2\DSBVhsdv78f[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Temp\{11EB1E52-2FD6-4C31-AC65-58AE0F5642D0}
data
#
C:\Users\user\AppData\Local\Temp\{3636B0CC-A61C-4DED-A75C-715E0FEBE268}
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\QTOZA3X7.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\T5OX72AZ.txt
ASCII text
#