top title background image
flash

https://onedrive.live.com/download?cid=3447601AB357F8C1&resid=3447601AB357F8C1%21113&authkey=APBubBSchh7xEpo

Status: finished
Submission Time: 2020-04-27 16:30:32 +02:00
Malicious
Spyware
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    225598
  • API (Web) ID:
    347727
  • Analysis Started:
    2020-04-27 16:30:32 +02:00
  • Analysis Finished:
    2020-04-27 16:36:09 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 28/72
malicious
Score: 20/48

IPs

IP Country Detection
103.197.25.46
Hong Kong
154.85.184.57
Seychelles

Domains

Name IP Detection
www.dangchelan.com
103.197.25.46
www.dealspiper.com
154.85.184.57
www.crainidealwellness.com
0.0.0.0
Click to see the 3 hidden entries
www.valoresdaserra.com
0.0.0.0
onedrive.live.com
0.0.0.0
gemihq.dm.files.1drv.com
0.0.0.0

URLs

Name Detection
http://www.dealspiper.com/jh8/?FB=GrD0f&b4n8y=Xibe6pgUDFnjBMPll5i5Z3A4BeCP4PPOtOBanROLhktMABG+y4XBLsbi2mGFug7mx+8R
http://www.dealspiper.com/jh8/
http://www.dangchelan.com/jh8/?b4n8y=VX8P68WEHAq6tLLijdRoafFf7hWQqC2wXmINk69EIOzGZL0CgbaAV1it+uSyYclK2qrX&FB=GrD0f
Click to see the 10 hidden entries
http://www.msn.com/de-ch/?ocid=iehp
http://ns.microsoft
http://www.msn.com/de-ch/
https://www.msn.com/content/images/icons/Favicon_EdgeStart.ico
http://www.%s.com
http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/
https://gemihq.dm.files.1drv.com/y4mtf0iBMjW4AqPxlsG5R09UA2Sv7gGrULcn39ef3NlGT0SjM_ogtGyu9cLoFCaUVqw
https://www.msn.com/spartan/ientp
http://ns.adob
http://www.msn.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\23OP2RPA\23Ologrv.ini
data
#
C:\Users\user\AppData\Roaming\23OP2RPA\23Ologri.ini
data
#
C:\Users\user\AppData\Roaming\23OP2RPA\23Ologrf.ini
data
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Local\Temp\DB1
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Local\Temp\G7nl84b3\zx4pbev1pyv_h.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ysx3qeyd.sxv\SWIFTCOPY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\b1jvb3vv.dvq\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
MS Windows shortcut, Item id list present, Points to a file or directory, Read-Only, Directory, ctime=Wed Apr 11 22:38:20 2018, mtime=Mon Apr 27 13:33:09 2020, atime=Mon Apr 27 13:33:09 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-58933367-3072710494-194312298-1003\96bdc98f969deb1d88501139d4850d83_59407d34-c8c5-44df-a766-ba8a11cb1cb0
data
#
C:\Users\user\AppData\Roaming\23OP2RPA\23Ologrg.ini
data
#
C:\Users\user\AppData\Roaming\23OP2RPA\23Ologim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Local\Temp\~DFE47387963575FBA1.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB169AA6D356022FB.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\SWIFTCOPY[1].zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\SWIFTCOPY.zip:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\SWIFTCOPY.zip.pz4dug1.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\SWIFTCOPY.zip.pz4dug1.partial
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B7FD0DBC-8893-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B7FD0DBA-8893-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#