top title background image
flash

Invoice Copies.xls

Status: finished
Submission Time: 2020-04-30 23:58:36 +02:00
Malicious
Ransomware
Trojan
Spyware
Exploiter
Evader
Remcos

Comments

Tags

Details

  • Analysis ID:
    226765
  • API (Web) ID:
    350035
  • Analysis Started:
    2020-04-30 23:58:39 +02:00
  • Analysis Finished:
    2020-05-01 00:06:01 +02:00
  • MD5:
    3ffee1c2f7c512b6f34de2aff067922b
  • SHA1:
    e7e6dc9579d15885d47146470760abe30d644854
  • SHA256:
    9100a41df26bee35c7b79c48eac037bf7c277ce6a5834b03025cd9efa3261c75
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 12/57

IPs

IP Country Detection
185.140.53.30
Sweden
185.242.105.116
Latvia

Domains

Name IP Detection
servr.banif1abused.xyz
185.140.53.30

URLs

Name Detection
http://185.242.105.116/utnl/Attack.jpg
http://185.242.105.116/utnl/e-remit.vbs

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\audiodialog.vbs
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\Desktop\~$Invoice Copies.xls
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P7KPGJ6U\Attack[1].jpg
ASCII text, with very long lines, with no line terminators
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6950274E.jpg
PNG image data, 1243 x 610, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\audiodialog.vbs
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4BN1FDK59AO77MBNAJI7.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BT5RB8OQ6PZ41IMDZOBD.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DN1QKZ84TVL7OGNY5AOD.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SGZ30ARGGT08J3R5BBYR.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SXB5WS5ZJ39SNOQUWLT1.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U0EZYYNM10Z6MXJ83PJN.temp
data
#
C:\Users\user\AppData\Roaming\rem\logs.dat
ASCII text, with CRLF line terminators
#