top title background image
flash

form2020-05-21_3267270.xls

Status: finished
Submission Time: 2020-05-24 09:39:48 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    232634
  • API (Web) ID:
    361509
  • Analysis Started:
    2020-05-24 09:39:48 +02:00
  • Analysis Finished:
    2020-05-24 09:50:10 +02:00
  • MD5:
    227e575e92309f849a0162e1fde49b71
  • SHA1:
    a31340faf1e4bc8cc92faec1faec90af887ffa81
  • SHA256:
    398642b9313183110dceb089746df34adbb9c5e130025816035753df4ee2ccdf
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 96
System: unknown
malicious
Score: 84
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

Third Party Analysis Engines

malicious
Score: 9/80

IPs

IP Country Detection
60.205.32.170
China
182.92.210.250
China

Domains

Name IP Detection
xm-yihao.com
182.92.210.250
lvsenling.net
60.205.32.170

URLs

Name Detection
http://xm-yihao.com/wp-content/uploads/2020/05/wp-front.php
http://lvsenling.net/wp-content/uploads/2020/05/wp-front.php
https://github.com/v-ralewa.png?size=32
Click to see the 9 hidden entries
https://github.com/MicrosoftDocs/OfficeDocs-OfficeUpdates-pr/blob/38fdc6f1bcec918f4106a915e05a4397e1
https://github.com/cynlau2020.png?size=32
http://schema.org/BreadcrumbList
https://github.com/MicrosoftDocs/OfficeDocs-OfficeUpdates/issues
http://schema.org/Organization
https://aka.ms/sitefeedback
https://github.com/MicrosoftDocs/OfficeDocs-OfficeUpdates-pr/blob/live/OfficeUpdates/office-MSI-non-
https://support.office.com/article/2ab296f3-7f03-43a2-8e50-46de917611c5
https://github.com/TimDavenport.png?size=32

Dropped files

Name File Type Hashes Detection
C:\Users\user\Desktop\~$form2020-05-21_3267270.xls
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X5UC8GFU\office-msi-non-security-updates[1].htm
HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
#
C:\Users\user\AppData\Local\Temp\23E30000
data
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Temp\REGBBC9.tmp
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Sun May 24 06:41:21 2020, atime=Sun May 24 06:41:21 2020, length=16384, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\form2020-05-21_3267270.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Sun May 24 06:41:21 2020, atime=Sun May 24 06:41:21 2020, length=132987, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\C3E30000
data
#
C:\Users\Public\PzDDnNj.html
HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
#
C:\Users\Public\qbTGIn.reg
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#