top title background image
flash

Overdue Invoices before 5-04-2020.xls

Status: finished
Submission Time: 2020-06-09 15:33:45 +02:00
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

Details

  • Analysis ID:
    236934
  • API (Web) ID:
    369903
  • Analysis Started:
    2020-06-09 15:33:47 +02:00
  • Analysis Finished:
    2020-06-09 15:46:01 +02:00
  • MD5:
    4a1b031536cb803ece7a69f6fdfcdb25
  • SHA1:
    0b860cf8fa06344a449fb4fdb7cad3a1d12c9df9
  • SHA256:
    410b37038436dfd621def737f102dce7ae9ac6a7c39323f9d0f4f48e72231334
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 8/80
malicious
Score: 10/48

IPs

IP Country Detection
185.244.30.216
Netherlands

Domains

Name IP Detection
socket-controller.ddns.net
185.244.30.216
unifedslashclub.com
47.91.104.141

URLs

Name Detection
http://unifedslashclub.com/igm/rrraw.msi
http://unifedslashclub.com/igm/rrraw.msi/qn
http://unifedslashclub.com/igm/rrraw.msi/qns

Dropped files

Name File Type Hashes Detection
C:\Program Files\WAN Service\wansv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmp927B.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\0F4F5130-48FA-4204-B1C4-585FBB81CD25\run.dat
Non-ISO extended-ASCII text, with no line terminators
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Temp\tmp9634.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\0F4F5130-48FA-4204-B1C4-585FBB81CD25\catalog.dat
data
#
C:\Users\user\AppData\Roaming\0F4F5130-48FA-4204-B1C4-585FBB81CD25\settings.bak
data
#
C:\Users\user\AppData\Roaming\0F4F5130-48FA-4204-B1C4-585FBB81CD25\settings.bin
data
#
C:\Users\user\AppData\Roaming\0F4F5130-48FA-4204-B1C4-585FBB81CD25\storage.dat
data
#
C:\Users\user\AppData\Roaming\0F4F5130-48FA-4204-B1C4-585FBB81CD25\task.dat
ASCII text, with no line terminators
#