top title background image
flash

PO 42.xlsx

Status: finished
Submission Time: 2020-06-15 12:39:13 +02:00
Malicious
Trojan
Spyware
Exploiter
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    238479
  • API (Web) ID:
    372903
  • Analysis Started:
    2020-06-15 12:39:14 +02:00
  • Analysis Finished:
    2020-06-15 12:52:32 +02:00
  • MD5:
    5fe94c36bc929fac9d50d758a429867c
  • SHA1:
    267ed31d0a629b51718feabaa20a833e9ad35bf1
  • SHA256:
    940b10e06bc2eaeb5ff43de188d0b49244ee732645913e78ea66181ae275a822
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 7/80
malicious

IPs

IP Country Detection
103.67.235.120
Philippines
216.170.114.41
United States

Domains

Name IP Detection
www.predkt.com
103.67.235.120

URLs

Name Detection
http://www.tromagy.com/msn/www.deltainformatictest.com
http://www.tromagy.com/msn/
http://www.eliteskateboard.com
Click to see the 77 hidden entries
http://www.deltainformatictest.com/msn/
http://www.hightownperformancecars.com/msn/
http://www.virginianaturegas.com/msn/www.hightownperformancecars.com
http://www.makrobet925.com/msn/www.eliteskateboard.com
http://www.eliteskateboard.comReferer:
http://www.kitchen-305.com/msn/
http://www.splh666.com
https://www.crazydomains.com/sitebeat/
http://www.virginianaturegas.com
http://www.eliteskateboard.com/msn/
http://wellformedweb.org/CommentAPI/
http://www.predkt.com/msn/www.thegolfcommunity.com
http://www.tromagy.comReferer:
http://predkt.com/assets/favicons/180x180.png
http://www.thegolfcommunity.comReferer:
http://www.nationalcloudregistry.info/msn/
http://www.viktoriaglagovska.siteReferer:
https://rest.siteplus.com/member-api-service
http://www.thegolfcommunity.com/msn/
https://cdn.ravenjs.com/3.17.0/raven.min.js
http://216.170.114.41/invoice_14141.doc
http://www.tutorsminds.com/msn/
http://www.minimenco.com
http://www.kitchen-305.com
http://www.kitchen-305.com/msn/www.viktoriaglagovska.site
http://www.hightownperformancecars.com
http://www.deltainformatictest.comReferer:
http://www.hightownperformancecars.com/msn/www.thewwdirect.com
http://www.minimenco.comReferer:
http://www.vytenjim.win/msn/
http://www.viktoriaglagovska.site
http://www.deltainformatictest.com
http://www.nationalcloudregistry.infoReferer:
http://www.kitchen-305.comReferer:
http://www.predkt.com/msn/
http://www.makrobet925.com
http://www.vytenjim.win/msn/www.splh666.com
http://www.tutorsminds.comReferer:
http://www.predkt.com
http://www.splh666.com/msn/www.nationalcloudregistry.info
http://www.virginianaturegas.comReferer:
http://www.thewwdirect.com
http://www.hightownperformancecars.comReferer:
https://rest.siteplus.com/blog-api/1.0
http://www.minimenco.com/msn/www.makrobet925.com
http://www.makrobet925.comReferer:
http://www.virginianaturegas.com/msn/
http://www.thewwdirect.comReferer:
http://www.minimenco.com/msn/
http://www.viktoriaglagovska.site/msn/
http://www.makrobet925.com/msn/
http://216.170.114.41/vbc.exe
http://www.thewwdirect.com/msn/www.kitchen-305.com
https://rest.siteplus.com/filestorage-api-service
https://rest.siteplus.com/insta-re-proxy
https://rest.siteplus.com/ecommerce-filestorage-service/1.0
http://www.thewwdirect.com/msn/
http://www.splh666.comReferer:
https://rest.siteplus.com/ecommerce-api-service
http://www.tutorsminds.com
http://216.170.114.41/
https://rest.siteplus.com/member-analytics-service
http://www.thegolfcommunity.com
http://www.%s.comPA
http://www.vytenjim.win
http://www.tutorsminds.com/msn/www.virginianaturegas.com
http://www.tromagy.com
http://www.splh666.com/msn/
http://www.vytenjim.winReferer:
http://www.predkt.comReferer:
https://rest.siteplus.com/image-api-service
http://www.nationalcloudregistry.info/msn/www.minimenco.com
http://www.nationalcloudregistry.info
http://www.eliteskateboard.com/msn/www.tutorsminds.com
http://www.thegolfcommunity.com/msn/www.tromagy.com
http://www.deltainformatictest.com/msn/www.vytenjim.win
https://rest.siteplus.com/geoip-service

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\ProPlayer\Player.exe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9B0IC9OK\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8AA2625F-9CEF-40F3-B01F-86E94D88CCC1}.tmp
data
#
C:\Users\user\Desktop\~$PO 42.xlsx
data
#
C:\Users\user\Desktop\26040000:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\26040000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\invoice_14141.doc.url
MS Windows 95 Internet shortcut text (URL=<http://216.170.114.41/invoice_14141.doc>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\216.170.114.41.url
MS Windows 95 Internet shortcut text (URL=<http://216.170.114.41/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\{A1A8A1B3-B4E1-4DA9-87CE-7C201E0EF3F0}
data
#
C:\Users\user\AppData\Local\Temp\{52850F52-A41C-419E-A6C5-CEDBCE7EB510}
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{760B9E8B-C21C-4999-AACD-66331DD9BC14}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7BDBE8B5.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 80x80, segment length 16, baseline, precision 8, 660x930, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A2D56B0.doc
Rich Text Format data, unknown version
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1DB7F284.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WPCTVZNC\invoice_14141[1].doc
Rich Text Format data, unknown version
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A67F627F-510A-4EF7-8314-96D5442088D8}.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
#
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{572855B3-77EF-4AE3-A6B3-CEFA8A4DEED7}.FSD
data
#