top title background image
flash

CjJh9zbC8s.xls

Status: finished
Submission Time: 2020-06-26 07:32:06 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    241639
  • API (Web) ID:
    378999
  • Analysis Started:
    2020-06-26 07:32:07 +02:00
  • Analysis Finished:
    2020-06-26 07:38:30 +02:00
  • MD5:
    1cd0ddd8cbadd21fc894509770040a80
  • SHA1:
    af6679dbf81218711e057ac778945871dc7195f7
  • SHA256:
    9de3cfb4e7c37e4af88045e723ecb1c69020dac5d8c073b73349ea7011731b23
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 6/79

IPs

IP Country Detection
35.206.106.63
United States
104.31.72.137
United States

Domains

Name IP Detection
estudiolacazezancarini.com
104.31.72.137
germdisruptor.com
35.206.106.63

URLs

Name Detection
http://schema.org/WebPage
https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer

Dropped files

Name File Type Hashes Detection
C:\Users\Public\Mhx1e8o.vbs
ASCII text, with CRLF line terminators
#
C:\Users\Public\HHxLn.html
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Fri Jun 26 04:33:21 2020, atime=Fri Jun 26 04:33:21 2020, length=16384, window=hide
#
Click to see the 17 hidden entries
C:\Users\Public\GM0l3I.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\9AF20000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\K752O1G4.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GAQ2204X.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\G32Z0LT6.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\2VERXB46.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\CjJh9zbC8s.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:44 2020, mtime=Fri Jun 26 04:33:21 2020, atime=Fri Jun 26 04:33:21 2020, length=115712, window=hide
#
C:\Users\user\AppData\Local\Temp\TarAF9E.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabAF9D.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\C9F20000
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FXLBHUIK\9GPFHSCG.htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0YNLBI8J\wp-crunch[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#