top title background image
flash

RRZ4K9Zrov.xls

Status: finished
Submission Time: 2020-06-26 07:48:48 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    241643
  • API (Web) ID:
    379005
  • Analysis Started:
    2020-06-26 07:48:49 +02:00
  • Analysis Finished:
    2020-06-26 07:54:28 +02:00
  • MD5:
    203af65382e715cb95b87b375b2ccb66
  • SHA1:
    04d5fec5a7f3b16cfc2480454e424d3b37232826
  • SHA256:
    9c5e875ef324907bd9ff7b793c5cc6ac294d7606288a0d52bac55ccbf9172d2a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 6/79
malicious
Score: 6/48

IPs

IP Country Detection
104.31.73.137
United States
35.206.106.63
United States

Domains

Name IP Detection
estudiolacazezancarini.com
104.31.73.137
germdisruptor.com
35.206.106.63

URLs

Name Detection
http://schema.org/WebPage
https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer

Dropped files

Name File Type Hashes Detection
C:\Users\Public\QMO.vbs
ASCII text, with CRLF line terminators
#
C:\Users\Public\K8UjyiIr.html
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RRZ4K9Zrov.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:45 2020, mtime=Fri Jun 26 04:49:21 2020, atime=Fri Jun 26 04:49:21 2020, length=122880, window=hide
#
Click to see the 17 hidden entries
C:\Users\Public\JfryVD.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\BCF20000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Y5BDQ6LJ.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\I91NN32P.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\0VITWYRC.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\0642AUAZ.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Fri Jun 26 04:49:21 2020, atime=Fri Jun 26 04:49:21 2020, length=8192, window=hide
#
C:\Users\user\AppData\Local\Temp\TarA9E8.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabA9E7.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\CBF20000
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WBLEW8CS\wp-crunch[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TW7EG0IT\HJO3DFSQ.htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#