top title background image
flash

receipt.8934.xls

Status: finished
Submission Time: 2020-06-26 12:56:45 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    241683
  • API (Web) ID:
    379086
  • Analysis Started:
    2020-06-26 12:56:46 +02:00
  • Analysis Finished:
    2020-06-26 13:03:21 +02:00
  • MD5:
    ac2f3e9393dd28fccf9f92a0b75ca8cc
  • SHA1:
    b12f952e17fdfba16536819d264acfe735362b0c
  • SHA256:
    c53a6708059dd157fb652a7ea4a8efe5aa8dee597f3cd404c2957ed13af3eb41
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 6/79

IPs

IP Country Detection
172.67.191.78
United States
35.206.106.63
United States

Domains

Name IP Detection
estudiolacazezancarini.com
172.67.191.78
germdisruptor.com
35.206.106.63

URLs

Name Detection
https://germdisruptor.com/wp-crunch.php
https://estudiolacazezancarini.com/wp-crunch.php
https://indoeducation.com/wp-crunch.php
Click to see the 3 hidden entries
https://gurukal.in/wp-crunch.php
http://schema.org/WebPage
https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer

Dropped files

Name File Type Hashes Detection
C:\Users\Public\WSG88SgE.html
HTML document, ASCII text, with very long lines
#
C:\Users\Public\BKnrTSD0.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
Click to see the 17 hidden entries
C:\Users\Public\EJ3K2.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\C3430000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\UD2J1TCL.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\MAJNHOXL.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\D9GEKTEA.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\2VBT838H.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\receipt.8934.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:45 2020, mtime=Fri Jun 26 09:57:40 2020, atime=Fri Jun 26 09:57:40 2020, length=119808, window=hide
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Fri Jun 26 09:57:40 2020, atime=Fri Jun 26 09:57:40 2020, length=12288, window=hide
#
C:\Users\user\AppData\Local\Temp\TarF3EB.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabF3EA.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\72430000
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7RTX9F1H\wp-crunch[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\44E5IGF2\4IVOTBEM.htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#