top title background image
flash

req_data-4423743.xls

Status: finished
Submission Time: 2020-06-29 16:17:36 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    242029
  • API (Web) ID:
    379781
  • Analysis Started:
    2020-06-29 16:18:26 +02:00
  • Analysis Finished:
    2020-06-29 16:34:48 +02:00
  • MD5:
    200585edec68e46cb2d9e5d3f6753102
  • SHA1:
    09ccb6f3f89959f9882b3a5e865b6e5078b813e2
  • SHA256:
    7e6642749926d6eed040acfed6db2cdb50065623d01cb53ac7b33b893a2f463f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 96
System: unknown
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
104.27.167.217
United States
198.54.117.197
United States
198.54.117.198
United States
Click to see the 2 hidden entries
198.54.117.199
United States
198.54.117.200
United States

Domains

Name IP Detection
architecture.pw
104.27.167.217
b9bcforum.info
198.54.117.197

URLs

Name Detection
https://architecture.pw/wp-data.php
https://b9bcforum.info/wp-data.php
https://github.com/v-ralewa.png?size=32
Click to see the 9 hidden entries
https://github.com/cynlau2020.png?size=32
http://schema.org/BreadcrumbList
https://github.com/MicrosoftDocs/OfficeDocs-OfficeUpdates/issues
http://schema.org/Organization
https://aka.ms/sitefeedback
https://github.com/MicrosoftDocs/OfficeDocs-OfficeUpdates-pr/blob/live/OfficeUpdates/office-MSI-non-
https://support.office.com/article/2ab296f3-7f03-43a2-8e50-46de917611c5
https://github.com/MicrosoftDocs/OfficeDocs-OfficeUpdates-pr/blob/ea2f2ee497d74222046b66bd2655f085da
https://github.com/TimDavenport.png?size=32

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\798M9G3G\office-msi-non-security-updates[1].htm
HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
#
C:\Users\user\AppData\Local\Temp\F0230000
data
#
C:\Users\user\AppData\Local\Temp\REG998E.tmp
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Mon Jun 29 13:19:33 2020, atime=Mon Jun 29 13:19:33 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\req_data-4423743.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Mon Jun 29 13:19:33 2020, atime=Mon Jun 29 13:19:33 2020, length=256512, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\G44UQ2WK.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\XEWT8WKI.txt
ASCII text
#
C:\Users\user\Desktop\F9230000
Applesoft BASIC program data, first line number 16
#
C:\Users\Public\XGxPKvOK.html
HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
#
C:\Users\Public\jXh78Q.reg
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#