top title background image
flash

inf-78618.xls

Status: finished
Submission Time: 2020-06-30 15:49:52 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    242300
  • API (Web) ID:
    380319
  • Analysis Started:
    2020-06-30 15:52:00 +02:00
  • Analysis Finished:
    2020-06-30 15:59:51 +02:00
  • MD5:
    94219afcb99967bd4b3ca3cbe554c71a
  • SHA1:
    4cb511290d34a10a5f70b3d9230c7f8fd869dc76
  • SHA256:
    1cdbe5e2a1004c1b19335af79f3ccd38a55b6ee9e4f0ae0fe0b84ca9fccbb6c2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 9/60
malicious

IPs

IP Country Detection
35.186.173.231
United States

Domains

Name IP Detection
wireborg.com
35.186.173.231
procacardenla.ga
0.0.0.0
datalibacbi.ml
0.0.0.0
Click to see the 1 hidden entries
zmedia.shwetech.com
0.0.0.0

URLs

Name Detection
https://procacardenla.ga/wp-keys.php
https://datalibacbi.ml/wp-keys.php
https://wireborg.com/wp-keys.php
Click to see the 1 hidden entries
http://zmedia.shwetech.com/wp-keys.php

Dropped files

Name File Type Hashes Detection
C:\Users\Public\nD7820.html
ASCII text, with no line terminators
#
C:\Users\Public\vUjAY.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
Click to see the 13 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z3Q0UEQW\wp-keys[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD771B4D.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 914x514, frames 3
#
C:\Users\user\AppData\Local\Temp\Cab8C18.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\D1F20000
data
#
C:\Users\user\AppData\Local\Temp\Tar8C19.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Sun May 31 12:53:19 2020, atime=Sun May 31 12:53:19 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\inf-78618.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:41 2020, mtime=Sun May 31 12:53:19 2020, atime=Sun May 31 12:53:19 2020, length=198656, window=hide
#
C:\Users\user\Desktop\23F20000
Applesoft BASIC program data, first line number 16
#
C:\Users\Public\VYJw.txt
ASCII text, with CRLF line terminators
#