top title background image
flash

PQ.411.xls

Status: finished
Submission Time: 2020-06-30 17:08:26 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    242320
  • API (Web) ID:
    380359
  • Analysis Started:
    2020-06-30 17:08:27 +02:00
  • Analysis Finished:
    2020-06-30 17:19:51 +02:00
  • MD5:
    10dfe870c55418f760bb649a7b015b8c
  • SHA1:
    27988f3bc5c83e83912e43db709914e3399f97a8
  • SHA256:
    9d3fcc86eedbe152ee398bfc4ef95a9dd16e6448e07ae4cc65bc932631459d2c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 88
System: unknown
malicious
Score: 80
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
134.122.4.1
United States
103.212.121.67
India
45.40.152.13
United States
Click to see the 1 hidden entries
167.99.107.207
United States

Domains

Name IP Detection
designerremodeling.com
45.40.152.13
septatechnology.com
103.212.121.67
helpdallas.org
167.99.107.207
Click to see the 1 hidden entries
healsoul.thememove.com
134.122.4.1

Dropped files

Name File Type Hashes Detection
C:\Users\Public\Neu.vbs
ASCII text, with CRLF line terminators
#
C:\Users\Public\EaPtWQ.html
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\CabB02A.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
Click to see the 14 hidden entries
C:\Users\Public\FBI.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\A1130000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PQ.411.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Sun May 31 14:09:27 2020, atime=Sun May 31 14:09:27 2020, length=137728, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Sun May 31 14:09:27 2020, atime=Sun May 31 14:09:27 2020, length=8192, window=hide
#
C:\Users\user\AppData\Local\Temp\TarB035.tmp
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\59030000
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EMZSFHLB\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4P0F9XS0\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1OGOKHA0\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#