top title background image
flash

pay4999.xls

Status: finished
Submission Time: 2020-06-30 17:36:49 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    242332
  • API (Web) ID:
    380383
  • Analysis Started:
    2020-06-30 17:36:50 +02:00
  • Analysis Finished:
    2020-06-30 17:52:11 +02:00
  • MD5:
    5934615fa45f1a7823adcd8caf92f495
  • SHA1:
    693ab2b6783e77528792743210a5999ed38864e8
  • SHA256:
    cc9e611a324ac6d7da1ae84616d7f41d12f0026aa7fbc53daac0f92c4c8394c9
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 88
System: unknown
malicious
Score: 80
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
134.122.4.1
United States
103.212.121.67
India
45.40.152.13
United States
Click to see the 1 hidden entries
167.99.107.207
United States

Domains

Name IP Detection
designerremodeling.com
45.40.152.13
septatechnology.com
103.212.121.67
helpdallas.org
167.99.107.207
Click to see the 1 hidden entries
healsoul.thememove.com
134.122.4.1

Dropped files

Name File Type Hashes Detection
C:\Users\Public\tfpm.vbs
ASCII text, with CRLF line terminators
#
C:\Users\Public\S7BJaQa.html
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\CabE6EE.tmp
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
Click to see the 14 hidden entries
C:\Users\Public\bYdo.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\82430000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\pay4999.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:50 2020, mtime=Sun May 31 14:37:39 2020, atime=Sun May 31 14:37:39 2020, length=136192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Sun May 31 14:37:39 2020, atime=Sun May 31 14:37:39 2020, length=12288, window=hide
#
C:\Users\user\AppData\Local\Temp\TarE6EF.tmp
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58383 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\81430000
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q9TVVS96\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPQHCSV4\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FCHMIQQ4\wp-crunch[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#