top title background image
flash

F3cifcsikm.xls

Status: finished
Submission Time: 2020-07-03 07:23:46 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    243133
  • API (Web) ID:
    381972
  • Analysis Started:
    2020-07-03 07:23:47 +02:00
  • Analysis Finished:
    2020-07-03 07:37:28 +02:00
  • MD5:
    f5d015146312f6bbc25af0d44d8eb847
  • SHA1:
    04e17bf6e9eea04af22bbcf9098719c9c68a6fb3
  • SHA256:
    d0fa38bf8cb927bb623664a275961c3b2427d26c88b64f804a0397651069f769
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 88
System: unknown
malicious
Score: 80
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
45.252.248.11
Viet Nam

Domains

Name IP Detection
celadon-emerald.mockienan.com
45.252.248.11

URLs

Name Detection
http://schema.org/WebPage

Dropped files

Name File Type Hashes Detection
C:\Users\Public\GJlZOJ.vbs
ASCII text, with CRLF line terminators
#
C:\Users\Public\E1BdJ5.html
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\F3cifcsikm.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:44 2020, mtime=Fri Jul 3 04:24:23 2020, atime=Fri Jul 3 04:24:23 2020, length=181248, window=hide
#
Click to see the 15 hidden entries
C:\Users\Public\bgEG0GnL.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\54030000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\UEN1NHLY.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\SHS5UNQ7.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\6NPFY9DX.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58367 bytes, 1 file
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Fri Jul 3 04:24:23 2020, atime=Fri Jul 3 04:24:23 2020, length=8192, window=hide
#
C:\Users\user\AppData\Local\Temp\TarC20B.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabC20A.tmp
Microsoft Cabinet archive data, 58367 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\13030000
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02U8NNLA\0ZYKVZ34.htm
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#