top title background image
flash

Solutions-billing-2020-25706.xls

Status: finished
Submission Time: 2020-07-03 19:27:42 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    243303
  • API (Web) ID:
    382307
  • Analysis Started:
    2020-07-03 19:27:42 +02:00
  • Analysis Finished:
    2020-07-03 19:38:28 +02:00
  • MD5:
    32500c2caaee2b4034e451e0582ce4f0
  • SHA1:
    480320de15d1901acd282c355eabcc2e2cb438d8
  • SHA256:
    83d2568c64f2d7c090ea84e0a4585fdb9e57e28688ef264dae3cc3987c7f3d60
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 56
System: unknown
malicious
Score: 52
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
194.5.249.101
Romania

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\A2F20000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Fri Jul 3 16:28:19 2020, atime=Fri Jul 3 16:28:19 2020, length=16384, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Solutions-billing-2020-25706.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Fri Jul 3 16:28:19 2020, atime=Fri Jul 3 16:28:19 2020, length=87040, window=hide
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\93F20000
Applesoft BASIC program data, first line number 16
#