top title background image
flash

ref_445.xls

Status: finished
Submission Time: 2020-07-06 20:10:28 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    243622
  • API (Web) ID:
    382944
  • Analysis Started:
    2020-07-06 20:10:29 +02:00
  • Analysis Finished:
    2020-07-06 20:29:52 +02:00
  • MD5:
    2ee423a6441edcb0ac466001f9dc0bc9
  • SHA1:
    55ed2b9f0a7a7cf254cd44f185861bf180c2257b
  • SHA256:
    13300e90690834b5f3ba27cd855a672c4a128f898fba5f743d12d837812850d7
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 96
System: unknown
malicious
Score: 88
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
104.24.109.77
United States

Domains

Name IP Detection
celltee.xyz
104.24.109.77

URLs

Name Detection
http://schema.org/WebPage

Dropped files

Name File Type Hashes Detection
C:\Users\Public\FrFR.vbs
ASCII text, with CRLF line terminators
#
C:\Users\Public\LFx4JdE0.html
HTML document, ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\73SQ3UPM\9C1J18XZ.htm
HTML document, ASCII text, with very long lines
#
Click to see the 10 hidden entries
C:\Users\user\AppData\Local\Temp\5FF20000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Mon Jul 6 17:11:22 2020, atime=Mon Jul 6 17:11:22 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ref_445.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Mon Jul 6 17:11:22 2020, atime=Mon Jul 6 17:11:22 2020, length=148992, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\97V7ADGV.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\AH7QBNYO.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\CZNJS24R.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\NR5IEABZ.txt
ASCII text
#
C:\Users\user\Desktop\40030000
Applesoft BASIC program data, first line number 16
#
C:\Users\Public\PK8apD.txt
ASCII text, with CRLF line terminators
#