top title background image
flash

SMBS PO 30 quotation.xls

Status: finished
Submission Time: 2020-11-17 16:54:42 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
Hidden Macro 4.0 AgentTesla

Comments

Tags

Details

  • Analysis ID:
    318898
  • API (Web) ID:
    539596
  • Analysis Started:
    2020-11-17 16:54:43 +01:00
  • Analysis Finished:
    2020-11-17 17:05:24 +01:00
  • MD5:
    ae3bf0939a390d7c38a765a23690f54d
  • SHA1:
    27381985e1da4c9faeb994085b34e199da62d3fb
  • SHA256:
    9592dc8230acdc35ba7994a1e0ac1c9cdde915195501cf8ebf89ce3d3b7b61e6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

IPs

IP Country Detection
35.180.137.10
United States
54.243.161.145
United States
104.20.138.65
United States
Click to see the 2 hidden entries
176.123.0.55
Moldova Republic of
217.182.137.43
France

Domains

Name IP Detection
plik.root.gg
0.0.0.0
tinyurl.com
104.20.138.65
elb097307-934924932.us-east-1.elb.amazonaws.com
54.243.161.145
Click to see the 3 hidden entries
ns3071372.ip-217-182-137.eu
217.182.137.43
drereweserdet.xyz
176.123.0.55
api.ipify.org
0.0.0.0

URLs

Name Detection
http://www.piriform.com/ccleaner
https://tinyurl.com/y44j7jgj
http://www.%s.comPA
Click to see the 7 hidden entries
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://www.piriform.com/ccleanerhttp://www.piriform.com/cclea
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.piriform.com/ccleanerhttp:
http://35.180.137.10/bat/scriptxls_5406f270-5350-45fb-847b-92c14913f6bc_snowj1917.bat
http://drereweserdet.xyz//inc/c4a51681a37f03.php

Dropped files

Name File Type Hashes Detection
C:\Users\user\Documents\pd.bat
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\iu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\212LZ89UWZYBGOW4VVYV.temp
data
#
Click to see the 18 hidden entries
C:\Users\user\Desktop\FCDE0000
Applesoft BASIC program data, first line number 16
#
C:\Users\user\AppData\Roaming\plmqt1tb.ig0\Firefox\Profiles\7xwghk55.default\cookies.sqlite
SQLite 3.x database, user version 7, last written using SQLite version 3017000
#
C:\Users\user\AppData\Roaming\plmqt1tb.ig0\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XFEJEYZ63EDOL2YAZXOJ.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PKZIGYRKQ1A569NQDOKP.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KGMU2FZ2EBRK5ZRRWQG4.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JU81MGYA158G189KONL5.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HX6H5EFO2X01NVTS6OY0.temp
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58936 bytes, 1 file
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SMBS PO 30 quotation.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Tue Nov 17 23:55:41 2020, atime=Tue Nov 17 23:55:41 2020, length=76800, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Tue Nov 17 23:55:41 2020, atime=Tue Nov 17 23:55:41 2020, length=8192, window=hide
#
C:\Users\user\AppData\Local\Temp\TarA45C.tmp
data
#
C:\Users\user\AppData\Local\Temp\CabA45B.tmp
Microsoft Cabinet archive data, 58936 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\4CDE0000
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#