top title background image
flash

1_Total New Invoices-Thursday January 21_2021.xlsm

Status: finished
Submission Time: 2021-01-21 16:02:08 +01:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    342716
  • API (Web) ID:
    587378
  • Analysis Started:
    2021-01-21 16:02:14 +01:00
  • Analysis Finished:
    2021-01-21 16:13:18 +01:00
  • MD5:
    a52a88ae97dd408d38d98c9aa7f81142
  • SHA1:
    234b65bc42a077c98c61a8eb4870d41e0039013e
  • SHA256:
    c7e6848fd63681514d6dad3032e358a257dde3aa1cd3b349306283356bca2608
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 18/66

IPs

IP Country Detection
69.164.207.140
United States
211.110.44.63
Korea Republic of
194.225.58.214
Iran (ISLAMIC Republic Of)
Click to see the 6 hidden entries
198.57.200.100
United States
192.185.224.50
United States
191.252.144.65
Brazil
103.83.81.27
India
198.136.54.91
United States
64.37.52.172
United States

Domains

Name IP Detection
creditoenusa.com
192.185.224.50
stellarum.com.br
191.252.144.65
qsf.surfescape.net
64.37.52.172
Click to see the 2 hidden entries
reliablelifts.co.in
103.83.81.27
shopandmartonline.com
198.136.54.91

URLs

Name Detection
http://ocsp.entrust.net0D
https://198.57.200.100/
https://194.225.58.214/P
Click to see the 30 hidden entries
https://194.225.58.214/Y
http://crl.co
https://211.110.44.63/
https://194.225.58.214/X
https://198.57.200.100:3786/hy
https://69.164.207.140/M
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
https://198.57.200.100/_
https://secure.comodo.com/CPS0
https://194.225.58.214/C
http://servername/isapibackend.dll
http://crl.entrust.net/2048ca.crl0
https://69.164.207.140:3388/JE
https://198.57.200.100:3786/&
https://211.110.44.63:5353/
https://198.57.200.100:3786/
https://69.164.207.140:3388/
https://198.57.200.100:3786/XE
http://stellarum.com.br/hknmwj.zip
http://www.diginotar.nl/cps/pkioverheid0
https://69.164.207.140:3388/hy
https://69.164.207.140:3388/7
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
https://69.164.207.140/T
https://211.110.44.63:5353/8
https://194.225.58.214/
http://ocsp.entrust.net03
http://crl.entrust.net/server1.crl0
https://69.164.207.140:3388/C
https://69.164.207.140/

Dropped files

Name File Type Hashes Detection
C:\Users\user\Desktop\~$1_Total New Invoices-Thursday January 21_2021.xlsm
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\gjeicn6u9[1].rar
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\or3peb[1].rar
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\hknmwj[1].zip
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\clh6qq[1].zip
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\l3v7tq4[1].rar
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\sxzjqf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nnmumzom.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\kxwni.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\561F0000
data
#
C:\Users\user\Desktop\863F0000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Thu Jan 21 23:03:04 2021, atime=Thu Jan 21 23:03:04 2021, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\1_Total New Invoices-Thursday January 21_2021.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Thu Jan 21 23:03:04 2021, atime=Thu Jan 21 23:03:08 2021, length=51781, window=hide
#
C:\Users\user\AppData\Local\Temp\Tar2A1.tmp
data
#
C:\Users\user\AppData\Local\Temp\Excel8.0\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\Cab290.tmp
Microsoft Cabinet archive data, 58936 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58936 bytes, 1 file
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD638D48.png
PNG image data, 247 x 76, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B460DCA9.png
PNG image data, 200 x 254, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A64C1FA3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#