top title background image
flash

PO-FRE590164.xlsx

Status: finished
Submission Time: 2021-01-26 08:46:35 +01:00
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

  • NanoCore
  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    344209
  • API (Web) ID:
    590312
  • Analysis Started:
    2021-01-26 09:20:37 +01:00
  • Analysis Finished:
    2021-01-26 09:32:21 +01:00
  • MD5:
    c175f48a4862c49ec69263b5df33a71f
  • SHA1:
    e6c98cffb65b0ef3e59020b4f094e0c5123d7f5b
  • SHA256:
    42a85a33d440c195bbe8890b74fa396875a33fd6354a4b2c7ca6dfb9516c6e6e
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 25/71
malicious
Score: 12/46

IPs

IP Country Detection
198.23.207.63
United States

Domains

Name IP Detection
nop.myq-see.com
198.23.207.63

URLs

Name Detection
http://nop.myq-see.com/win/Vbb.exe
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Click to see the 2 hidden entries
http://www.day.com/dam/1.0
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

Dropped files

Name File Type Hashes Detection
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
data
#
C:\Users\user\AppData\Roaming\TrXHdHpWh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Desktop\~$PO-FRE590164.xlsx
data
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C03033E.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\82CE75F1.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F36B41B0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Temp\tmp1334.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#