top title background image
flash

MV FORTUNE TRADER.xlsx

Status: finished
Submission Time: 2021-02-16 07:01:19 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
Lokibot

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    353332
  • API (Web) ID:
    608605
  • Analysis Started:
    2021-02-16 07:01:21 +01:00
  • Analysis Finished:
    2021-02-16 07:07:44 +01:00
  • MD5:
    b9d2e20a706f5dccd80cbfca09685732
  • SHA1:
    b3d2b8eaa620398c83ff203c3c705d03dad55288
  • SHA256:
    132f5ce3c879259992351ae90865928ed508f5a76ab3f97ce6cd624ecccb551d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 14/83
malicious
Score: 17/47
malicious

IPs

IP Country Detection
103.141.138.123
Viet Nam
185.208.180.121
Iran (ISLAMIC Republic Of)
172.67.8.238
United States

Domains

Name IP Detection
becharnise.ir
185.208.180.121
stdyrusschinetwomast.dns.army
103.141.138.123
cutt.ly
172.67.8.238

URLs

Name Detection
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.trade/alien/fre.php
Click to see the 7 hidden entries
http://stdyrusschinetwomast.dns.army/receiprt/regasm.exe
http://alphastand.top/alien/fre.php
http://becharnise.ir/fa13/fre.php
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.day.com/dam/1.0
http://www.ibsensoftware.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\regasm[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 59134 bytes, 1 file
#
Click to see the 11 hidden entries
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4E4EC363.png
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83553F27.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87860A6A.png
PNG image data, 712 x 712, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A79A1ACD.png
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CD4CBEFC.png
PNG image data, 712 x 712, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\Cab75DC.tmp
Microsoft Cabinet archive data, 59134 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\Tar75DD.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\132SWST2.txt
ASCII text
#
C:\Users\user\Desktop\~$MV FORTUNE TRADER.xlsx
data
#