top title background image
flash

documents-1660683173.xlsm

Status: finished
Submission Time: 2021-04-06 18:00:11 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

  • xlsm

Details

  • Analysis ID:
    382825
  • API (Web) ID:
    667789
  • Analysis Started:
    2021-04-06 18:00:12 +02:00
  • Analysis Finished:
    2021-04-06 18:06:32 +02:00
  • MD5:
    cf8cbce9bb25d9081b2da19c6f1c1c70
  • SHA1:
    e014ec63d11a673fd6a655cb20055a723eba2fe5
  • SHA256:
    9a59e089d7b593c0b0651ad43945f19c10c67719b7e01814f4007f253db6e286
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

IPs

IP Country Detection
111.118.215.222
India
103.211.216.55
Seychelles
192.185.56.250
United States
Click to see the 1 hidden entries
8.211.4.209
Singapore

Domains

Name IP Detection
bodylanguage.santulan.co.in
111.118.215.222
kautilyaclasses.com
192.185.56.250
corwin-tommie06f.ru.com
8.211.4.209
Click to see the 2 hidden entries
katelynn9506a.ru.com
8.211.4.209
kullumanalitours.com
103.211.216.55

URLs

Name Detection
http://bodylanguage.santulan.co.in/ds/index.html
http://corwin-tommie06f.ru.com/index.html
http://kautilyaclasses.com/ds/index.html
Click to see the 3 hidden entries
http://katelynn9506a.ru.com/index.html
http://servername/isapibackend.dll
http://kullumanalitours.com/ds/index.html

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htm
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Desktop\~$documents-1660683173.xlsm
data
#
C:\Users\user\oeiwkd4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3A7B2AED.png
PNG image data, 364 x 139, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6448C247.png
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0058FDE.png
PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E09279C.png
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Temp\36CE0000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Apr 7 00:00:36 2021, atime=Wed Apr 7 00:00:36 2021, length=12288, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\documents-1660683173.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Wed Apr 7 00:00:36 2021, atime=Wed Apr 7 00:00:36 2021, length=96845, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\07CE0000
data
#