top title background image
flash

documents-2112491607.xlsm

Status: finished
Submission Time: 2021-04-07 09:14:08 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    383123
  • API (Web) ID:
    668386
  • Analysis Started:
    2021-04-07 09:14:09 +02:00
  • Analysis Finished:
    2021-04-07 09:20:24 +02:00
  • MD5:
    cada6b07929cd03002206f65f547f383
  • SHA1:
    e4b72830f1f320d711f60f540a8fe9340597238e
  • SHA256:
    b9b231cad810dedef1d27772b12d04e8aa4e9ef0f461d5a0fbf80d3c38918860
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious

IPs

IP Country Detection
111.118.215.222
India
103.211.216.55
Seychelles
192.185.56.250
United States
Click to see the 1 hidden entries
8.211.4.209
Singapore

Domains

Name IP Detection
bodylanguage.santulan.co.in
111.118.215.222
kautilyaclasses.com
192.185.56.250
corwin-tommie06f.ru.com
8.211.4.209
Click to see the 2 hidden entries
katelynn9506a.ru.com
8.211.4.209
kullumanalitours.com
103.211.216.55

URLs

Name Detection
http://kautilyaclasses.com/ds/index.html
http://bodylanguage.santulan.co.in/ds/index.html
http://kullumanalitours.com/ds/index.html
Click to see the 3 hidden entries
http://corwin-tommie06f.ru.com/index.html
http://katelynn9506a.ru.com/index.html
http://servername/isapibackend.dll

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htm
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Desktop\~$documents-2112491607.xlsm
data
#
C:\Users\user\oeiwkd4.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\45BFE498.png
PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4647BF2F.png
PNG image data, 364 x 139, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52AB2BB9.png
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AB2DEE66.png
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Temp\FBCE0000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Apr 7 15:14:37 2021, atime=Wed Apr 7 15:14:37 2021, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\documents-2112491607.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Apr 7 15:14:37 2021, atime=Wed Apr 7 15:14:37 2021, length=96847, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\ECCE0000
data
#