top title background image
flash

invoice_661434949_67552437.xlsm

Status: finished
Submission Time: 2021-04-11 00:10:55 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    385000
  • API (Web) ID:
    672106
  • Analysis Started:
    2021-04-11 00:10:56 +02:00
  • Analysis Finished:
    2021-04-11 00:21:01 +02:00
  • MD5:
    64f33ccbc7976306417b2b2528daa5fe
  • SHA1:
    d71433580e83ab455556a88c483d1887e9641be6
  • SHA256:
    03a7d4fc0e9d75fb98ca2aba43729acb93803959b1421d8878548643c12e3d73
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 80
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 80
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

Third Party Analysis Engines

malicious
Score: 10/85
malicious

IPs

IP Country Detection
104.21.43.238
United States

Domains

Name IP Detection
indianoci.co.uk
104.21.43.238

URLs

Name Detection
http://indianoci.co.uk/ufriends/support.php
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://www.windows.com/pctv.
Click to see the 7 hidden entries
http://investor.msn.com
http://www.msnbc.com/news/ticker.txt
http://www.icra.org/vocabulary/.
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.hotmail.com/oe
http://investor.msn.com/
https://www.cloudflare.com/5xx-error-landing

Dropped files

Name File Type Hashes Detection
C:\Users\user\Desktop\~$invoice_661434949_67552437.xlsm
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\support[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\28466324.png
PNG image data, 756 x 756, 8-bit/color RGB, non-interlaced
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Temp\72CE0000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Apr 11 06:11:35 2021, atime=Sun Apr 11 06:11:35 2021, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\invoice_661434949_67552437.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Sun Apr 11 06:11:35 2021, atime=Sun Apr 11 06:11:35 2021, length=184279, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Y5D8BEZV.txt
ASCII text
#
C:\Users\user\Desktop\03CE0000
data
#
C:\Users\user\GVer.iks
HTML document, ASCII text
#