top title background image
flash

Original title deed.xlsx

Status: finished
Submission Time: 2021-05-03 10:38:26 +02:00
Malicious
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

  • NanoCore
  • RAT
  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    402636
  • API (Web) ID:
    707439
  • Analysis Started:
    2021-05-03 10:41:17 +02:00
  • Analysis Finished:
    2021-05-03 10:51:54 +02:00
  • MD5:
    97ffd7670cb87a5e565a82394ec28d77
  • SHA1:
    138d3a2105ff5cf1b8d55a9a25b1d8f34b07c121
  • SHA256:
    c54436c4152096f4cc05b88c7c9f76f30dea38d4569ef5303a527bc79f22560b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 12/67
malicious
Score: 8/47

IPs

IP Country Detection
79.134.225.26
Switzerland
172.245.45.28
United States

Domains

Name IP Detection
myhostisstillgood11.zapto.org
172.245.45.28

URLs

Name Detection
79.134.225.26
nassiru1166main.ddns.net
http://myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exe
Click to see the 6 hidden entries
http://www.%s.comPA
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.day.com/dam/1.0
https://github.com/unguest
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
https://github.com/unguest9WinForms_RecursiveFormCreate5WinForms_SeeInnerExceptionGProperty

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
data
#
C:\Users\user\Desktop\~$Original title deed.xlsx
data
#
Click to see the 6 hidden entries
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A830D3DD.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AF79D03A.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C7D0AEF3.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DEE6A84C.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
data
#