top title background image
flash

Original title deed.xlsx

Status: finished
Submission Time: 2021-05-03 14:54:19 +02:00
Malicious
Ransomware
Trojan
Exploiter
Evader
Nanocore

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    402852
  • API (Web) ID:
    707872
  • Analysis Started:
    2021-05-03 14:54:21 +02:00
  • Analysis Finished:
    2021-05-03 15:09:02 +02:00
  • MD5:
    ef302d177adde99f0a6f2e8a6bc9eda1
  • SHA1:
    ebc1e702f7334f162571ae83a4810fd870766ee3
  • SHA256:
    caf4f0b64bd425c3e04a28606b54a98b4eed7deb03ca7091ad148fddfbc297a8
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious

IPs

IP Country Detection
172.245.45.28
United States

Domains

Name IP Detection
myhostisstillgood11.zapto.org
172.245.45.28

URLs

Name Detection
79.134.225.26
nassiru1166main.ddns.net
http://myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exe
Click to see the 12 hidden entries
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://www.windows.com/pctv.
http://investor.msn.com
http://www.msnbc.com/news/ticker.txt
http://www.icra.org/vocabulary/.
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://nsis.sf.net/NSIS_Error
http://investor.msn.com/
http://www.%s.comPA
http://nsis.sf.net/NSIS_ErrorError
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.hotmail.com/oe

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk
data
#
Click to see the 39 hidden entries
C:\Users\user\AppData\Local\Temp\nsrD7BA.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsmB923.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsmCF90.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsn2761.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsn86CF.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsn937.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsnBAE9.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsnEF02.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsnEF9F.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsrB9DF.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ue7qbln2lrz74jd4
data
#
C:\Users\user\AppData\Local\Temp\nss53BD.tmp
data
#
C:\Users\user\AppData\Local\Temp\nss87C.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nssD5D7.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsx542B.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsx8670.tmp
data
#
C:\Users\user\Desktop\~$Original title deed.xlsx
data
#
C:\Users\user\AppData\Local\Temp\nsxA0F3.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsxD645.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nscBA5B.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A1D09AB.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\846ADFD2.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8B44CEF.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CB262224.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D80E13D5.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Temp\nsc26D3.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsc6BC0.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsc81D.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsc8A9.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsmCEF3.tmp
data
#
C:\Users\user\AppData\Local\Temp\nscF0A7.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsh1E7A.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsh3A82.tmp
data
#
C:\Users\user\AppData\Local\Temp\nsh3B1F.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsh6AF4.tmp
data
#
C:\Users\user\AppData\Local\Temp\nshA094.tmp
data
#
C:\Users\user\AppData\Local\Temp\nshD819.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nshF115.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsm1EE8.tmp\lk95ejdjuy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#