top title background image
flash

REMITTANCE ADVICE.xlsx

Status: finished
Submission Time: 2021-11-25 18:03:11 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    528736
  • API (Web) ID:
    896257
  • Analysis Started:
    2021-11-25 18:11:00 +01:00
  • Analysis Finished:
    2021-11-25 18:21:48 +01:00
  • MD5:
    2caab2292b282e6a5dea1cf78f84924a
  • SHA1:
    86f37c31091b15cca135490a84eb52027bb1a4df
  • SHA256:
    4c84124c87cd46ce58a7a8208ad1674c4a270793f9a6158e80fd28f96b3cc844
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 20/57
malicious
Score: 19/44
malicious

IPs

IP Country Detection
192.210.173.90
United States
154.205.233.189
Seychelles
156.234.44.48
Seychelles
Click to see the 2 hidden entries
23.225.139.107
United States
34.102.136.180
United States

Domains

Name IP Detection
ff4cu6twc.xyz
23.225.139.107
www.yhxt13800.com
154.205.233.189
www.clicktoreach.com
156.234.44.48
Click to see the 3 hidden entries
www.promtgloan.com
0.0.0.0
www.ff4cu6twc.xyz
0.0.0.0
promtgloan.com
34.102.136.180

URLs

Name Detection
http://192.210.173.90/70007/vbc.exe
www.ff4cu6twc.xyz/m07f/
http://www.yhxt13800.com/m07f/?8pM=dna2QeGax28GSJkNz7Uka6j7mpWTPT6ewM6loPSgIzIWFgZfz42ON2JlykoAty+SKeMdPQ==&8p=5jRPexjhYVA
Click to see the 25 hidden entries
http://www.clicktoreach.com/m07f/?8p=5jRPexjhYVA&8pM=igd9ZaB/0LuNZ3khfd1rv5ythTuTDfiv5fbgroetehOkX6jie/kGfA2Y9msKDFCRQxq0nA==
http://www.icra.org/vocabulary/.
http://www.promtgloan.com/m07f/?8p=5jRPexjhYVA&8pM=fckM7dU8XdB/CBRKAli8IWZTeVSsZcSnfT9NsehECm7QI2Avboj8F2o4ZiYCfg8g2yKAcw==
http://servername/isapibackend.dll
https://www.clicktoreach.com/m07f/?8p=5jRPexjhYVA&8pM=igd9ZaB/0LuNZ3khfd1rv5ythTuTDfiv5fbgroetehOkX6
https://support.mozilla.org
http://www.autoitscript.com/autoit3
http://www.%s.comPA
http://computername/printers/printername/.printer
http://www.piriform.com/ccleaner
http://investor.msn.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://nsis.sf.net/NSIS_Error
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.windows.com/pctv.
http://java.sun.com
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://nsis.sf.net/NSIS_ErrorError
http://www.iis.fhg.de/audioPA
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\Desktop\~$REMITTANCE ADVICE.xlsx
data
#
C:\Users\user\AppData\Local\Temp\nsvE542.tmp\otav.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C2B50451.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Temp\~DFFCF9EB155A244E75.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFEABD3D7DAA0E0CDA.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DF927638A277FFF96D.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF1395079B79D3B049.TMP
data
#
C:\Users\user\AppData\Local\Temp\aeu4t4jz55fz
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DBA4EB36.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D55D75BF.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CFDE5B87.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A43ECEB2.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8CED6B0B.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7441E635.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6ED27E1E.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4950562D.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3C46ACE8.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\34C7D190.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\29F275C3.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\25CF4E4A.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B2337C9.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\16F16FDC.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#