top title background image
flash

New order - C.S.I No. 04183.xlsx

Status: finished
Submission Time: 2021-11-25 19:11:21 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    528788
  • API (Web) ID:
    896310
  • Analysis Started:
    2021-11-25 19:22:14 +01:00
  • Analysis Finished:
    2021-11-25 19:33:01 +01:00
  • MD5:
    bc2d171f6ea23a58ce5cca820869295c
  • SHA1:
    dafd3a3276c12ee6d20206573d65d6fb10e6af7b
  • SHA256:
    408c41f67cc40208f1518b050db8b6d0f315dae817e26c5ae43efe917506c226
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 21/58
malicious
Score: 16/44
malicious

IPs

IP Country Detection
103.171.1.140
unknown
104.21.82.75
United States
34.246.239.131
United States

Domains

Name IP Detection
www.oojry.xyz
104.21.82.75
www.crystalsbyzoe.com
0.0.0.0
dolphin-render-ce5083-1529577379-1289163597.eu-west-1.elb.amazonaws.com
34.246.239.131

URLs

Name Detection
http://www.oojry.xyz/og2w/?6lRd8=pSr5u6Cd6G0oArdSS5DUX/x2v0PsX7Tf+WPQrsPbuuGn2pEwuIBu1IHHNpIgTiueDUTEKQ==&kjiDz=mH9p98O8MN
www.celikkaya.xyz/og2w/
http://www.crystalsbyzoe.com/og2w/?6lRd8=HRVKk55HqKhUKEplYc9Y+k8lMJF7Npxc0OkeINx2Urv2TzIY5LS2Gl5mjz9S2np0K2vYIQ==&kjiDz=mH9p98O8MN
Click to see the 23 hidden entries
http://103.171.1.140/384500000_1/.vbc.exe
http://www.icra.org/vocabulary/.
http://servername/isapibackend.dll
https://support.mozilla.org
http://www.autoitscript.com/autoit3
http://www.%s.comPA
http://computername/printers/printername/.printer
http://www.piriform.com/ccleaner
http://investor.msn.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://nsis.sf.net/NSIS_Error
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.windows.com/pctv.
http://java.sun.com
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://nsis.sf.net/NSIS_ErrorError
http://www.iis.fhg.de/audioPA
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\Desktop\~$New order - C.S.I No. 04183.xlsx
data
#
C:\Users\user\AppData\Local\Temp\nssE7A3.tmp\folvcfp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EB1A9DA4.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Temp\~DFFDD773F6984E1177.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DFEAB75EE5AC992C85.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB1A16108E122F889.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF6B82F0CFA0E9C1FD.TMP
data
#
C:\Users\user\AppData\Local\Temp\y6piyw2sm9gz
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD326752.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F2131971.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F02D5955.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DBF350F9.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CF128ED8.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BA4B566F.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\881D373.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7BBEB2B.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6391CDA7.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\632450BE.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5EF52A6.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4C56E6BA.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3BA6FB7C.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B711330.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#