top title background image
flash

PROFORMA INVOICE.xlsx

Status: finished
Submission Time: 2021-11-25 19:14:22 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    528789
  • API (Web) ID:
    896311
  • Analysis Started:
    2021-11-25 19:25:13 +01:00
  • Analysis Finished:
    2021-11-25 19:36:57 +01:00
  • MD5:
    f0e46aba95165b11ad7fc84d80a73730
  • SHA1:
    2ea511219e2c3d76597483c4998a2af40d821142
  • SHA256:
    009dfe9d9409704671b802ddaa54ee22355f3ff41c6ef779b7e644c76466e0b0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 14/45
malicious

IPs

IP Country Detection
192.0.78.25
United States
151.106.119.46
Germany
151.101.66.159
United States
Click to see the 3 hidden entries
107.173.229.133
United States
108.167.189.66
United States
34.102.136.180
United States

Domains

Name IP Detection
trashwasher.com
151.101.66.159
noyoucantridemyonewheel.com
192.0.78.25
www.franquiciasexclusivas.tienda
108.167.189.66
Click to see the 8 hidden entries
deboraverdian.com
151.106.119.46
www.trashwasher.com
0.0.0.0
www.noyoucantridemyonewheel.com
0.0.0.0
www.digipoint-entertainment.com
0.0.0.0
www.deboraverdian.com
0.0.0.0
www.hacticum.com
0.0.0.0
www.getjoyce.net
0.0.0.0
hacticum.com
34.102.136.180

URLs

Name Detection
http://www.noyoucantridemyonewheel.com/ht08/?br2=60BX3p/jKqTFfatzdk67FZjwUvooQvGFnODgWFokXaJ7H/RmjwYG/Htt7Nd+S+ztCPQGkw==&fDKD5Z=lbLdxBhXWNSHTR
http://107.173.229.133/90009/vbc.exe
www.septemberstockevent200.com/ht08/
Click to see the 26 hidden entries
http://www.trashwasher.com/ht08/?br2=uW1sPHtBOFcvSjOqiE7uYKY6CRw967TpF9DAp4EO6MgnVSdl1zAyFQ+ogdnPtirgP8DfTg==&fDKD5Z=lbLdxBhXWNSHTR
http://www.deboraverdian.com/ht08/?br2=hqaFuomov4HTN7lxwLOQI0L+zLU3A1JjC3kLHHHa91aVMp4VPmQJeUa+LGH249kypYugsQ==&fDKD5Z=lbLdxBhXWNSHTR
http://www.franquiciasexclusivas.tienda/ht08/?br2=Wj4EIVjQBNu/bqqxJYrWPsWLHRdbpU/VGyAVKo6IxXme9nj69vNHjvuNthqXxUIvimxQ8w==&fDKD5Z=lbLdxBhXWNSHTR
http://java.sun.com
http://servername/isapibackend.dll
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://support.mozilla.org
http://www.autoitscript.com/autoit3
http://www.%s.comPA
http://computername/printers/printername/.printer
http://www.piriform.com/ccleaner
http://investor.msn.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.icra.org/vocabulary/.
http://www.windows.com/pctv.
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.mozilla.com0
http://www.iis.fhg.de/audioPA
http://www.hacticum.com/ht08/?br2=NsDQ5dhzDoz6b+QTI369eNhdKzsm5WWXC1g1e1LkMaMU2QVIAgjIadv0XRSqFt55bwDZkw==&fDKD5Z=lbLdxBhXWNSHTR
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Desktop\~$PROFORMA INVOICE.xlsx
data
#
C:\Users\user\AppData\Roaming\nLOlOTZpUHFzC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 23 hidden entries
C:\Users\user\AppData\Local\Temp\tmp5580.tmp
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F3943643.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6DVTRGQEANC1QDSD4KFD.temp
data
#
C:\Users\user\AppData\Local\Temp\~DFC39337F99D373AF1.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF5ABA8F4F45C955BE.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF364B1570347A7C36.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DF179E4FABD168830C.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FB3FE2AD.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F4194C49.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ECCEF5B6.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D8E0D407.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CED70334.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B8B07368.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A725389E.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7C45E1A5.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B2EFE3F.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\597470CA.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\566AA7FB.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4C948E5C.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\49DB89C0.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30913362.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#