top title background image
flash

PO P232-2111228.xlsx

Status: finished
Submission Time: 2021-11-25 19:17:22 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    528793
  • API (Web) ID:
    896314
  • Analysis Started:
    2021-11-25 19:31:12 +01:00
  • Analysis Finished:
    2021-11-25 19:41:58 +01:00
  • MD5:
    fe245cc71a6aaff582e5c14d1cb4f79e
  • SHA1:
    5ad55c5abb60501750e154c12eca4347cd07ce41
  • SHA256:
    9e315f448ba10b56fb6e53d39212ac98c9dc5c0c7b6dd3455f3bb65cce4a7a89
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 22/58
malicious
Score: 17/45
malicious
malicious

IPs

IP Country Detection
45.139.238.65
Russian Federation
45.130.41.10
Russian Federation
192.0.78.25
United States
Click to see the 2 hidden entries
154.23.172.42
United States
103.167.92.57
unknown

Domains

Name IP Detection
14d7.com
154.23.172.42
www.flagimir.store
45.130.41.10
trendyhunterr.com
192.0.78.25
Click to see the 4 hidden entries
www.gzz06j.cloud
45.139.238.65
www.trendyhunterr.com
0.0.0.0
www.14d7.com
0.0.0.0
www.creditb2b.com
74.208.236.119

URLs

Name Detection
http://www.flagimir.store/ecaq/?z6BXjz6=qIaOAylHD+7nuLCKVj0dqMEagOlqUztLhCHwuYmgFKo0pBs1u2Qf4sHa5T8Epw0dehH0mQ==&k0Dli=0bA4dpDh3xCt
http://www.14d7.com/ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=+tTxZdgcqU79mMd7wf6ovAKHVoLw/EhrDF3C/ckFTtMjuwl+tr3xRs8m7m6dFdAioc4v8g==
http://103.167.92.57/981900000_2/vbc.exe
Click to see the 28 hidden entries
www.lesventsfavorables.com/ecaq/
http://www.gzz06j.cloud/ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=4YbOQk8AO0vy4k2VmRJxI3NcMocUM9+uNZ05HSgMgTndh1RwRX9NSBB2ccr9KRceRZRXnw==
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/cBg
http://servername/isapibackend.dll
http://www.piriform.com/ccleanerv
https://support.mozilla.org
http://www.autoitscript.com/autoit3
http://www.%s.comPA
http://computername/printers/printername/.printer
http://www.piriform.com/ccleaner
http://investor.msn.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://nsis.sf.net/NSIS_Error
http://www.windows.com/pctv.
http://www.icra.org/vocabulary/.
http://java.sun.com
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://nsis.sf.net/NSIS_ErrorError
http://www.mozilla.com0
https://credit-b2b.mn.co//ecaq/?z6BXjz6=bfQv/FP2vMWCXJ5
http://www.iis.fhg.de/audioPA
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\Desktop\~$PO P232-2111228.xlsx
data
#
C:\Users\user\AppData\Local\Temp\nsv6C8A.tmp\gqsrfnlttu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD94E032.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Temp\~DFF8360FFA42CFF728.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFC80E7B9FF80D6354.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB2A7C221D7E594E8.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF4E1314DB88821996.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\nui7qhl0vyqjy5hwe1a
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9815DB5.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D6C54E8B.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C7678FCA.png
PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\97F9413F.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\78EEB707.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7553EA68.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6E46C943.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5BFC33D1.png
PNG image data, 600 x 306, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\49FEBDAD.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48D05749.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B7C84B6.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\37DCE79E.png
PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30E35F10.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\20BB155C.png
PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
#