top title background image
flash

W6902.xlsx

Status: finished
Submission Time: 2022-01-28 22:23:34 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • Formbook
  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    562479
  • API (Web) ID:
    929990
  • Analysis Started:
    2022-01-28 22:36:09 +01:00
  • Analysis Finished:
    2022-01-28 22:48:05 +01:00
  • MD5:
    9a0e6f87707210a385ef8ed3bf348de3
  • SHA1:
    800a9f004b17cd24413eb98c2f6d9fcd02128887
  • SHA256:
    41b58cddca86e32e7034daf8e97dcdaa04ac6cdcb41eae86be1c3fa7fd05c871
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 13/28
malicious

IPs

IP Country Detection
212.192.246.120
Russian Federation
1.32.255.137
Singapore
37.123.118.150
United Kingdom
Click to see the 2 hidden entries
194.5.156.29
Germany
172.217.168.19
United States

Domains

Name IP Detection
www.teentykarm.quest
37.123.118.150
www.927291.com
1.32.255.137
zoharfine.com
194.5.156.29
Click to see the 5 hidden entries
www.zoharfine.com
0.0.0.0
www.mollyagee.com
0.0.0.0
www.youngliving1.com
0.0.0.0
ghs.googlehosted.com
172.217.168.19
www.frentags.art
44.227.76.166

URLs

Name Detection
http://212.192.246.120/gntek.exe
http://www.927291.com/b80i/?SZ5TuL=UugCFIKTrsouekFBGpmjj1lYYuG7Sqq7seOoZgmvymuhpKhoJBysXVQ1tfM8JEdSTWsNrA==&bZ30xx=0lLLAPA89
http://www.zoharfine.com/b80i/?SZ5TuL=WIyhNSWdz3ksnrxMd9FPgtApU7fAeJTF2OsSNfT/loR2Vp0doC/CWPkVmL0jl9ASIxbbNA==&bZ30xx=0lLLAPA89
Click to see the 26 hidden entries
http://www.teentykarm.quest/b80i/?SZ5TuL=J+u8pU8GtC7Crrbw9NxHruIy2NemieD/+UtpUO8UjTwhviPWCSXqrJc4wu/Y5neCzW0Lig==&bZ30xx=0lLLAPA89
www.dreamschools.online/b80i/
http://www.icra.org/vocabulary/.
http://servername/isapibackend.dll
https://support.mozilla.org
http://www.autoitscript.com/autoit3
http://www.%s.comPA
http://computername/printers/printername/.printer
http://www.piriform.com/ccleaner
http://investor.msn.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://nsis.sf.net/NSIS_Error
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.windows.com/pctv.
https://mollyagee.remax.com/b80i/?SZ5TuL=XkBoiSzcHlsmqFkYMGKyxhKE5R0ucNDlHWw1mrTAF5aGMvlxAg1/o3H
http://java.sun.com
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://nsis.sf.net/NSIS_ErrorError
http://www.iis.fhg.de/audioPA
http://www.mollyagee.com/b80i/?SZ5TuL=XkBoiSzcHlsmqFkYMGKyxhKE5R0ucNDlHWw1mrTAF5aGMvlxAg1/o3H+/I9n3Xzt0JsmTA==&bZ30xx=0lLLAPA89
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\nsjBE61.tmp\npsx.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\gntek[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
Click to see the 21 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B25F0F7E.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
#
C:\Users\user\Desktop\~$W6902.xlsx
data
#
C:\Users\user\AppData\Local\Temp\~DF9B5A417AA5C9FB99.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF4ACF9BE7D0DFD87B.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF1370C3F6023AC29F.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DF053AF007E74E92C3.TMP
data
#
C:\Users\user\AppData\Local\Temp\wgtx82tpscdlgb4zlyrg
data
#
C:\Users\user\AppData\Local\Temp\nsjBE60.tmp
data
#
C:\Users\user\AppData\Local\Temp\mgyagjb
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E6EBE05.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9FFBE83C.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\93337B48.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83D9E331.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\724DFD67.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C3F2A9.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68099914.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55FB45AA.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\491E45A3.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2C2EB30D.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\26A1539F.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1D23A896.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
#