=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

PO 65738963578 Revise Settlement.xlsx

Status: finished
Submission Time: 2022-05-13 16:34:17 +02:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    626146
  • API (Web) ID:
    993647
  • Analysis Started:
    2022-05-13 16:40:44 +02:00
  • Analysis Finished:
    2022-05-13 16:47:44 +02:00
  • MD5:
    e5c9c992c088a778a6348f4a58dd78d3
  • SHA1:
    754f386df06785ddd4cb4a04bed626ceab65d5ab
  • SHA256:
    6b8ffb251308a2396f35780df9376b329a6c741419db44ea4f89d88ed932fbf2
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
23/56

malicious
12/41

malicious

IPs

IP Country Detection
198.12.81.20
United States

URLs

Name Detection
www.cortesdisenosroutercnc.com/itq4/
http://198.12.81.20/busy/BUSY.exeC:
http://198.12.81.20/busy/BUSY.exeiiC:
Click to see the 3 hidden entries
http://198.12.81.20/busy/BUSY.exej
http://198.12.81.20/busy/BUSY.exe
http://nsis.sf.net/NSIS_ErrorError

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\BUSY[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\idcqz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Desktop\~$PO 65738963578 Revise Settlement.xlsx
data
#
Click to see the 13 hidden entries
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3BF36CD9.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5CBD0238.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5D623D4F.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A9EBFD06.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D8559C53.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Temp\bn5z71pvulub10vjar
data
#
C:\Users\user\AppData\Local\Temp\dknqrab
data
#
C:\Users\user\AppData\Local\Temp\nswAB85.tmp
data
#
C:\Users\user\AppData\Local\Temp\~DF676A4AF24BE52768.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DF6A1E229B1B4407B7.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFCE6EE0378A984A97.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFEB8550F8DC457C8E.TMP
data
#