top title background image
flash

BON DE COMMANDE POUR CHENOUFI AEK.xlsx

Status: finished
Submission Time: 2022-05-13 16:47:18 +02:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    626175
  • API (Web) ID:
    993665
  • Analysis Started:
    2022-05-13 17:06:21 +02:00
  • Analysis Finished:
    2022-05-13 17:17:52 +02:00
  • MD5:
    981661fb35d158853f012f21aadd7b92
  • SHA1:
    2ce93cbf7651c472a598b8756f5301275d95e27f
  • SHA256:
    3084b6d063c6ec61503e90e6f2c61830ec915593fed9ddc719f67bc1ec24b49a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 23/60
malicious
Score: 11/41
malicious

IPs

IP Country Detection
103.156.91.153
unknown

URLs

Name Detection
http://103.156.91.153/fdcloudfiles/vbc.exehhC:
http://103.156.91.153/fdcloudfiles/vbc.exej
www.freerenoadvice.com/ud5f/
Click to see the 26 hidden entries
http://103.156.91.153/fdcloudfiles/vbc.exes
http://103.156.91.153/fdcloudfiles/vbc.exe
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://servername/isapibackend.dll
http://www.piriform.com/ccleanerv
https://support.mozilla.org
http://www.autoitscript.com/autoit3
http://www.%s.comPA
http://computername/printers/printername/.printer
http://www.piriform.com/ccleaner
http://investor.msn.com/
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.icra.org/vocabulary/.
http://java.sun.com
http://www.windows.com/pctv.
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://nsis.sf.net/NSIS_ErrorError
http://www.piriform.com/ccleaner1SPS0
http://www.piriform.com/ccleanerq
http://www.iis.fhg.de/audioPA
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\bmexo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Desktop\~$BON DE COMMANDE POUR CHENOUFI AEK.xlsx
data
#
Click to see the 13 hidden entries
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\71EFD22C.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AD6B8317.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BCA69961.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4ED06E0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F00B6FEE.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Temp\fmrfya
data
#
C:\Users\user\AppData\Local\Temp\nsmD99.tmp
data
#
C:\Users\user\AppData\Local\Temp\pm30pgwp2di9
data
#
C:\Users\user\AppData\Local\Temp\~DF05A0E9538DA984DE.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DF4F6886DF9AB47DD5.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF5923B3D402615EB4.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF91A8639994D1ECD1.TMP
data
#