=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

PROFORMA INVOICE.xlsx

Status: finished
Submission Time: 2022-05-14 15:08:10 +02:00
Malicious
Trojan
Spyware
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    626593
  • API (Web) ID:
    994097
  • Analysis Started:
    2022-05-14 15:09:33 +02:00
  • Analysis Finished:
    2022-05-14 15:24:10 +02:00
  • MD5:
    5b9ddbdf0a0af0788eeceeacec2f0295
  • SHA1:
    77687d59abbd0b3c4eecc80abbe30d33a47e781c
  • SHA256:
    e11f7d510b899e00e0cf10dc360400fd38f180e9c72f42c465c3a470075cd9ea
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
21/60

malicious
10/41

malicious

IPs

IP Country Detection
198.12.89.166
United States
5.183.8.183
Germany
185.53.179.171
Germany

Domains

Name IP Detection
www.employeebnsf.com
185.53.179.171
www.dems-clicks.com
5.183.8.183
www.cariniclinicalconsulting.com
104.21.75.67

URLs

Name Detection
http://www.dems-clicks.com/n6g4/?Rju=oW3KVVYfOUtMWnx9E4fO+4eOl+SZoa0wNCifvEB8Y9jnCg3EyPPrm8173PHAA8seoyylQg==&ohA=4hdXYFAH
http://198.12.89.166/55/vbc.exe
www.admincost.com/n6g4/
Click to see the 30 hidden entries
http://www.employeebnsf.com/n6g4/?ohA=4hdXYFAH&Rju=/8Ga1vKBK5Zv+SvpDfc9R87wDDB6IH5FC+aL3DgDAA8ZWL71dgMkGG8I5dFlam/RYjehgQ==
http://www.windows.com/pctv.
http://investor.msn.com
http://www.msnbc.com/news/ticker.txt
http://wellformedweb.org/CommentAPI/
http://198.12.89.166/55/vbc.exehhC:
http://www.iis.fhg.de/audioPA
http://www.piriform.com/ccleanerq
http://www.mozilla.com0
http://www.piriform.com/ccleaner1SPS0
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.hotmail.com/oe
http://treyresearch.net
http://198.12.89.166/55/vbc.exej
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://java.sun.com
http://www.icra.org/vocabulary/.
http://198.12.89.166/55/vbc.exen
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://investor.msn.com/
http://www.piriform.com/ccleaner
http://computername/printers/printername/.printer
http://www.%s.comPA
http://www.autoitscript.com/autoit3
https://support.mozilla.org
http://www.piriform.com/ccleanerv
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://servername/isapibackend.dll
http://198.12.89.166/55/vbc.exeg

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmp7282.tmp
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Roaming\dDqpEdJEtzi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 13 hidden entries
C:\Users\user\Desktop\~$PROFORMA INVOICE.xlsx
data
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\13D6C471.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\19CBAA30.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A37827C.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6731B0A7.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C335FFBE.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Temp\~DF3A9718BB32954321.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF6BDEF7AB5AFB6A2C.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB5BF52C584DCD599.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DFC72BCB116CB2ED22.TMP
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\80IVWTICKZQK6HB0AL5T.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
#