=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

DL03327INV.xlsx

Status: finished
Submission Time: 2022-05-14 15:08:15 +02:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    626601
  • API (Web) ID:
    994099
  • Analysis Started:
    2022-05-14 15:18:09 +02:00
  • Analysis Finished:
    2022-05-14 15:30:24 +02:00
  • MD5:
    5b4a67ac532a5d8900b815144f0fb845
  • SHA1:
    6da306004e084780e9f57f3702a5ec22e72fff6c
  • SHA256:
    98fc7157dafde651c3ab515663e3a91f034b49175e2e2495c00576c4b8e9e96d
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

malicious
23/60

malicious
21/41

malicious

IPs

IP Country Detection
23.81.214.26
United States
104.168.33.31
United States
164.155.217.57
South Africa
Click to see the 2 hidden entries
34.102.136.180
United States
198.54.117.212
United States

Domains

Name IP Detection
www.tw-life.net
164.155.217.57
www.yiwanggkm.com
23.81.214.26
www.arjimni.com
0.0.0.0
Click to see the 5 hidden entries
www.contractornurd.com
0.0.0.0
www.skinclash.com
0.0.0.0
parkingpage.namecheap.com
198.54.117.212
hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
18.119.154.66
arjimni.com
34.102.136.180

URLs

Name Detection
http://www.yiwanggkm.com/nc39/?dZzp=SW2DOu4AoD1tt2PaEEhiNvSk2qD2OpQeAcSR0NEUE8SsNGniN/+F24NqGXKX7Cj1ljS/6Q==&3f=j6AdrVwh
http://www.tw-life.net/nc39/?dZzp=Td3Z6WACWlvn2oxJ5kz3cAAvTYM+vx9a0mv4ko18Io/mhbtUurGZKYFJi0A4+N8FDsGh8g==&3f=j6AdrVwh
www.arjimni.com/nc39/
Click to see the 29 hidden entries
http://104.168.33.31/75/vbc.exehhC:
http://104.168.33.31/75/vbc.exe
http://104.168.33.31/75/vbc.exej
http://www.contractornurd.com/nc39/?dZzp=CWrF3poHj2MNQw4FqfZfOWFDC9Dy9qwGAafxJUMNhkwMJpF8RUBmV1WHKbaf9sKHKobluA==&3f=j6AdrVwh
http://www.windows.com/pctv.
http://investor.msn.com
http://www.msnbc.com/news/ticker.txt
http://wellformedweb.org/CommentAPI/
http://www.arjimni.com/nc39/?dZzp=SWFeU2CogosqNHNVddu3ZSSiHhx9YO5iIr2cqOlbYRvwZbqC6rJ+ufxHmetPGTnqGTEg+w==&3f=j6AdrVwh
http://www.iis.fhg.de/audioPA
http://www.piriform.com/ccleanerq
http://www.piriform.com/ccleaner1SPS0
http://nsis.sf.net/NSIS_ErrorError
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://www.hotmail.com/oe
http://treyresearch.net
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://java.sun.com
http://www.icra.org/vocabulary/.
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://investor.msn.com/
http://www.piriform.com/ccleaner
http://computername/printers/printername/.printer
http://www.%s.comPA
http://www.autoitscript.com/autoit3
https://support.mozilla.org
http://www.piriform.com/ccleanerv
http://servername/isapibackend.dll

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Temp\yldnat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Desktop\~$DL03327INV.xlsx
data
#
Click to see the 13 hidden entries
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21AA51C5.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5042D1B.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52D20C60.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77AC4BD4.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E77A502.wmf
ms-windows metafont .wmf
#
C:\Users\user\AppData\Local\Temp\boswagvgna
data
#
C:\Users\user\AppData\Local\Temp\l4nnhna3wvu7agf
data
#
C:\Users\user\AppData\Local\Temp\nss8A2D.tmp
data
#
C:\Users\user\AppData\Local\Temp\~DF8200AD3C92400B31.TMP
CDFV2 Encrypted
#
C:\Users\user\AppData\Local\Temp\~DFA02A15C6E61E2243.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB8C99282338AF6F8.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD268A41FBC2DE634.TMP
data
#