top title background image
flash

PO5594.xlsx

Status: finished
Submission Time: 2021-11-02 09:13:18 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    513501
  • API (Web) ID:
    881064
  • Analysis Started:
    2021-11-02 09:25:44 +01:00
  • Analysis Finished:
    2021-11-02 09:36:34 +01:00
  • MD5:
    ae8569edde3fe5d5e50f9669bbba54b0
  • SHA1:
    fa19e75584925894b781bcdb1dc53c6b024f7b08
  • SHA256:
    eceeb9918530b8ab023a2465bacc9c2e572c7aaa7add05df882e49c28fbe6e5b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
clean
0/100

Third Party Analysis Engines

malicious
Score: 19/59
malicious
Score: 13/44

IPs

IP Country Detection
103.232.53.25
Viet Nam
66.29.132.90
United States
104.21.75.173
United States
Click to see the 2 hidden entries
75.2.60.5
United States
162.241.253.231
United States

Domains

Name IP Detection
www.spacex-live.net
104.21.75.173
www.metanetgateway.com
75.2.60.5
sarahannsartstudio.com
162.241.253.231
Click to see the 3 hidden entries
schittstore.com
66.29.132.90
www.sarahannsartstudio.com
0.0.0.0
www.schittstore.com
0.0.0.0

URLs

Name Detection
http://www.metanetgateway.com/ddzw/?h2Mdq=CC4eYJ6GdM3g7jV/74DGeVNO7dTe5083KAYqQjLLOiGFZCFwrjOGC7P0JmGnSxw4GGM5lA==&_x=gVp0dvG0DtZT6do0
http://103.232.53.25/8880/vbc.exe
http://www.schittstore.com/ddzw/?h2Mdq=eu2i37xABBm77RmOTVlK/UzsyDYSkffg03LYHul4MxZENkm7/tK6Jp9Y8VUWWe4q58P2rA==&_x=gVp0dvG0DtZT6do0
Click to see the 29 hidden entries
http://www.spacex-live.net/ddzw/?h2Mdq=Z+FzwJtUDkwgABdyd+p8UeqxtpX8YY+y3UFx7cJDGSHChxct3TL8QRd2MFxOEFehDmKc8w==&_x=gVp0dvG0DtZT6do0
www.passionfruitny.com/ddzw/
http://www.sarahannsartstudio.com/ddzw/?h2Mdq=iXrnxWa2MIQCLF3pcDg6+qoW1dWPNK8gD+C0AcHvSyjXkMlp/HpcZgrhMm+aOjdhifJKjg==&_x=gVp0dvG0DtZT6do0
http://www.icra.org/vocabulary/.
http://servername/isapibackend.dll
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://nsis.sf.net/NSIS_Error
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://investor.msn.com/
http://www.piriform.com/ccleaner
http://computername/printers/printername/.printer
http://www.%s.comPA
http://www.autoitscript.com/autoit3
https://support.mozilla.org
http://www.windows.com/pctv.
http://java.sun.com
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
https://www.metanetgateway.com/ddzw/?h2Mdq=CC4eYJ6GdM3g7jV/74DGeVNO7dTe5083KAYqQjLLOiGFZCFwrjOGC7P0J
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
http://nsis.sf.net/NSIS_ErrorError
https://www.metanetgateway.com/ddzw/
http://www.mozilla.com0
http://www.iis.fhg.de/audioPA
http://www.piriform.com/ccleanerp
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#
C:\Users\user\Desktop\~$PO5594.xlsx
data
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
#