top title background image
flash

https://maewynmajor.ga/sharehigh/1/index.php

Status: finished
Submission Time: 2020-01-22 21:49:26 +01:00
Malicious
Phishing
Trojan

Comments

Tags

Details

  • Analysis ID:
    202800
  • API (Web) ID:
    303278
  • Analysis Started:
    2020-01-22 21:49:26 +01:00
  • Analysis Finished:
    2020-01-22 21:55:24 +01:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 48
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
107.173.103.106
United States

Domains

Name IP Detection
maewynmajor.ga
107.173.103.106

URLs

Name Detection
https://maewynmajor.ga/sharehigh/1/sf8743rg387efg9823983.html?cmd=login_submit&id=c2de33cef07060e001
http://durandaljs.com
https://github.com/BlueSpire/Durandal
Click to see the 8 hidden entries
http://www.wikipedia.com/
http://www.amazon.com/
http://www.nytimes.com/
http://www.live.com/
https://maewynmajor.ga/sharehigh/1/f8394rf99fh98h98h3hf3.png
http://www.reddit.com/
http://www.twitter.com/
http://www.youtube.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DFFAC31B6307110AE2.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD38C09DA6A6C3721.TMP
data
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Local\Temp\~DF195F7AC4019BFC2D.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VTIIBVU5\f8394rf99fh98h98h3hf3[1].png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\sf367dfywf762fd872823[1].png
PNG image data, 408 x 231, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\oc8743rg387efg9823983c[1].css
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\V5D02472\ctx32r6ew2f8237d9273[1].png
PNG image data, 297 x 74, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\sf8743rg387efg9823983[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\6aw4uvh\imagestore.dat
data
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5CB5416D-3DA4-11EA-AADB-C25F135D3C65}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{62B736F2-3DA4-11EA-AADB-C25F135D3C65}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5CB5416F-3DA4-11EA-AADB-C25F135D3C65}.dat
Microsoft Word Document
#