Analysis Report https://urldefense.com/jblocked?u=https:/covid19n5nc50cq0w5nfc500wrcdfdn.nyc3.cdn.digitaloceanspaces.com/index.html*RossLogistics.Procurement@ros.com&c=rossstores_2_hosted&sig=xNz2wqSyfC7BuocSXhbPxEY94BKVH5LRt084W97v3_g=

Overview

General Information

Sample URL: https://urldefense.com/jblocked?u=https:/covid19n5nc50cq0w5nfc500wrcdfdn.nyc3.cdn.digitaloceanspaces.com/index.html*RossLogistics.Procurement@ros.com&c=rossstores_2_hosted&sig=xNz2wqSyfC7BuocSXhbPxEY94BKVH5LRt084W97v3_g=
Analysis ID: 338019

Most interesting Screenshot:

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

URL contains potential PII (phishing indication)

Classification

Phishing:

barindex
URL contains potential PII (phishing indication)
Source: https://urldefense.com/jblocked?u=https:/covid19n5nc50cq0w5nfc500wrcdfdn.nyc3.cdn.digitaloceanspaces.com/index.html*RossLogistics.Procurement@ros.com&c=rossstores_2_hosted&sig=xNz2wqSyfC7BuocSXhbPxEY94BKVH5LRt084W97v3_g= Sample URL: PII: index.html*RossLogistics.Procurement@ros.com&c
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 52.6.56.188:443 -> 192.168.2.3:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.6.56.188:443 -> 192.168.2.3:49710 version: TLS 1.2
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xa182aead,0x01d6e869</date><accdate>0xa182aead,0x01d6e869</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xa182aead,0x01d6e869</date><accdate>0xa182aead,0x01d6e869</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xa1877365,0x01d6e869</date><accdate>0xa1877365,0x01d6e869</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xa1877365,0x01d6e869</date><accdate>0xa1877365,0x01d6e869</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xa189d5b7,0x01d6e869</date><accdate>0xa189d5b7,0x01d6e869</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xa189d5b7,0x01d6e869</date><accdate>0xa189d5b7,0x01d6e869</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: urldefense.com
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: {CC1C6D80-545C-11EB-90E4-ECF4BB862DED}.dat.1.dr, ~DF34F91D8FD1A165B0.TMP.1.dr String found in binary or memory: https://urldefense.com/jblocked?u=https:/covid19n5nc50cq0w5nfc500wrcdfdn.nyc3.cdn.digitaloceanspaces
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown HTTPS traffic detected: 52.6.56.188:443 -> 192.168.2.3:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.6.56.188:443 -> 192.168.2.3:49710 version: TLS 1.2
Source: classification engine Classification label: clean0.win@3/18@2/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFD8DDACF787FA4662.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2432 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2432 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior