top title background image
flash

https://bit.ly/3c5gzE2

Status: finished
Submission Time: 2020-04-09 18:17:32 +02:00
Clean

Comments

Tags

Details

  • Analysis ID:
    221566
  • API (Web) ID:
    339863
  • Analysis Started:
    2020-04-09 18:18:17 +02:00
  • Analysis Finished:
    2020-04-09 18:29:20 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
clean
Score: 3
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
185.206.214.98
Ukraine
67.199.248.10
United States

Domains

Name IP Detection
mikepughsellsny.com
185.206.214.98
bit.ly
67.199.248.10

URLs

Name Detection
https://mikepughsellsny.com/reports.zip

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C9A07A67-7A7D-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C9A07A69-7A7D-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\reports.zip.db86hux.partial
Zip archive data, at least v2.0 to extract
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\reports.zip.db86hux.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\reports.zip:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\reports[1].zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\3c5gzE2[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Temp\4dpt1ecq.04n\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF4708C871C6D5D158.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF8DD6CCDB0A292C3E.TMP
data
#