Analysis Report https://www.sbsi.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx

Overview

General Information

Sample URL: https://www.sbsi.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx
Analysis ID: 341453

Most interesting Screenshot:

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

No high impact signatures.

Classification

There are no high impact signatures.

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: global traffic HTTP traffic detected: GET /atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mais.pt
Source: global traffic HTTP traffic detected: GET /bo/Entidades/PublishingImages/Plano%20Vacina%C3%A7%C3%A3o%20Covid%2019%20quem%20pode%20aceder%20%C3%A0s%20fases%20priorit%C3%A1rias.jpg HTTP/1.1Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mais.pt
Source: global traffic HTTP traffic detected: GET /bo/Entidades/PublishingImages/footer-bckg.png HTTP/1.1Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mais.pt
Source: global traffic HTTP traffic detected: GET /atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: www.mais.ptConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /bo/Entidades/PublishingImages/Plano%20Vacina%C3%A7%C3%A3o%20Covid%2019%20quem%20pode%20aceder%20%C3%A0s%20fases%20priorit%C3%A1rias.jpg HTTP/1.1Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: www.mais.ptConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /bo/Entidades/PublishingImages/footer-bckg.png HTTP/1.1Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: www.mais.ptConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: www.sbsi.pt
Source: favicon[1].htm.2.dr String found in binary or memory: http://www.link.pt
Source: covid19vacina1212021[1].htm.2.dr String found in binary or memory: http://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx
Source: Plano%20Vacina o%20Covid%2019%20quem%20pode%20aceder%20 s%20fases%20priorit rias[1].htm.2.dr String found in binary or memory: http://www.mais.pt/bo/Entidades/PublishingImages/Plano
Source: footer-bckg[1].htm.2.dr String found in binary or memory: http://www.mais.pt/bo/Entidades/PublishingImages/footer-bckg.png
Source: favicon[1].htm.2.dr String found in binary or memory: http://www.sbsi.pt
Source: {19507BCF-5A44-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://www.mais.pt/at
Source: {19507BCF-5A44-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DFEDD6EA601E384568.TMP.1.dr String found in binary or memory: https://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx
Source: ~DFEDD6EA601E384568.TMP.1.dr String found in binary or memory: https://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx12
Source: {19507BCF-5A44-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspxRo
Source: {19507BCF-5A44-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspxiv
Source: covid19vacina1212021[2].htm.2.dr String found in binary or memory: https://www.sbsi.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx
Source: covid19vacina1212021[2].htm.2.dr String found in binary or memory: https://www.sbsi.pt/bo/Entidades/PublishingImages/Plano%20Vacina
Source: covid19vacina1212021[2].htm.2.dr String found in binary or memory: https://www.sbsi.pt/bo/Entidades/PublishingImages/footer-bckg.png
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 193.126.51.80:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: classification engine Classification label: clean0.win@3/17@3/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{19507BCD-5A44-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFBB341796908C5BEC.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7024 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7024 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 341453 URL: https://www.sbsi.pt/ativida... Startdate: 19/01/2021 Architecture: WINDOWS Score: 0 11 www.mais.pt 2->11 6 iexplore.exe 1 51 2->6         started        process3 process4 8 iexplore.exe 46 6->8         started        dnsIp5 13 www.mais.pt 193.126.51.80, 443, 49738, 49739 NOS_COMUNICACOESPT Portugal 8->13 15 www.sbsi.pt 8->15
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
193.126.51.80
unknown Portugal
2860 NOS_COMUNICACOESPT false

Contacted Domains

Name IP Active
www.sbsi.pt 193.126.51.80 true
www.mais.pt 193.126.51.80 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://www.mais.pt/bo/Entidades/PublishingImages/footer-bckg.png false
  • Avira URL Cloud: safe
unknown
http://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx false
  • Avira URL Cloud: safe
unknown
http://www.mais.pt/bo/Entidades/PublishingImages/Plano%20Vacina%C3%A7%C3%A3o%20Covid%2019%20quem%20pode%20aceder%20%C3%A0s%20fases%20priorit%C3%A1rias.jpg false
  • Avira URL Cloud: safe
unknown
https://www.mais.pt/atividadesindical/informacao/publicacoes/Newsletters/covid19vacina1212021.aspx false
    unknown