top title background image
flash

?Eweb_NewAudioMessage.htm

Status: finished
Submission Time: 2020-05-15 00:09:14 +02:00
Malicious
Phishing

Comments

Tags

Details

  • Analysis ID:
    230424
  • API (Web) ID:
    357185
  • Analysis Started:
    2020-05-15 00:09:15 +02:00
  • Analysis Finished:
    2020-05-15 00:14:17 +02:00
  • MD5:
    7224f771f019b63a7f54fdb3d47ac5da
  • SHA1:
    b7a8533ac3673a1e75069d962ca88959d255ccbb
  • SHA256:
    43dadc95062176fe3545a754773e9e85b050d1b410ea75a47295dba0645d1687
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
205.134.252.150
United States
49.12.102.39
Germany
13.35.43.18
United States

Domains

Name IP Detection
monogrambd.com
205.134.252.150
d26p066pn2w0s0.cloudfront.net
13.35.43.18
ezzhelmy.com
49.12.102.39
Click to see the 2 hidden entries
www.ezzhelmy.com
0.0.0.0
logo.clearbit.com
0.0.0.0

URLs

Name Detection
https://monogrambd.com/QW/office/images/favicon.ico~
http://www.wikipedia.com/
http://www.amazon.com/
Click to see the 8 hidden entries
http://www.nytimes.com/
https://logo.clearbit.com/eweb.org
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
https://monogrambd.com
https://monogrambd.com/QW/office/pi19wsca20dre3q7uonmljbvkyt5h6gx48zfg41z57pamjy0ex6lvn289cqfhiobskw
http://www.youtube.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\pi19wsca20dre3q7uonmljbvkyt5h6gx48zfg41z57pamjy0ex6lvn289cqfhiobskwtud3r1ndqs48otmxz6gwhra0j3ilf7u5e92cpkbyv[1].htm
HTML document, UTF-8 Unicode text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\inv-big-background[1].jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1920x1080, frames 3
#
C:\Users\user\AppData\Local\Temp\~DFD75D7C0534727400.TMP
data
#
Click to see the 26 hidden entries
C:\Users\user\AppData\Local\Temp\~DFCA2850392032BDE8.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF0176B5C3478115FF.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\sigin[1].png
PNG image data, 108 x 32, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\passwrd[1].png
PNG image data, 69 x 34, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\favicon[3].ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\eweb[1].png
PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\ellipsis_white[1].svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\P24S97MI\forgetpass[1].png
PNG image data, 121 x 20, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\P24S97MI\enterpass[1].png
PNG image data, 170 x 29, 8-bit/color RGB, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\ellipsis_grey[1].svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\conv[1].css
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\inv-small-background[1].jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 50x28, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9DAA437B-962F-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\arrow_left[1].svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\v8bxa9r\imagestore.dat
data
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{A5AABC87-962F-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9DAA437D-962F-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#