top title background image
flash

https://.covid19-info.online/.

Status: finished
Submission Time: 2020-05-22 02:20:16 +02:00
Malicious

Comments

Tags

Details

  • Analysis ID:
    232307
  • API (Web) ID:
    360867
  • Analysis Started:
    2020-05-22 02:20:17 +02:00
  • Analysis Finished:
    2020-05-22 02:22:10 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 56
Error: Incomplete analysis, please check the report for detailed error information
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 8/71

URLs

Name Detection
https://.covid19-info.online/Root
https://.covid19-info.online/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{12E402DC-9BC2-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{12E402DE-9BC2-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{12E402DF-9BC2-11EA-AAE6-9CC1A2A860C6}.dat
Microsoft Word Document
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5N37O3UG\errorPageStrings[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\O0N4T4W6\NewErrorPageTemplate[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\P24S97MI\httpErrorPagesScripts[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\dnserror[1]
HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PKAQFTEH\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Temp\~DFA08A89B99F96FC6A.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFA0B50C734083CC4A.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFF491A9D77924132D.TMP
data
#