top title background image
flash

http://52.36.72.57/campaigns?target=curtis&campaignname=JOESandboxCloud

Status: finished
Submission Time: 2020-05-23 08:58:29 +02:00
Clean

Comments

Tags

Details

  • Analysis ID:
    232589
  • API (Web) ID:
    361427
  • Analysis Started:
    2020-05-23 08:58:29 +02:00
  • Analysis Finished:
    2020-05-23 09:02:06 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
clean
Score: 0
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
52.36.72.57
United States

URLs

Name Detection
http://52.36.72.57/starwars_movealong.png
http://www.nytimes.com/
http://52.36.72.57/favicon.ico
Click to see the 11 hidden entries
http://www.youtube.com/
http://www.wikipedia.com/
http://www.amazon.com/
http://52.36.72.57/campaigns/favicon.ico
http://www.live.com/
http://52.36.72.57/campaigns?target=curtis&campaignname=JOESandboxCloud
http://52.36.72.57/campaigns/?target=curtis&campaignname=JOESandboxCloudRoot
http://www.reddit.com/
http://www.twitter.com/
http://52.36.72.57/campaigns/?target=curtis&campaignname=JOESandboxCloud
http://52.36.72.57/campaigns/?target=curtis&campaignname=JOESandboxCloud

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF8B7FC1DC32460CD4.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF5D9F26E24134076E.TMP
data
#
Click to see the 15 hidden entries
C:\Users\user\AppData\Local\Temp\~DF48F9471208456CC2.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\campaigns[1].htm
HTML document, ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\V5D02472\starwars_movealong[1].png
PNG image data, 679 x 296, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\campaigns[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4C84E535-9D0E-11EA-AADD-C25F135D3C65}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4C84E538-9D0E-11EA-AADD-C25F135D3C65}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4C84E537-9D0E-11EA-AADD-C25F135D3C65}.dat
Microsoft Word Document
#