Analysis Report https://joom.ag/jSeI

Overview

General Information

Sample URL: https://joom.ag/jSeI
Analysis ID: 363595
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Phishing site detected (based on shot template match)
Yara detected HtmlPhish_10
Yara detected HtmlPhish_7
HTML body contains low number of good links
HTML title does not match URL

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://joom.ag/jSeI SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://view.joomag.com/sharefile/0291789001614882763?short& SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: https://calfvessel.com/file/adobe/ SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on shot template match)
Source: https://calfvessel.com/file/adobe/ Matcher: Template: office matched
Yara detected HtmlPhish_10
Source: Yara match File source: 364339.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\adobe[1].htm, type: DROPPED
Yara detected HtmlPhish_7
Source: Yara match File source: 364339.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\adobe[1].htm, type: DROPPED
HTML body contains low number of good links
Source: https://calfvessel.com/file/adobe/ HTTP Parser: Number of links: 0
Source: https://calfvessel.com/file/adobe/ HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://calfvessel.com/file/adobe/ HTTP Parser: Title: Share Point Online does not match URL
Source: https://calfvessel.com/file/adobe/ HTTP Parser: Title: Share Point Online does not match URL
Source: https://calfvessel.com/file/adobe/ HTTP Parser: No <meta name="author".. found
Source: https://calfvessel.com/file/adobe/ HTTP Parser: No <meta name="author".. found
Source: https://calfvessel.com/file/adobe/ HTTP Parser: No <meta name="copyright".. found
Source: https://calfvessel.com/file/adobe/ HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49720 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.194.217:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.194.217:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.15.154:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.15.154:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 107.182.226.40:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 107.182.226.40:443 -> 192.168.2.4:49744 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.22.227:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.22.227:443 -> 192.168.2.4:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.25:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.25:443 -> 192.168.2.4:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 92.38.171.82:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 92.38.171.82:443 -> 192.168.2.4:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49781 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49782 version: TLS 1.2
Source: magazine[1].js.2.dr String found in binary or memory: joomag.magazine.openYoutubeVideo=function(videoID,startTime){var $body=$("body");var videoUrl="https://www.youtube.com/embed/"+videoID+"?html5=1"+"&autoplay=1"+"&iv_load_policy=3"+"&modestbranding=1"+"&rel=0"+"&showinfo=0"+"&fs=1"+"&enablejsapi=1"+"&start="+startTime;var modalSelector="#j-remote-youtube-video-modal-dialog";var $modal=$(modalSelector);var $modalContent;var getVideoSize=function(){var closeButtonWidth=60;var availableSpace={w:window.innerWidth-50,h:window.innerHeight-50};var videoRatio= equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: joom.ag
Source: hover[1].css.2.dr String found in binary or memory: http://ianlunn.co.uk/
Source: hover[1].css.2.dr String found in binary or memory: http://ianlunn.github.io/Hover/)
Source: popper.min[1].js.2.dr String found in binary or memory: http://opensource.org/licenses/MIT).
Source: olb8zpk[1].js.2.dr String found in binary or memory: http://typekit.com/eulas/0000000000000000000148a0
Source: olb8zpk[1].js.2.dr String found in binary or memory: http://typekit.com/eulas/0000000000000000000148a2
Source: olb8zpk[1].js.2.dr String found in binary or memory: http://typekit.com/eulas/0000000000000000000148a4
Source: olb8zpk[1].js.2.dr String found in binary or memory: http://typekit.com/eulas/0000000000000000000148a6
Source: olb8zpk[1].js.2.dr String found in binary or memory: http://typekit.com/eulas/0000000000000000000148ac
Source: olb8zpk[1].js.2.dr String found in binary or memory: http://typekit.com/eulas/00000000000000000001499c
Source: gtm[1].js.2.dr String found in binary or memory: https://adservice.google.com/ddm/regclk
Source: gtm[1].js.2.dr String found in binary or memory: https://adservice.google.com/pagead/regclk
Source: adobe[1].htm.2.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Source: analytics[1].js.2.dr String found in binary or memory: https://ampcid.google.com/v1/publisher:getClientId
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://browser.sentry-cdn.com/5.11.2/bundle.min.js
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://calfvessel.com
Source: ~DFF8E1FCFAEB5B2E87.TMP.1.dr String found in binary or memory: https://calfvessel.com/file/adobe/91789001614882763?short&BG
Source: gtm[1].js.2.dr String found in binary or memory: https://cct.google/taggy/agent.js
Source: adobe[1].htm.2.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
Source: adobe[1].htm.2.dr String found in binary or memory: https://code.jquery.com/jquery-3.1.1.min.js
Source: adobe[1].htm.2.dr String found in binary or memory: https://code.jquery.com/jquery-3.2.1.slim.min.js
Source: adobe[1].htm.2.dr String found in binary or memory: https://code.jquery.com/jquery-3.3.1.js
Source: magazine[1].js.2.dr String found in binary or memory: https://dme0ih8comzn4.cloudfront.net/imaging/v3/editor.js
Source: free.min[1].css.2.dr String found in binary or memory: https://fontawesome.com
Source: free.min[1].css.2.dr String found in binary or memory: https://fontawesome.com/license/free
Source: adobe[1].htm.2.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Yellowtail&display=swap
Source: css[1].css.2.dr String found in binary or memory: https://fonts.gstatic.com/s/yellowtail/v11/OZpGg_pnoDtINPfRIlLohlvHxw.woff)
Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.dr String found in binary or memory: https://getbootstrap.com)
Source: hover[1].css.2.dr String found in binary or memory: https://github.com/IanLunn/Hover
Source: bundle.min[1].js.2.dr String found in binary or memory: https://github.com/getsentry/sentry-javascript
Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap.min[1].js.2.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: 585b051251[1].js.2.dr String found in binary or memory: https://ka-f.fontawesome.com
Source: 585b051251[1].js.2.dr String found in binary or memory: https://kit.fontawesome.com
Source: adobe[1].htm.2.dr String found in binary or memory: https://kit.fontawesome.com/585b051251.js
Source: adobe[1].htm.2.dr String found in binary or memory: https://login.microsoftonline.com/common/login
Source: adobe[1].htm.2.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
Source: adobe[1].htm.2.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://p.typekit.net/p.gif
Source: gtm[1].js.2.dr String found in binary or memory: https://pagead2.googlesyndication.com
Source: magazine[1].js.2.dr String found in binary or memory: https://player.vimeo.com/video/
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://s9cdn.joomag.com/res_mag/1/1702/1702695/2420210/thumbs/58582055.jpg?1614889819
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://s9cdn.joomag.com/res_mag/1/1702/1702695/2420210/thumbs/spread/0.jpg?1614889819
Source: analytics[1].js.2.dr String found in binary or memory: https://stats.g.doubleclick.net/j/collect
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://use.typekit.net/af/1eef01/0000000000000000000148ac/23/
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://use.typekit.net/af/3ba24d/0000000000000000000148a0/23/
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://use.typekit.net/af/3d81f6/0000000000000000000148a2/23/
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://use.typekit.net/af/42fca5/0000000000000000000148a4/23/
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://use.typekit.net/af/bc719c/00000000000000000001499c/23/
Source: olb8zpk[1].js.2.dr String found in binary or memory: https://use.typekit.net/af/e0b8be/0000000000000000000148a6/23/
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.Root
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.joom/file/adobe/91789001614882763?short&Root
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.joomRoot
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.joomag.co
Source: ~DFF8E1FCFAEB5B2E87.TMP.1.dr String found in binary or memory: https://view.joomag.com/sharefile/0291789001614882763?short&
Source: ~DFF8E1FCFAEB5B2E87.TMP.1.dr String found in binary or memory: https://view.joomag.com/sharefile/0291789001614882763?short&BG
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.joomag.com/sharefile/0291789001614882763?short&Root
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.joomjoomag.com/sharefile/0291789001614882763?short&
Source: {7E770D05-7D33-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://view.joomm/sharefile/0291789001614882763?short&Root
Source: main.2813cfbe59a2f8c75923[1].js.2.dr String found in binary or memory: https://vimeo.com/api/oembed.json?url=
Source: analytics[1].js.2.dr String found in binary or memory: https://www.google-analytics.com/gtm/js?id=
Source: analytics[1].js.2.dr String found in binary or memory: https://www.google.%/ads/ga-audiences
Source: gtm[1].js.2.dr String found in binary or memory: https://www.google.com
Source: magazine[1].js.2.dr String found in binary or memory: https://www.google.com/recaptcha/api.js?onload=
Source: gtm[1].js.2.dr String found in binary or memory: https://www.googletagmanager.com/debug/bootstrap
Source: analytics[1].js.2.dr String found in binary or memory: https://www.googletagmanager.com/gtag/js?id=
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com//static/locale/en.js?_=5.1.6.0
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/WebService/getThumbnailSocial.php?mID=2420210&spread=0&1614889819
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/WebService/getThumbnailSocial.php?mID=2420210&spread=0&width=500&161
Source: manifest.8e10809dba1c553a5a2a[1].js.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/favicon.ico
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/main.2813cfbe59a2f8c75923.js
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/manifest.8e10809dba1c553a5a2a.js
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/normalize.d0dfb984f88d0dbb9fde.js
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/styles/main.867208e99122488d74f9a620279f9cd9.css
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/mobile/viewer/vendor.7bc4df7aaac8424047c3.js
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/Frontend/pixel/joomag-pixel.3df7f73f177625835141.js
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/res_mag/logos/2420210.PNG?1614882780
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/static/css/html5-viewer-external.css?_=5.1.6.0
Source: 0291789001614882763[1].htm.2.dr String found in binary or memory: https://www.joomag.com/static/js/magazine.js?_=5.1.6.0
Source: magazine[1].js.2.dr String found in binary or memory: https://www.youtube.com/embed/
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49782
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49781
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49781 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49769 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49778
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49770
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49769
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49768
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49764
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49764 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49770 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49778 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49782 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49768 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49720 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.194.217:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.194.217:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.15.154:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.15.154:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 107.182.226.40:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 107.182.226.40:443 -> 192.168.2.4:49744 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.22.227:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.22.227:443 -> 192.168.2.4:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.25:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.25:443 -> 192.168.2.4:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 209.95.50.27:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 92.38.171.82:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 92.38.171.82:443 -> 192.168.2.4:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49781 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49782 version: TLS 1.2
Source: classification engine Classification label: mal80.phis.win@3/59@19/8
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7E770D03-7D33-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF9697AB0B8A418A42.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3492 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3492 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Windows\SysWOW64\Macromed\Flash\ss.cfg Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 363595 URL: https://joom.ag/jSeI Startdate: 04/03/2021 Architecture: WINDOWS Score: 80 15 www.joomag.com 2->15 17 lb.joomag.com 2->17 25 Antivirus detection for URL or domain 2->25 27 Antivirus / Scanner detection for submitted sample 2->27 29 Phishing site detected (based on shot template match) 2->29 31 2 other signatures 2->31 7 iexplore.exe 5 51 2->7         started        signatures3 process4 process5 9 iexplore.exe 5 124 7->9         started        dnsIp6 19 s9.joomag.com 107.182.226.40, 443, 49744, 49745 HOSTINGSERVICES-INCUS United States 9->19 21 an3.joomag.com 209.95.50.25, 443, 49757, 49758 HOSTINGSERVICES-INCUS United States 9->21 23 19 other IPs or domains 9->23 13 C:\Users\user\AppData\Local\...\adobe[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
108.177.15.154
stats.l.doubleclick.net United States
15169 GOOGLEUS false
209.95.50.25
an3.joomag.com United States
32780 HOSTINGSERVICES-INCUS false
151.101.194.217
browser.sentry-cdn.com United States
54113 FASTLYUS false
92.38.171.82
calfvessel.com Austria
202422 GHOSTRU false
172.217.22.227
www.google.co.uk United States
15169 GOOGLEUS false
104.16.18.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false
209.95.50.27
lb.joomag.com United States
32780 HOSTINGSERVICES-INCUS false
107.182.226.40
s9.joomag.com United States
32780 HOSTINGSERVICES-INCUS false

Contacted Domains

Name IP Active
lb.joomag.com 209.95.50.27 true
browser.sentry-cdn.com 151.101.194.217 true
stats.l.doubleclick.net 108.177.15.154 true
cdnjs.cloudflare.com 104.16.18.94 true
www.google.co.uk 172.217.22.227 true
calfvessel.com 92.38.171.82 true
s9.joomag.com 107.182.226.40 true
an3.joomag.com 209.95.50.25 true
joom.ag 209.95.50.27 true
www.joomag.com unknown unknown
use.typekit.net unknown unknown
ka-f.fontawesome.com unknown unknown
kit.fontawesome.com unknown unknown
js-agent.newrelic.com unknown unknown
maxcdn.bootstrapcdn.com unknown unknown
s9cdn.joomag.com unknown unknown
stats.g.doubleclick.net unknown unknown
p.typekit.net unknown unknown
code.jquery.com unknown unknown
view.joomag.com unknown unknown
bam-cell.nr-data.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://view.joomag.com/sharefile/0291789001614882763?short& false
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
high
https://calfvessel.com/file/adobe/ true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown