top title background image
flash

https://u14434959.ct.sendgrid.net/ls/click?upn=RoH6YjBva3fqR05e7CWs9jU8zveKwLp59mrXHeMg-2F7be5DhYcCKSNupKsMAJ3mBnePN1JJIytMKGmbQsBMaCeBnQu39YSuay8MEztJK8DYmiNEMdK7Vp-2BnPeb7cIE4gSigsTu3D-2B-2BHDQYsuhiR22PneHY6ehRakWiNThlNssrIMl-2FHXVJjXUsZiyHuagSjeYvgS9_surlT6tjxMO4sUs3XBofmBE3-2FpQsLFabbIHq7dY9YGZKSseWj80vI1naSZ-2FLedYi6Hzgp51QX5y5Q6JQzos9Mffq4t7-2Fj1VEJXOr2loNPMzqwRKPy0MG3snflYU-2BPQSISzxEUdyPND4xurfoSXdSmqsonkSJ0Yi3rMh8wk2VE5vG79xJcM9Ekg8Xa6CG8blUia2ZE3qYaHqBJD8Getg22K2py6prwBIxve-2BNIbxqj3M-3D

Status: finished
Submission Time: 2020-05-28 16:52:19 +02:00
Malicious

Comments

Tags

Details

  • Analysis ID:
    233903
  • API (Web) ID:
    363957
  • Analysis Started:
    2020-05-28 16:52:19 +02:00
  • Analysis Finished:
    2020-05-28 16:56:58 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 56
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
malicious

IPs

IP Country Detection
167.89.123.16
United States
88.198.36.203
Germany

Domains

Name IP Detection
u14434959.ct.sendgrid.net
167.89.123.16
psilikomania.gr
88.198.36.203
site-cdn.onenote.net
0.0.0.0

URLs

Name Detection
https://psilikomania.gr//cvda/cgn-in/login.php?l=_JeHFUq_VJOXK0QWHtoGYDw_Product-UserID&userid=marke
https://psilikomania.gr//cvda/cgn-in/login_files/logo.png
https://psilikomania.gr//cvda/cgn-in/ogin.php?l=_JeHFUq_VJOXK0QWHtoGYDw_Product-UserID&userid=market
Click to see the 9 hidden entries
http://www.wikipedia.com/
http://www.amazon.com/
http://www.nytimes.com/
http://www.live.com/
https://r//cvda/cgn-in/ogin.php?l=_JeHFUq_VJOXK0QWHtoGYDw_Product-UserID&userid=marketing
http://www.reddit.com/
http://www.twitter.com/
http://www.youtube.com/
https://psilikomania.g

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\r1ckxmj\imagestore.dat
data
#
C:\Users\user\AppData\Local\Temp\~DFF66DF038A9117FA4.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF5229404B924C9629.TMP
data
#
Click to see the 23 hidden entries
C:\Users\user\AppData\Local\Temp\~DF1068F03EAA002458.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W2BICE6W\loginAdvanced[1].css
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W2BICE6W\cgn-in[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T7L7U67X\top[1].png
PNG image data, 304 x 15, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T7L7U67X\loginBasic[1].css
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\login[1].htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KGYEP10B\bottom[1].png
PNG image data, 304 x 15, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HNHL2TDR\middle[1].png
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HNHL2TDR\logo[1].png
PNG image data, 45 x 45, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HNHL2TDR\background[1].png
HTML document, ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{533C8912-A13E-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{533C8915-A13E-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{533C8914-A13E-11EA-AAE5-44C1B3FB757B}.dat
Microsoft Word Document
#