Analysis Report https://wayfairapp.onelink.me/2420802157?pid=Email&c=Triggered&af_sub5=AppEmailCA&af_dp=wayfairapp%3A%2F%2Fhome&af_web_dp=h%20ttp%3A%2F%2Fedubuddie.com/vsot/aK6hhbi8933Qq%2FVerizon&txid=B20200331_1488798683&lid=18207&tid=121811&vno=5&ltid=0

Overview

General Information

Sample URL: https://wayfairapp.onelink.me/2420802157?pid=Email&c=Triggered&af_sub5=AppEmailCA&af_dp=wayfairapp%3A%2F%2Fhome&af_web_dp=h%20ttp%3A%2F%2Fedubuddie.com/vsot/aK6hhbi8933Qq%2FVerizon&txid=B20200331_1488798683&lid=18207&tid=121811&vno=5&ltid=0
Analysis ID: 413040
Infos:

Most interesting Screenshot:

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

No high impact signatures.

Classification

There are no high impact signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 13.224.193.93:443 -> 192.168.2.3:49685 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.193.93:443 -> 192.168.2.3:49684 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.193.93:443 -> 192.168.2.3:49693 version: TLS 1.2
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xcad871ef,0x01d747fe</date><accdate>0xcad871ef,0x01d747fe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xcad871ef,0x01d747fe</date><accdate>0xcad871ef,0x01d747fe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xcadd36b4,0x01d747fe</date><accdate>0xcadd36b4,0x01d747fe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xcadd36b4,0x01d747fe</date><accdate>0xcadf98e6,0x01d747fe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xcadf98e6,0x01d747fe</date><accdate>0xcadf98e6,0x01d747fe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xcadf98e6,0x01d747fe</date><accdate>0xcadf98e6,0x01d747fe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: wayfairapp.onelink.me
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: imagestore.dat.2.dr String found in binary or memory: https://wayfairapp.onelink.me/favicon.ico
Source: ~DF58651D31E836AEEB.TMP.1.dr, {F550CFD1-B3F1-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://wayfairapp.onelink.me/h%20ttp://edubuddie.com/vsot/aK6hhbi8933Qq/Verizon?tid=121811&vno=5&tx
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49685
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49684
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49693
Source: unknown Network traffic detected: HTTP traffic on port 49693 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49685 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49684 -> 443
Source: unknown HTTPS traffic detected: 13.224.193.93:443 -> 192.168.2.3:49685 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.193.93:443 -> 192.168.2.3:49684 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.193.93:443 -> 192.168.2.3:49693 version: TLS 1.2
Source: classification engine Classification label: clean0.win@3/17@2/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF4ADEF8CDE444C23C.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5836 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5836 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 413040 URL: https://wayfairapp.onelink.... Startdate: 13/05/2021 Architecture: WINDOWS Score: 0 11 wayfairapp.onelink.me 2->11 6 iexplore.exe 2 84 2->6         started        process3 process4 8 iexplore.exe 2 31 6->8         started        dnsIp5 13 wayfairapp.onelink.me 13.224.193.93, 443, 49684, 49685 AMAZON-02US United States 8->13
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
13.224.193.93
wayfairapp.onelink.me United States
16509 AMAZON-02US false

Contacted Domains

Name IP Active
wayfairapp.onelink.me 13.224.193.93 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://wayfairapp.onelink.me/h%20ttp://edubuddie.com/vsot/aK6hhbi8933Qq/Verizon?tid=121811&vno=5&txid=B20200331_1488798683&lid=18207&c=Triggered&pid=Email&ltid=0&af_sub5=AppEmailCA false
    high