top title background image
flash

https://cdn.discordapp.com/attachments/732845343078875181/742484743744127107/DHL_ARRIVAL_DOCUMENTS_NOTICE_pdf.img

Status: finished
Submission Time: 2020-08-11 12:19:28 +02:00
Malicious

Comments

Tags

Details

  • Analysis ID:
    261413
  • API (Web) ID:
    418390
  • Analysis Started:
    2020-08-11 12:20:51 +02:00
  • Analysis Finished:
    2020-08-11 12:26:43 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 48
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
162.159.135.233
United States

Domains

Name IP Detection
asf-ris-prod-neurope.northeurope.cloudapp.azure.com
168.63.67.155
cdn.discordapp.com
162.159.135.233

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E192CC03-DC07-11EA-90E0-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{E192CC05-DC07-11EA-90E0-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\DHL_ARRIVAL_DOCUMENTS_NOTICE_pdf[1].img
UDF filesystem data (version 1.5) 'DHL_ARRIVAL_DOCUMENTS_NOTICE_PDF'
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\DHL_ARRIVAL_DOCUMENTS_NOTICE_pdf.img.ppc5v5n.partial
UDF filesystem data (version 1.5) 'DHL_ARRIVAL_DOCUMENTS_NOTICE_PDF'
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\DHL_ARRIVAL_DOCUMENTS_NOTICE_pdf.img.ppc5v5n.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\DHL_ARRIVAL_DOCUMENTS_NOTICE_pdf.img:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF828873C06D1321CA.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFDE8BA811A0E00E5D.TMP
data
#