top title background image
flash

https://www.comdhab.be/wp-content/themes/excel-rd42/

Status: finished
Submission Time: 2020-08-12 14:26:58 +02:00
Malicious
Phishing
HTMLPhisher

Comments

Tags

Details

  • Analysis ID:
    262907
  • API (Web) ID:
    422453
  • Analysis Started:
    2020-08-12 14:30:55 +02:00
  • Analysis Finished:
    2020-08-12 14:36:44 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 48
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
89.234.180.33
France
151.139.128.8
United States
104.16.132.229
United States

Domains

Name IP Detection
kit-free.fontawesome.com
151.139.128.8
asf-ris-prod-neurope.northeurope.cloudapp.azure.com
168.63.67.155
comdhab.be
89.234.180.33
Click to see the 6 hidden entries
kit.fontawesome.com
151.139.128.8
cdnjs.cloudflare.com
104.16.132.229
stackpath.bootstrapcdn.com
0.0.0.0
code.jquery.com
0.0.0.0
maxcdn.bootstrapcdn.com
0.0.0.0
www.comdhab.be
0.0.0.0

URLs

Name Detection
http://www.live.com/
http://cert.int-x3.letsencrypt.org/09
https://github.com/twbs/bootstrap/graphs/contributors)
Click to see the 32 hidden entries
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
https://getbootstrap.com)
https://www.comdhab.be/wp-content/themes/excel-rd42/
http://www.youtube.com/
https://github.com/twbs/bootstrap/blob/master/LICENSE)
http://www.wikipedia.com/
https://fontawesome.com
http://opensource.org/licenses/MIT).
https://kit.fontawesome.com/585b051251.js
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
https://www.comdhab.be/wp-content/themes/excel-rd42/l
http://www.reddit.com/
http://cps.root-x1.letsencrypt.org
http://gmail.com/
http://cps.root-x1.letsencrypt.org0
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
http://cps.letsencrypt.org0
https://code.jquery.com/jquery-3.2.1.slim.min.js
http://cps.letsencrypt.orgm
https://code.jquery.com/jquery-3.1.1.min.js
http://ocsp.int-x3.letsencrypt.org0/
https://kit-free.fontawesome.com
http://cert.int-x3.letsencrypt.org/
http://www.amazon.com/
http://www.nytimes.com/
https://getbootstrap.com/)
http://www.twitter.com/
https://code.jquery.com/jquery-3.3.1.
https://code.jquery.com/jquery-3.3.1.js
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
http://cps.letsencrypt.org
https://fontawesome.com/license/free

Dropped files

Name File Type Hashes Detection
C:\Users\user\Desktop\download\index.html
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\bootstrap.min[1].js
ASCII text, with very long lines
#
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
#
Click to see the 24 hidden entries
C:\Users\user\AppData\Local\Temp\~DF98D8C642F07DCBB2.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF3979731A7DA870D6.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\popper.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bootstrap.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\jquery.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\jquery-3.2.1.slim.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\jquery-3.1.1.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\css[1].css
ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\bootstrap.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\free.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\free-v4-shims.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3FB554F7-DCE3-11EA-90E5-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\585b051251[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{3FB554F9-DCE3-11EA-90E5-ECF4BBEA1588}.dat
Microsoft Word Document
#