Windows Analysis Report http://covid-19.in.th/

Overview

General Information

Sample URL: http://covid-19.in.th/
Analysis ID: 451066
Infos:

Most interesting Screenshot:

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

No high impact signatures.

Classification

There are no high impact signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49730 version: TLS 1.2
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: covid-19.in.thConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /cdn-cgi/styles/main.css HTTP/1.1Accept: text/css, */*Referer: http://covid-19.in.th/Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: covid-19.in.thConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /cdn-cgi/bm/cv/669835187/api.js HTTP/1.1Accept: application/javascript, */*;q=0.8Referer: http://covid-19.in.th/Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: covid-19.in.thConnection: Keep-Alive
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: "http://www.facebook.com/cloudflare", equals www.facebook.com (Facebook)
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: "http://www.twitter.com/cloudflare", equals www.twitter.com (Twitter)
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: "http://www.youtube.com/user/CloudflareTeam" equals www.youtube.com (Youtube)
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: "https://www.linkedin.com/company/cloudflare", equals www.linkedin.com (Linkedin)
Source: unknown DNS traffic detected: queries for: covid-19.in.th
Source: unknown HTTP traffic detected: POST /cdn-cgi/bm/cv/result?req_id=6719d64d08990eb7 HTTP/1.1Accept: */*Content-Type: application/jsonReferer: http://covid-19.in.th/Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: covid-19.in.thContent-Length: 355Connection: Keep-AliveCache-Control: no-cache
Source: chunk-5d677ef1b4eeb74635d3[1].js.3.dr String found in binary or memory: http://api.jqueryui.com/category/ui-core/
Source: ~DF64BF8B4AEFB55D6C.TMP.2.dr String found in binary or memory: http://covid-19.in.th/
Source: ~DF64BF8B4AEFB55D6C.TMP.2.dr String found in binary or memory: http://covid-19.in.th/N
Source: {FBE078D1-E967-11EB-90E4-ECF4BB862DED}.dat.2.dr String found in binary or memory: http://covid-19.in.th/Root
Source: chunk-5d677ef1b4eeb74635d3[1].js.3.dr String found in binary or memory: http://getify.mit-license.org
Source: chunk-55d37f7935d3778f0709[1].js.3.dr String found in binary or memory: http://greensock.com
Source: chunk-55d37f7935d3778f0709[1].js.3.dr String found in binary or memory: http://greensock.com/standard-license
Source: chunk-5d677ef1b4eeb74635d3[1].js.3.dr String found in binary or memory: http://jquery.org/license
Source: chunk-5d677ef1b4eeb74635d3[1].js.3.dr String found in binary or memory: http://jqueryui.com
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: http://plus.google.com/
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: http://schema.org
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: http://schema.org/Article
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: http://www.cloudflare.com
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: http://www.twitter.com/cloudflare
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: http://www.youtube.com/user/CloudflareTeam
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/css/application-ee0728fba2.min.css
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-01f71c423e068664057e.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-06380521ff19239efe05.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-1560bda32b9d6d231e95.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-1c4da1169909c3c43069.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-232ffa51e57f882f0534.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-27eef9fa207b28718df2.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-3125ea56e87c986b133e.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-55ad6e1817237ece29a0.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-55d37f7935d3778f0709.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-5c6ec7c6f9d0b6f9dd57.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-5d677ef1b4eeb74635d3.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-5f991135348b5b16cb1b.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-962e1864decb73b3a75a.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-cc3c9c6363f24544e951.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-cd8895b507ee9e702e17.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-e06d79a8c06c0d46865a.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-e50bafad0559f7d0a0f0.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/chunk-e6a0177c9a8b595a3dd2.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://assets.www.cloudflare.com/js/runtime-6a16446847617098e330.js
Source: e34df59b-4a48-4bf9-b2b5-7a4bb09cd231[1].json.3.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/googleData.json
Source: e34df59b-4a48-4bf9-b2b5-7a4bb09cd231[1].json.3.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/iab2Data.json
Source: e34df59b-4a48-4bf9-b2b5-7a4bb09cd231[1].json.3.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/iabData.json
Source: e34df59b-4a48-4bf9-b2b5-7a4bb09cd231[1].json.3.dr String found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Source: api[1].js0.3.dr String found in binary or memory: https://github.com/antoinevastel/picasso-like-canvas-fingerprinting
Source: chunk-e6a0177c9a8b595a3dd2[1].js.3.dr String found in binary or memory: https://github.com/imakewebthings/waypoints/blob/master/licenses.txt
Source: chunk-5d677ef1b4eeb74635d3[1].js.3.dr String found in binary or memory: https://github.com/polygonplanet/weakmap-polyfill
Source: chunk-232ffa51e57f882f0534[1].js.3.dr String found in binary or memory: https://jquery.com/
Source: chunk-232ffa51e57f882f0534[1].js.3.dr String found in binary or memory: https://jquery.org/license
Source: chunk-232ffa51e57f882f0534[1].js.3.dr String found in binary or memory: https://js.foundation/
Source: chunk-232ffa51e57f882f0534[1].js.3.dr String found in binary or memory: https://sizzlejs.com/
Source: chunk-5d677ef1b4eeb74635d3[1].js.3.dr String found in binary or memory: https://vimeo.com/api/oembed.json?url=
Source: chunk-cd8895b507ee9e702e17[1].js.3.dr String found in binary or memory: https://www.cloudflare.com
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://www.cloudflare.com/5xx-error-landing/
Source: imagestore.dat.3.dr String found in binary or memory: https://www.cloudflare.com/favicon.ico
Source: imagestore.dat.3.dr String found in binary or memory: https://www.cloudflare.com/favicon.ico~
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://www.cloudflare.com/img/cf-facebook-card.png
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://www.cloudflare.com/img/cf-twitter-card.png
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://www.cloudflare.com/vendor/onetrust/scripttemplates/otSDKStub.js
Source: 5xx-error-landing[1].htm.3.dr String found in binary or memory: https://www.linkedin.com/company/cloudflare
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.124.96:443 -> 192.168.2.3:49730 version: TLS 1.2
Source: classification engine Classification label: clean0.win@3/56@4/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF57B235A356874BB7.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2396 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2396 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs