top title background image
flash

https://bakrisoil.com/wp-content/cd.php?e=gjeffries@hughesellard.com

Status: finished
Submission Time: 2020-11-20 17:05:40 +01:00
Malicious
Phishing
Phisher

Comments

Tags

Details

  • Analysis ID:
    321242
  • API (Web) ID:
    544288
  • Analysis Started:
    2020-11-20 17:05:41 +01:00
  • Analysis Finished:
    2020-11-20 17:08:22 +01:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 72
Error: Incomplete analysis, please check the report for detailed error information
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 5/82
malicious

IPs

IP Country Detection
66.96.149.32
United States
104.218.51.229
United States

Domains

Name IP Detection
bakrisoil.com
66.96.149.32
hospitalpicks.com
104.218.51.229

URLs

Name Detection
https://bakrisoil.com/
https://hospitalpicks.com/vm/index.html#gjeffries
https://bakrisoil.com/wp-content/cd.php?e=gjeffries
Click to see the 2 hidden entries
https://bakrisoilcom/vm/index.html#gjeffries
https://bakrisoilwp-content/cd.php?e=gjeffries

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cd[1].htm
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5702468A-2B4A-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5702468C-2B4A-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5702468D-2B4A-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\background_gradient[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\httpErrorPagesScripts[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\bullet[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\http_404[1]
HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\errorPageStrings[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\ErrorPageTemplate[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\info_48[1]
PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\~DF1BC5B961A0D11AC7.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF240D9F52873C5C2B.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFB0837B9923C992D7.TMP
data
#