top title background image
flash

https://hosting-e899f.web.app/#ba11_go_coa_chf@emfa.pt

Status: finished
Submission Time: 2020-11-26 11:09:23 +01:00
Malicious
Phishing
HTMLPhisher

Comments

Tags

Details

  • Analysis ID:
    323112
  • API (Web) ID:
    548027
  • Analysis Started:
    2020-11-26 11:09:24 +01:00
  • Analysis Finished:
    2020-11-26 11:12:25 +01:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 84
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 9/82
malicious
malicious
malicious

IPs

IP Country Detection
151.101.1.195
United States
20.37.219.194
United States
104.16.18.94
United States

Domains

Name IP Detection
hosting-e899f.web.app
151.101.1.195
cdnjs.cloudflare.com
104.16.18.94
web.cytrack.com
20.37.219.194
Click to see the 4 hidden entries
stackpath.bootstrapcdn.com
0.0.0.0
code.jquery.com
0.0.0.0
cdn.jsdelivr.net
0.0.0.0
maxcdn.bootstrapcdn.com
0.0.0.0

URLs

Name Detection
https://hosting-e899f.web.app/#ba11_go_coa_chf@emfa.pt
https://hosting-e899f.web.app/
https://hosting-e899f.web.app/#ba11_go_coa_chf
Click to see the 18 hidden entries
http://fontawesome.io/license
https://code.jquery.com/jquery-3.3.1.min.js
https://getbootstrap.com/)
http://opensource.org/licenses/MIT).
https://github.com/twbs/bootstrap/blob/master/LICENSE)
http://getbootstrap.com)
https://cdn.jsdelivr.net/npm/sweetalert2
https://aogtechnics.cc/aa.php
https://stackpath.bootstrapcdn.com/bootstrap/4.1.0/js/bootstrap.min.js
https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
https://web.cytrack.com/wpv1/wp-content/uploads/microsoft-outlook-logo.jpg
https://code.jquery.com/jquery-migrate-3.1.0.min.js
https://github.com/twbs/bootstrap/graphs/contributors)
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/popper.min.js
http://fontawesome.io/license/
http://fontawesome.io

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\W3YTSHKB.htm
HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{914E1A29-2FCF-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{914E1A2B-2FCF-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9A14E6E9-2FCF-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\fontawesome-webfont[1].eot
Embedded OpenType (EOT), FontAwesome family
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\microsoft-outlook-logo[1].jpg
PNG image data, 1275 x 550, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\jquery-3.3.1.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\jquery-migrate-3.1.0.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\popper.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\sweetalert2@9[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bootstrap.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bootstrap.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\font-awesome.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Temp\~DFA016103DA3E62CDB.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFCEAC2B6E86150DAD.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFD904113CBEB3043B.TMP
data
#