top title background image
flash

http://hallowed-glory-diabloceratops.glitch.me

Status: finished
Submission Time: 2021-02-23 14:50:53 +01:00
Malicious
Phishing
HTMLPhisher

Comments

Tags

Details

  • Analysis ID:
    356678
  • API (Web) ID:
    615343
  • Analysis Started:
    2021-02-23 14:53:26 +01:00
  • Analysis Finished:
    2021-02-23 14:57:28 +01:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 84
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious

IPs

IP Country Detection
54.237.41.217
United States
104.16.18.94
United States

Domains

Name IP Detection
hallowed-glory-diabloceratops.glitch.me
54.237.41.217
cdnjs.cloudflare.com
104.16.18.94
blobs.officehome.msocdn.com
0.0.0.0
Click to see the 4 hidden entries
ka-f.fontawesome.com
0.0.0.0
code.jquery.com
0.0.0.0
kit.fontawesome.com
0.0.0.0
maxcdn.bootstrapcdn.com
0.0.0.0

URLs

Name Detection
https://fontawesome.com
https://kit.fontawesome.com
https://github.com/twbs/bootstrap/graphs/contributors)
Click to see the 11 hidden entries
http://hallowed-glory-diabloceratops.glitch.me/
http://hallowed-glory-diabloceratops.glitch.me/css/hover.css
https://getbootstrap.com)
https://ka-f.fontawesome.com
https://blobs.officehome.msocdn.com/images/content/images/favicon-8f211ea639.ico
https://blobs.officehome.msocdn.com/images/content/images/favicon-8f211ea639.ico~
https://github.com/twbs/bootstrap/blob/master/LICENSE)
http://hallowed-glory-diabloceratops.glitch.me/
http://opensource.org/licenses/MIT).
http://hallowed-glory-diabloceratops.glitch.me/Root
https://fontawesome.com/license/free

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\jquery.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Temp\~DF9A8E2E2BC12913AE.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF5D450624F6D4AA94.TMP
data
#
Click to see the 18 hidden entries
C:\Users\user\AppData\Local\Temp\~DF5D086807AE3AB7AD.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\jquery.min[2].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\jquery.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\css[1].css
ASCII text
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\D3X1D35M.htm
HTML document, ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\free.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\bootstrap.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\bootstrap.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0F0DF444-762A-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\jquery-3.2.1.slim.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\favicon-8f211ea639[1].ico
MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\585b051251[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\popper.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\jquery-3.1.1.min[1].js
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\free-v4-shims.min[1].css
ASCII text, with very long lines
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\ynfz0jx\imagestore.dat
data
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{165545D7-762A-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{0F0DF446-762A-11EB-90E4-ECF4BB862DED}.dat
Microsoft Word Document
#