top title background image
flash

https://ciscomessagingportal.gq/authen?error=1#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f

Status: finished
Submission Time: 2021-05-13 01:17:05 +02:00
Malicious
Phishing
HTMLPhisher

Comments

Tags

Details

  • Analysis ID:
    412848
  • API (Web) ID:
    780456
  • Analysis Started:
    2021-05-13 01:20:01 +02:00
  • Analysis Finished:
    2021-05-13 01:23:54 +02:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious

IPs

IP Country Detection
162.0.237.234
Canada

Domains

Name IP Detection
ciscomessagingportal.gq
162.0.237.234

URLs

Name Detection
https://ciscomessagingportal.gq/#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f
https://ciscomessagingportal.gq/images/favicon.ico
http://www.wikipedia.com/
Click to see the 8 hidden entries
http://www.amazon.com/
https://ciscomessagingportal.gq/images/favicon.ico~
http://www.nytimes.com/
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
https://ciscomessagingportal.gq/#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover
http://www.youtube.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DFF7FAC163A929FC02.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFAC0AF7A12B20718B.TMP
data
#
Click to see the 17 hidden entries
C:\Users\user\AppData\Local\Temp\~DF0DA9C130E8F06E70.TMP
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\favicon[1].ico
MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\captcha[1].js
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\HXBTAIX6.htm
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\2134651[1].png
PNG image data, 355 x 142, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\dikxvqf\imagestore.dat
data
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1E0C7D3F-B3C4-11EB-90E5-ECF4BB570DC9}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1E0C7D42-B3C4-11EB-90E5-ECF4BB570DC9}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1E0C7D41-B3C4-11EB-90E5-ECF4BB570DC9}.dat
Microsoft Word Document
#