Loading ...

Play interactive tourEdit tour

Analysis Report https://metalloidcorp.bubbleapps.io/version-test?debug_mode=true

Overview

General Information

Sample URL:https://metalloidcorp.bubbleapps.io/version-test?debug_mode=true
Analysis ID:289304

Most interesting Screenshot:

Detection

HTMLPhisher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish_10
Yara detected HtmlPhish_20
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
Form action URLs do not match main URL
HTML body contains low number of good links
HTML title does not match URL
Use of embedded images (data:image)
Yara signature match

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 6924 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4520 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6924 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\index[1].htmSUSP_Base64_Encoded_Hex_Encoded_CodeDetects hex encoded code that has been base64 encodedFlorian Roth
  • 0x461a:$x1: 78 34 4E 6A 4E 63 65 44 63 31 58 48 67
  • 0x462a:$x1: 78 34 4E 6A 56 63 65 44 5A 6C 58 48 67
  • 0x463a:$x1: 78 34 4E 44 56 63 65 44 5A 6A 58 48 67
  • 0x464a:$x1: 78 34 4E 6D 52 63 65 44 59 31 58 48 67
  • 0x466e:$x1: 78 34 4E 57 4A 63 65 44 56 6C 58 48 67
  • 0x467e:$x1: 78 34 4E 57 52 63 65 44 4A 69 58 48 67
  • 0x469e:$x1: 78 34 4E 57 56 63 65 44 49 77 58 48 67
  • 0x46ce:$x1: 78 34 4E 57 56 63 65 44 49 77 58 48 67
  • 0x46f2:$x1: 78 34 4E 7A 5A 63 65 44 59 78 58 48 67
  • 0x4702:$x1: 78 34 4E 6A 6C 63 65 44 59 30 58 48 67
  • 0x4712:$x1: 78 34 4E 6A 52 63 65 44 59 35 58 48 67
  • 0x4722:$x1: 78 34 4E 7A 52 63 65 44 59 78 58 48 67
  • 0x4746:$x1: 78 34 4E 47 5A 63 65 44 52 6C 58 48 67
  • 0x475a:$x1: 78 34 4E 6A 5A 63 65 44 59 35 58 48 67
  • 0x476a:$x1: 78 34 4E 6A 6C 63 65 44 63 7A 58 48 67
  • 0x477e:$x1: 78 34 4E 7A 42 63 65 44 63 31 58 48 67
  • 0x47a2:$x1: 78 34 4E 6A 56 63 65 44 59 78 58 48 67
  • 0x47b2:$x1: 78 34 4E 6A 56 63 65 44 51 31 58 48 67
  • 0x47c2:$x1: 78 34 4E 6A 56 63 65 44 5A 6B 58 48 67
  • 0x47f6:$x1: 78 34 4E 6A 56 63 65 44 4D 35 58 48 67
  • 0x4836:$x1: 78 34 4E 6A 4A 63 65 44 4D 31 58 48 67

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

Phishing:

barindex
Yara detected HtmlPhish_10Show sources
Source: Yara matchFile source: 211837.0.links.csv, type: HTML
Yara detected HtmlPhish_20Show sources
Source: Yara matchFile source: 211837.0.links.csv, type: HTML
Phishing site detected (based on image similarity)Show sources
Source: https://storage.googleapis.com/aunabusable-182784719/Sign-in-to-your-account-doublelogin_files/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svgMatcher: Found strong image similarity, brand: MicrosoftJump to dropped file
Phishing site detected (based on logo template match)Show sources
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlMatcher: Template: microsoft matched
Source: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpHTTP Parser: Form action: https://tr.snapchat.com/cm/i bubble snapchat
Source: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpHTTP Parser: Form action: https://tr.snapchat.com/cm/i bubble snapchat
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Number of links: 0
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Number of links: 0
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Title: Sign in to your account does not match URL
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Title: Sign in to your account does not match URL
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Input: password
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Input: password
Source: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpHTTP Parser: No <meta name="author".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpHTTP Parser: No <meta name="author".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="author".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="author".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpHTTP Parser: No <meta name="copyright".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpHTTP Parser: No <meta name="copyright".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="copyright".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="copyright".. found
Source: JY20TERA.htm.3.drString found in binary or memory: "https://www.facebook.com/bubblebuilder", equals www.facebook.com (Facebook)
Source: JY20TERA.htm.3.drString found in binary or memory: "https://www.linkedin.com/company/bubble-group-inc", equals www.linkedin.com (Linkedin)
Source: JY20TERA.htm.3.drString found in binary or memory: "https://www.facebook.com/bubblebuilder", equals www.facebook.com (Facebook)
Source: JY20TERA.htm.3.drString found in binary or memory: "https://www.linkedin.com/company/bubble-group-inc", equals www.linkedin.com (Linkedin)
Source: msapplication.xml1.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x9d872c65,0x01d6922e</date><accdate>0x9d872c65,0x01d6922e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml1.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x9d872c65,0x01d6922e</date><accdate>0x9d872c65,0x01d6922e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml6.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x9dafb42d,0x01d6922e</date><accdate>0x9dafb42d,0x01d6922e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml6.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x9dafb42d,0x01d6922e</date><accdate>0x9db21688,0x01d6922e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml8.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x9db21688,0x01d6922e</date><accdate>0x9db21688,0x01d6922e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml8.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x9db21688,0x01d6922e</date><accdate>0x9db21688,0x01d6922e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: metalloidcorp.bubbleapps.io
Source: xfalse[1].js0.3.drString found in binary or memory: http://api.screenshotlayer.com/api/capture
Source: xfalse[1].css0.3.drString found in binary or memory: http://creativecommons.org/licenses/by/4.0/
Source: x8[1].js.3.drString found in binary or memory: http://feross.org
Source: xfalse[1].css0.3.drString found in binary or memory: http://fontawesome.io
Source: xfalse[1].css0.3.drString found in binary or memory: http://fontawesome.io/license
Source: xfalse[1].css0.3.drString found in binary or memory: http://ionicons.com/
Source: xfalse[2].js.3.drString found in binary or memory: http://jqueryui.com
Source: xfalse[1].css0.3.drString found in binary or memory: http://meyerweb.com/eric/tools/css/reset/
Source: qevents[1].js.3.drString found in binary or memory: http://opensource.org/licenses/BSD-2-Clause
Source: qevents[1].js.3.drString found in binary or memory: http://opensource.org/licenses/GPL-2.0
Source: popper[1].js.3.drString found in binary or memory: http://opensource.org/licenses/MIT).
Source: JY20TERA.htm.3.drString found in binary or memory: http://schema.org
Source: JY20TERA.htm.3.drString found in binary or memory: http://vocab.getty.edu/aat/300265431
Source: msapplication.xml.2.drString found in binary or memory: http://www.amazon.com/
Source: xfalse[1].js.3.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: msapplication.xml2.2.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml3.2.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml4.2.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml5.2.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml6.2.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml7.2.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml8.2.drString found in binary or memory: http://www.youtube.com/
Source: xfalse[1].js0.3.drString found in binary or memory: https://accounts.google.com/o/oauth2/auth
Source: xfalse[1].js0.3.drString found in binary or memory: https://accounts.google.com/o/oauth2/token
Source: js[1].js.3.drString found in binary or memory: https://ade.googlesyndication.com/ddm/activity
Source: gtm[1].js.3.dr, js[1].js.3.drString found in binary or memory: https://adservice.google.com/ddm/regclk
Source: analytics[1].js.3.drString found in binary or memory: https://ampcid.google.com/v1/publisher:getClientId
Source: xfalse[1].js0.3.drString found in binary or memory: https://api.github.com/user
Source: xfalse[1].js0.3.drString found in binary or memory: https://api.github.com/user/emails
Source: f[1].txt.3.drString found in binary or memory: https://bid.g.doubleclick.net/xbbe/pixel?d=KAE
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bomohsmtp.com/IW_gYT3DfRWR0zZiEDb_rHGZ_xMA5yFZRF4xSkVQsW9uNy_XzAwmtI8fbVN1TEh35B7me_XPqA/fin
Source: JY20TERA.htm.3.drString found in binary or memory: https://bubble.io
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm
Source: JY20TERA.htm.3.drString found in binary or memory: https://bubble.io/?utm_content=metalloidcorp&amp;utm_source=app_mention
Source: JY20TERA.htm.3.drString found in binary or memory: https://bubble.io/?utm_content=metalloidcorp&utm_source=app_mention
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utRoot
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utcontent=metalloidcorp
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utm_Root
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.dr, ~DF25F25DD82534995A.TMP.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorp
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utm_content=metalloidcorpVThe
Source: a012d639d84e8e4c3639a55e0fbad470[1].js.3.drString found in binary or memory: https://bubble.io/privacy
Source: xfalse[1].js0.3.drString found in binary or memory: https://bubble.is
Source: xfalse[1].js0.3.drString found in binary or memory: https://cdn.segment.com/analytics.js/v1/
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://code.jquery.com/jquery-3.3.1.js
Source: a012d639d84e8e4c3639a55e0fbad470[1].js.3.drString found in binary or memory: https://consent.cookie-script.com/collect?action=
Source: imagestore.dat.3.dr, JY20TERA.htm.3.drString found in binary or memory: https://d1muf25xaso8hp.cloudfront.net/https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1530294839424
Source: JY20TERA.htm.3.drString found in binary or memory: https://d1muf25xaso8hp.cloudfront.net/https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1534423790492
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272454677x357274544658139300/ionicons.eot
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272886250x158303603297099460/ionicons.eot
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272922381x868922997266054100/ionicons.ttf
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272961822x801320437341928400/ionicons.woff
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499273020752x438600089401006700/ionicons.svg
Source: version-test[1].htm.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1530294839424x143528842134401200/Icon-no-clearspace.png
Source: imagestore.dat.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1530294839424x143528842134401200/Icon-no-clearspace.pngjP
Source: version-test[1].htm.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1578495816588x646815646347334700/Bubble%20Tags.png
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1599082105183x557970801967036160/marketplace-anim%20%281%29.sv
Source: version-test[1].htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/early_js/011d06d55963daa276fbc2d7cb971df7c3a2097a0fdd16
Source: version-test[1].htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_css/8837825c6afaf3597c555812e3ebcd563d14d53837ddc0b
Source: JY20TERA.htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_css/90008dec19dfd8c4298c06aa6ad7719da3d3edf7d390f70
Source: version-test[1].htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_js/bdb0b2b65ea01289e109a967a33711cb13f8dd398f270ace
Source: version-test[1].htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_js_page/71a37fa7294eb6603d2115ad62d772bfcbefd425bdc
Source: JY20TERA.htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_js_page/bac8d37d1f02505a6e891dc585ed341b608e169f480
Source: x8[1].js.3.drString found in binary or memory: https://feross.org
Source: free-fa-regular-400[1].eot.3.dr, free-v4-shims[1].css.3.dr, free.min[1].css.3.drString found in binary or memory: https://fontawesome.com
Source: free-v4-shims[1].css.3.drString found in binary or memory: https://fontawesome.com/license/free
Source: free-fa-regular-400[1].eot.3.dr, free-fa-solid-900[1].eot.3.drString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: css[1].css0.3.drString found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v11/tss0ApVBdCYD5Q7hcxTE1ArZ0bb-iXxi2g.woff2)
Source: css[1].css0.3.drString found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v11/tss0ApVBdCYD5Q7hcxTE1ArZ0bb_iXxi2g.woff2)
Source: css[1].css0.3.drString found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v11/tss0ApVBdCYD5Q7hcxTE1ArZ0bbwiXw.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHpv4kjgoGqM7E_DMs_.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E30-8s51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E3_-gs51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E3q-0s51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E3t-4s51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHrv4kjgoGqM7E_Cfs7wHk.woff)
Source: css[1].css1.3.drString found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6uyw4BMUTPHjx4wWA.woff)
Source: bootstrap[1].css.3.dr, bootstrap[1].js.3.drString found in binary or memory: https://getbootstrap.com)
Source: xfalse[1].css0.3.drString found in binary or memory: https://github.com/driftyco/ionicons
Source: xfalse[1].css0.3.drString found in binary or memory: https://github.com/google/material-design-icons
Source: gtm[1].js.3.drString found in binary or memory: https://github.com/krux/postscribe/blob/master/LICENSE.
Source: xfalse[1].js0.3.drString found in binary or memory: https://github.com/login/oauth/access_token
Source: xfalse[1].js0.3.drString found in binary or memory: https://github.com/login/oauth/authorize
Source: xfalse[1].js0.3.drString found in binary or memory: https://github.com/syntaqx/pass-meter
Source: bootstrap[1].css.3.dr, bootstrap[1].js.3.drString found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap[1].js.3.drString found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: 585b051251[1].js.3.drString found in binary or memory: https://kit-free.fontawesome.com
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0//fonts/fontawesome-webfont.eot?#iefix&v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.eot?v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.svg?v=4.7.0#fontawesome
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.ttf?v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.woff2?v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.woff?v=4.7.0
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://metalloidcorp.bubbleapps.io/
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.dr, version-test[1].htm.3.drString found in binary or memory: https://metalloidcorp.bubbleapps.io/version-test
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://metalloidcorp.bubbleapps.io/version-testRoot
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://metalloidcorp.bubbleapps.io/version-test_source=app_mention&utm_content=idcorp.bubbleapps.io
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://metalloidcorp.bubbleapps.io/version-testapis.com/aunabusable-182784719/iidcorp.bubbleapps.io
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://metalloidcorp.bubbleapps.io/version-testidcorp.bubbleapps.io/
Source: gtm[1].js.3.dr, js[1].js.3.drString found in binary or memory: https://pagead2.googlesyndication.com
Source: js[1].js.3.drString found in binary or memory: https://pagead2.googlesyndication.com/
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://portal.office.com
Source: xfalse[1].js0.3.drString found in binary or memory: https://raw.githubusercontent.com/stefanpenner/es6-promise/master/LICENSE
Source: JY20TERA.htm.3.drString found in binary or memory: https://s3.amazonaws.com/appforest_uf/f1530294839424x143528842134401200/Icon-no-clearspace.png
Source: JY20TERA.htm.3.drString found in binary or memory: https://s3.amazonaws.com/appforest_uf/f1578495816588x646815646347334700/Bubble%20Tags.png
Source: gtm[1].js.3.drString found in binary or memory: https://sc-static.net/scevent.min.js
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://signup.live.com/signup?ru=https%3a%2f%2flogin.live.com%2foauth20_authorize.srf%3flc%3d1033%2
Source: banner-icon[1].svg.3.drString found in binary or memory: https://sketch.com
Source: xfalse[1].js0.3.drString found in binary or memory: https://static.addtoany.com/menu/page.js
Source: analytics[1].js.3.drString found in binary or memory: https://stats.g.doubleclick.net/j/collect
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.google
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.dr, ~DF25F25DD82534995A.TMP.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html.Sign
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html~https://storaRoot
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html~https://storage.googleapis.com/aunab
Source: imagestore.dat.3.drString found in binary or memory: https://storage.googleapis.com/favicon.icoR
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.googlebubbleapps.io/version-test
Source: {C692098E-FE21-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://tr.snapchat.com/cm/i?pid=7b2740e3-28a5-4116-bb98-c1ef3ff057ae
Source: xfalse[1].js0.3.drString found in binary or memory: https://translation.googleapis.com/language/translate/v2
Source: xfalse[1].js0.3.drString found in binary or memory: https://translation.googleapis.com/language/translate/v2/detect
Source: xfalse[1].css0.3.drString found in binary or memory: https://twitter.com/benjsperry
Source: JY20TERA.htm.3.drString found in binary or memory: https://twitter.com/bubble
Source: xfalse[1].css0.3.drString found in binary or memory: https://twitter.com/ionicframework
Source: xfalse[1].js0.3.drString found in binary or memory: https://www.addtoany.com/share_save
Source: js[1].js.3.drString found in binary or memory: https://www.google-analytics.com/analytics.js
Source: analytics[1].js.3.drString found in binary or memory: https://www.google-analytics.com/gtm/js?id=
Source: analytics[1].js.3.drString found in binary or memory: https://www.google.%/ads/ga-audiences
Source: js[1].js.3.drString found in binary or memory: https://www.google.com
Source: js[1].js.3.drString found in binary or memory: https://www.google.com/travel/flights/click/conversion/
Source: xfalse[1].js0.3.drString found in binary or memory: https://www.googleapis.com
Source: xfalse[1].js0.3.drString found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: xfalse[1].js0.3.drString found in binary or memory: https://www.googleapis.com/auth/userinfo.profile
Source: analytics[1].js.3.drString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=
Source: js[1].js.3.drString found in binary or memory: https://www.googletraveladservices.com/travel/clk/pagead/conversion/
Source: JY20TERA.htm.3.drString found in binary or memory: https://www.instagram.com/bubble__hq
Source: jquery[1].js.3.drString found in binary or memory: https://www.jsdelivr.com/using-sri-with-dynamic-files
Source: JY20TERA.htm.3.drString found in binary or memory: https://www.linkedin.com/company/bubble-group-inc
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\index[1].htm, type: DROPPEDMatched rule: SUSP_Base64_Encoded_Hex_Encoded_Code date = 2019-04-29, author = Florian Roth, description = Detects hex encoded code that has been base64 encoded, score = https://www.nextron-systems.com/2019/04/29/spotlight-threat-hunting-yara-rule-example/
Source: classification engineClassification label: mal64.phis.win@3/124@23/24
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\LowJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6924 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6924 CREDAT:17410 /prefetch:2
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.