Loading ...

Play interactive tourEdit tour

Analysis Report https://pcparch.bubbleapps.io/version-test?debug_mode=true

Overview

General Information

Sample URL:https://pcparch.bubbleapps.io/version-test?debug_mode=true
Analysis ID:289307

Most interesting Screenshot:

Detection

HTMLPhisher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish_10
Yara detected HtmlPhish_20
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
Form action URLs do not match main URL
HTML body contains low number of good links
HTML title does not match URL
Use of embedded images (data:image)
Yara signature match

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 5752 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6728 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5752 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\index[1].htmSUSP_Base64_Encoded_Hex_Encoded_CodeDetects hex encoded code that has been base64 encodedFlorian Roth
  • 0x461a:$x1: 78 34 4E 6A 4E 63 65 44 63 31 58 48 67
  • 0x462a:$x1: 78 34 4E 6A 56 63 65 44 5A 6C 58 48 67
  • 0x463a:$x1: 78 34 4E 44 56 63 65 44 5A 6A 58 48 67
  • 0x464a:$x1: 78 34 4E 6D 52 63 65 44 59 31 58 48 67
  • 0x466e:$x1: 78 34 4E 57 4A 63 65 44 56 6C 58 48 67
  • 0x467e:$x1: 78 34 4E 57 52 63 65 44 4A 69 58 48 67
  • 0x469e:$x1: 78 34 4E 57 56 63 65 44 49 77 58 48 67
  • 0x46ce:$x1: 78 34 4E 57 56 63 65 44 49 77 58 48 67
  • 0x46f2:$x1: 78 34 4E 7A 5A 63 65 44 59 78 58 48 67
  • 0x4702:$x1: 78 34 4E 6A 6C 63 65 44 59 30 58 48 67
  • 0x4712:$x1: 78 34 4E 6A 52 63 65 44 59 35 58 48 67
  • 0x4722:$x1: 78 34 4E 7A 52 63 65 44 59 78 58 48 67
  • 0x4746:$x1: 78 34 4E 47 5A 63 65 44 52 6C 58 48 67
  • 0x475a:$x1: 78 34 4E 6A 5A 63 65 44 59 35 58 48 67
  • 0x476a:$x1: 78 34 4E 6A 6C 63 65 44 63 7A 58 48 67
  • 0x477e:$x1: 78 34 4E 7A 42 63 65 44 63 31 58 48 67
  • 0x47a2:$x1: 78 34 4E 6A 56 63 65 44 59 78 58 48 67
  • 0x47b2:$x1: 78 34 4E 6A 56 63 65 44 51 31 58 48 67
  • 0x47c2:$x1: 78 34 4E 6A 56 63 65 44 5A 6B 58 48 67
  • 0x47f6:$x1: 78 34 4E 6A 56 63 65 44 4D 35 58 48 67
  • 0x4836:$x1: 78 34 4E 6A 4A 63 65 44 4D 31 58 48 67

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus detection for URL or domainShow sources
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlSlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish_10Show sources
Source: Yara matchFile source: 256723.0.links.csv, type: HTML
Yara detected HtmlPhish_20Show sources
Source: Yara matchFile source: 256723.0.links.csv, type: HTML
Phishing site detected (based on image similarity)Show sources
Source: https://storage.googleapis.com/aunabusable-182784719/Sign-in-to-your-account-doublelogin_files/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svgMatcher: Found strong image similarity, brand: MicrosoftJump to dropped file
Phishing site detected (based on logo template match)Show sources
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlMatcher: Template: microsoft matched
Source: https://bubble.io/?utm_source=app_mention&utm_content=pcparchHTTP Parser: Form action: https://tr.snapchat.com/cm/i bubble snapchat
Source: https://bubble.io/?utm_source=app_mention&utm_content=pcparchHTTP Parser: Form action: https://tr.snapchat.com/cm/i bubble snapchat
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Number of links: 0
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Number of links: 0
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Title: Sign in to your account does not match URL
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Title: Sign in to your account does not match URL
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Input: password
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: Input: password
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="author".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="author".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=pcparchHTTP Parser: No <meta name="author".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=pcparchHTTP Parser: No <meta name="author".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="copyright".. found
Source: https://storage.googleapis.com/aunabusable-182784719/index.htmlHTTP Parser: No <meta name="copyright".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=pcparchHTTP Parser: No <meta name="copyright".. found
Source: https://bubble.io/?utm_source=app_mention&utm_content=pcparchHTTP Parser: No <meta name="copyright".. found
Source: XGIPIHRU.htm.3.drString found in binary or memory: "https://www.facebook.com/bubblebuilder", equals www.facebook.com (Facebook)
Source: XGIPIHRU.htm.3.drString found in binary or memory: "https://www.linkedin.com/company/bubble-group-inc", equals www.linkedin.com (Linkedin)
Source: XGIPIHRU.htm.3.drString found in binary or memory: "https://www.facebook.com/bubblebuilder", equals www.facebook.com (Facebook)
Source: XGIPIHRU.htm.3.drString found in binary or memory: "https://www.linkedin.com/company/bubble-group-inc", equals www.linkedin.com (Linkedin)
Source: msapplication.xml1.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x942954f3,0x01d6922f</date><accdate>0x942954f3,0x01d6922f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml1.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x942954f3,0x01d6922f</date><accdate>0x942954f3,0x01d6922f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml6.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x942bb74e,0x01d6922f</date><accdate>0x942bb74e,0x01d6922f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml6.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x942bb74e,0x01d6922f</date><accdate>0x942bb74e,0x01d6922f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml8.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x943c67cf,0x01d6922f</date><accdate>0x943c67cf,0x01d6922f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml8.2.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x943c67cf,0x01d6922f</date><accdate>0x943c67cf,0x01d6922f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: pcparch.bubbleapps.io
Source: xfalse[1].js1.3.drString found in binary or memory: http://api.screenshotlayer.com/api/capture
Source: xfalse[1].css0.3.drString found in binary or memory: http://creativecommons.org/licenses/by/4.0/
Source: x8[1].js.3.drString found in binary or memory: http://feross.org
Source: xfalse[1].css0.3.drString found in binary or memory: http://fontawesome.io
Source: xfalse[1].css0.3.drString found in binary or memory: http://fontawesome.io/license
Source: xfalse[1].css0.3.drString found in binary or memory: http://ionicons.com/
Source: xfalse[1].js.3.drString found in binary or memory: http://jqueryui.com
Source: xfalse[1].css0.3.drString found in binary or memory: http://meyerweb.com/eric/tools/css/reset/
Source: qevents[1].js.3.drString found in binary or memory: http://opensource.org/licenses/BSD-2-Clause
Source: qevents[1].js.3.drString found in binary or memory: http://opensource.org/licenses/GPL-2.0
Source: popper[1].js.3.drString found in binary or memory: http://opensource.org/licenses/MIT).
Source: XGIPIHRU.htm.3.drString found in binary or memory: http://schema.org
Source: XGIPIHRU.htm.3.drString found in binary or memory: http://vocab.getty.edu/aat/300265431
Source: msapplication.xml.2.drString found in binary or memory: http://www.amazon.com/
Source: xfalse[1].js0.3.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: msapplication.xml2.2.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml3.2.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml4.2.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml5.2.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml6.2.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml7.2.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml8.2.drString found in binary or memory: http://www.youtube.com/
Source: xfalse[1].js1.3.drString found in binary or memory: https://accounts.google.com/o/oauth2/auth
Source: xfalse[1].js1.3.drString found in binary or memory: https://accounts.google.com/o/oauth2/token
Source: js[1].js.3.drString found in binary or memory: https://ade.googlesyndication.com/ddm/activity
Source: gtm[1].js.3.dr, js[2].js.3.drString found in binary or memory: https://adservice.google.com/ddm/regclk
Source: analytics[1].js.3.drString found in binary or memory: https://ampcid.google.com/v1/publisher:getClientId
Source: xfalse[1].js1.3.drString found in binary or memory: https://api.github.com/user
Source: xfalse[1].js1.3.drString found in binary or memory: https://api.github.com/user/emails
Source: f[1].txt.3.drString found in binary or memory: https://bid.g.doubleclick.net/xbbe/pixel?d=KAE
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://bomohsmtp.com/IW_gYT3DfRWR0zZiEDb_rHGZ_xMA5yFZRF4xSkVQsW9uNy_XzAwmtI8fbVN1TEh35B7me_XPqA/fin
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://bubble.io
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://bubble.io/
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://bubble.io/?utm_content=pcparch&amp;utm_source=app_mention
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://bubble.io/?utm_content=pcparch&utm_source=app_mention
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&uRoot
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utm_content=pcparch
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utm_content=pcparchVThe
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://bubble.io/?utm_source=app_mention&utm_content=pcparchl
Source: a012d639d84e8e4c3639a55e0fbad470[1].js.3.drString found in binary or memory: https://bubble.io/privacy
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://bubble.io1ef3ff057ae
Source: xfalse[1].js1.3.drString found in binary or memory: https://bubble.is
Source: xfalse[1].js1.3.drString found in binary or memory: https://cdn.segment.com/analytics.js/v1/
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://code.jquery.com/jquery-3.3.1.js
Source: a012d639d84e8e4c3639a55e0fbad470[1].js.3.drString found in binary or memory: https://consent.cookie-script.com/collect?action=
Source: imagestore.dat.3.dr, XGIPIHRU.htm.3.drString found in binary or memory: https://d1muf25xaso8hp.cloudfront.net/https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1530294839424
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://d1muf25xaso8hp.cloudfront.net/https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1534423790492
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272454677x357274544658139300/ionicons.eot
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272886250x158303603297099460/ionicons.eot
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272922381x868922997266054100/ionicons.ttf
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499272961822x801320437341928400/ionicons.woff
Source: xfalse[1].css0.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1499273020752x438600089401006700/ionicons.svg
Source: version-test[1].htm.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1530294839424x143528842134401200/Icon-no-clearspace.png
Source: imagestore.dat.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1530294839424x143528842134401200/Icon-no-clearspace.pngjP
Source: version-test[1].htm.3.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1578495816588x646815646347334700/Bubble%20Tags.png
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1599082039173x908982340046505300/rideshare-anim.svg
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://dd7tel2830j4w.cloudfront.net/f1599082105183x557970801967036160/marketplace-anim%20%281%29.sv
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/early_js/011d06d55963daa276fbc2d7cb971df7c3a2097a0fdd16
Source: version-test[1].htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_css/8837825c6afaf3597c555812e3ebcd563d14d53837ddc0b
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_css/90008dec19dfd8c4298c06aa6ad7719da3d3edf7d390f70
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_js/bdb0b2b65ea01289e109a967a33711cb13f8dd398f270ace
Source: version-test[1].htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_js_page/04f20a3887ba6865883839aa6258883801f9694a016
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://dhtiece9044ep.cloudfront.net/package/run_js_page/bac8d37d1f02505a6e891dc585ed341b608e169f480
Source: x8[1].js.3.drString found in binary or memory: https://feross.org
Source: free-fa-regular-400[1].eot.3.dr, free-v4-shims[1].css.3.dr, free.min[1].css.3.drString found in binary or memory: https://fontawesome.com
Source: free-v4-shims[1].css.3.drString found in binary or memory: https://fontawesome.com/license/free
Source: free-fa-regular-400[1].eot.3.dr, free-fa-solid-900[1].eot.3.drString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: css[2].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v11/tss0ApVBdCYD5Q7hcxTE1ArZ0bb-iXxi2g.woff2)
Source: css[2].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v11/tss0ApVBdCYD5Q7hcxTE1ArZ0bb_iXxi2g.woff2)
Source: css[2].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v11/tss0ApVBdCYD5Q7hcxTE1ArZ0bbwiXw.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHpv4kjgoGqM7E_DMs_.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E30-8s51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E3_-gs51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E3q-0s51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHqv4kjgoGqM7E3t-4s51oq.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/barlow/v5/7cHrv4kjgoGqM7E_Cfs7wHk.woff)
Source: css[3].css.3.drString found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6uyw4BMUTPHjx4wWA.woff)
Source: bootstrap[1].css.3.dr, bootstrap[1].js.3.drString found in binary or memory: https://getbootstrap.com)
Source: xfalse[1].css0.3.drString found in binary or memory: https://github.com/driftyco/ionicons
Source: xfalse[1].css0.3.drString found in binary or memory: https://github.com/google/material-design-icons
Source: gtm[1].js.3.drString found in binary or memory: https://github.com/krux/postscribe/blob/master/LICENSE.
Source: xfalse[1].js1.3.drString found in binary or memory: https://github.com/login/oauth/access_token
Source: xfalse[1].js1.3.drString found in binary or memory: https://github.com/login/oauth/authorize
Source: xfalse[1].js1.3.drString found in binary or memory: https://github.com/syntaqx/pass-meter
Source: bootstrap[1].css.3.dr, bootstrap[1].js.3.drString found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap[1].js.3.drString found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: 585b051251[1].js.3.drString found in binary or memory: https://kit-free.fontawesome.com
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0//fonts/fontawesome-webfont.eot?#iefix&v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.eot?v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.svg?v=4.7.0#fontawesome
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.ttf?v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.woff2?v=4.7.0
Source: xfalse[1].css0.3.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.woff?v=4.7.0
Source: gtm[1].js.3.dr, js[2].js.3.drString found in binary or memory: https://pagead2.googlesyndication.com
Source: js[1].js.3.drString found in binary or memory: https://pagead2.googlesyndication.com/
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://pcparch.bubbleapps.io/
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://pcparch.bubbleapps.io/version-test
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://pcparch.bubbleapps.io/version-testRoot
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://pcparch.bubbleapps.io/version-testv
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://portal.office.com
Source: xfalse[1].js1.3.drString found in binary or memory: https://raw.githubusercontent.com/stefanpenner/es6-promise/master/LICENSE
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://s3.amazonaws.com/appforest_uf/f1530294839424x143528842134401200/Icon-no-clearspace.png
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://s3.amazonaws.com/appforest_uf/f1578495816588x646815646347334700/Bubble%20Tags.png
Source: gtm[1].js.3.drString found in binary or memory: https://sc-static.net/scevent.min.js
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://signup.live.com/signup?ru=https%3a%2f%2flogin.live.com%2foauth20_authorize.srf%3flc%3d1033%2
Source: banner-icon[1].svg.3.drString found in binary or memory: https://sketch.com
Source: xfalse[1].js1.3.drString found in binary or memory: https://static.addtoany.com/menu/page.js
Source: analytics[1].js.3.drString found in binary or memory: https://stats.g.doubleclick.net/j/collect
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.google
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html.Sign
Source: ~DF126BECABAB418BE4.TMP.2.dr, {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.googleapis.com/aunabusable-182784719/index.html~https://storage.googleapis.com/aunab
Source: imagestore.dat.3.drString found in binary or memory: https://storage.googleapis.com/favicon.icoR
Source: {BC669D88-FE22-11EA-90E2-ECF4BB862DED}.dat.2.drString found in binary or memory: https://storage.googleapps.io/version-testv
Source: ~DF126BECABAB418BE4.TMP.2.drString found in binary or memory: https://tr.snapchat.com/cm/i?pid=7b2740e3-28a5-4116-bb98-c1ef3ff057ae
Source: xfalse[1].js1.3.drString found in binary or memory: https://translation.googleapis.com/language/translate/v2
Source: xfalse[1].js1.3.drString found in binary or memory: https://translation.googleapis.com/language/translate/v2/detect
Source: xfalse[1].css0.3.drString found in binary or memory: https://twitter.com/benjsperry
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://twitter.com/bubble
Source: xfalse[1].css0.3.drString found in binary or memory: https://twitter.com/ionicframework
Source: xfalse[1].js1.3.drString found in binary or memory: https://www.addtoany.com/share_save
Source: js[1].js.3.drString found in binary or memory: https://www.google-analytics.com/analytics.js
Source: analytics[1].js.3.drString found in binary or memory: https://www.google-analytics.com/gtm/js?id=
Source: analytics[1].js.3.drString found in binary or memory: https://www.google.%/ads/ga-audiences
Source: gtm[1].js.3.dr, js[2].js.3.dr, js[1].js.3.drString found in binary or memory: https://www.google.com
Source: js[1].js.3.drString found in binary or memory: https://www.google.com/travel/flights/click/conversion/
Source: xfalse[1].js1.3.drString found in binary or memory: https://www.googleapis.com
Source: xfalse[1].js1.3.drString found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: xfalse[1].js1.3.drString found in binary or memory: https://www.googleapis.com/auth/userinfo.profile
Source: analytics[1].js.3.drString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=
Source: js[1].js.3.drString found in binary or memory: https://www.googletraveladservices.com/travel/clk/pagead/conversion/
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://www.instagram.com/bubble__hq
Source: jquery[1].js.3.drString found in binary or memory: https://www.jsdelivr.com/using-sri-with-dynamic-files
Source: XGIPIHRU.htm.3.drString found in binary or memory: https://www.linkedin.com/company/bubble-group-inc
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\index[1].htm, type: DROPPEDMatched rule: SUSP_Base64_Encoded_Hex_Encoded_Code date = 2019-04-29, author = Florian Roth, description = Detects hex encoded code that has been base64 encoded, score = https://www.nextron-systems.com/2019/04/29/spotlight-threat-hunting-yara-rule-example/
Source: classification engineClassification label: mal72.phis.win@3/124@23/23
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\LowJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5752 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5752 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.