Analysis Report AccountStatements.html

Overview

General Information

Sample Name: AccountStatements.html
Analysis ID: 321119
MD5: c7f8f17bcf5d2656dd7f818969736342
SHA1: 4e2bf200592a5803b81eca7416ca514aae86188b
SHA256: 9df63134e160a49558a811b07b551c828dd733be30d970fee5f4656a8e7006ff

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish_10
HTML body contains low number of good links
HTML title does not match URL
JA3 SSL client fingerprint seen in connection with other malware
None HTTPS page querying sensitive user data (password, username or email)
Suspicious form URL found

Classification

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: AccountStatements.html, type: SAMPLE
HTML body contains low number of good links
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Number of links: 1
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Number of links: 1
HTML title does not match URL
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Title: Accounting - Invoicing System does not match URL
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Title: Accounting - Invoicing System does not match URL
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Has password / email / username input fields
Suspicious form URL found
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Form action: https://coco-fleur.net/hell/oracle.php
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: Form action: https://coco-fleur.net/hell/oracle.php
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/AccountStatements.html HTTP Parser: No <meta name="copyright".. found

Networking:

barindex
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: msapplication.xml0.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xfa035836,0x01d6bf72</date><accdate>0xfa035836,0x01d6bf72</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xfa035836,0x01d6bf72</date><accdate>0xfa035836,0x01d6bf72</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xfa081cf7,0x01d6bf72</date><accdate>0xfa081cf7,0x01d6bf72</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xfa081cf7,0x01d6bf72</date><accdate>0xfa081cf7,0x01d6bf72</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xfa0a7f3b,0x01d6bf72</date><accdate>0xfa0a7f3b,0x01d6bf72</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xfa0a7f3b,0x01d6bf72</date><accdate>0xfa0a7f3b,0x01d6bf72</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: atcocorp.okta.com
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://github.com/kriskowal/q/raw/master/LICENSE
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://jquery.com/
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://jquery.org/license
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://sizzlejs.com/
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://typingdna.com
Source: msapplication.xml.2.dr String found in binary or memory: http://www.amazon.com/
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.
Source: msapplication.xml1.2.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.2.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.2.dr String found in binary or memory: http://www.nytimes.com/
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: http://www.opensource.org/licenses/mit-license.html
Source: msapplication.xml4.2.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.2.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.2.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.2.dr String found in binary or memory: http://www.youtube.com/
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: https://api.typingdna.com/scripts/typingdna.js
Source: AccountStatements.html String found in binary or memory: https://atcocorp.okta.com/assets/js/mvc/loginpage/initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad
Source: AccountStatements.html String found in binary or memory: https://atcocorp.okta.com/assets/loginpage/css/okta-login-page.min.0f4b9922bfa70975cc884fea7cbd71fa.
Source: AccountStatements.html String found in binary or memory: https://coco-fleur.net/hell/oracle.php
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: https://github.com/gabceb
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: https://github.com/gabceb/jquery-browser-plugin
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: https://github.com/js-cookie/js-cookie
Source: AccountStatements.html String found in binary or memory: https://s.cafebazaar.ir/1/icons/com.adobe.reader_512x512.png
Source: AccountStatements.html String found in binary or memory: https://support.okta.com/help/articles/Knowledge_Article/24532952-Platforms---Browser-and-OS-Support
Source: initLoginPage.pack.34c59a55bb3a42c88a91a86c33d95ad4[1].js.3.dr String found in binary or memory: https://typingdna.com/scripts/typingdna.js
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: classification engine Classification label: mal48.phis.winHTML@3/20@2/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF4287DA41F4BBBE37.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5276 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5276 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 321119 Sample: AccountStatements.html Startdate: 20/11/2020 Architecture: WINDOWS Score: 48 17 Yara detected HtmlPhish_10 2->17 6 iexplore.exe 2 86 2->6         started        process3 process4 8 iexplore.exe 1 38 6->8         started        dnsIp5 11 b5d75f750c811003839a64fb243bafc0.cdn.cafebazaar.cloud 185.166.104.3, 443, 49713, 49714 CAFEBAZAARIR Iran (ISLAMIC Republic Of) 8->11 13 ok4-crtr-tls12-nlb-29367a8e4bb80716.elb.us-east-1.amazonaws.com 18.209.113.162, 443, 49715, 49716 AMAZON-AESUS United States 8->13 15 3 other IPs or domains 8->15
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
185.166.104.3
unknown Iran (ISLAMIC Republic Of)
202319 CAFEBAZAARIR false
18.209.113.162
unknown United States
14618 AMAZON-AESUS false

Contacted Domains

Name IP Active
ok4-crtr-tls12-nlb-29367a8e4bb80716.elb.us-east-1.amazonaws.com 18.209.113.162 true
b5d75f750c811003839a64fb243bafc0.cdn.cafebazaar.cloud 185.166.104.3 true
s.cafebazaar.ir unknown unknown
atcocorp.okta.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
file:///C:/Users/user/Desktop/AccountStatements.html true
    low