Analysis Report http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20=

Overview

General Information

Sample URL: http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20=
Analysis ID: 321258

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Source: http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= UrlScan: detection malicious, Label: phishing brand: onedrive Perma Link
Antivirus detection for URL or domain
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\myp0dplr1edpvg99v613ua80[1].htm, type: DROPPED
HTML body contains low number of good links
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: Number of links: 0
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: Title: Sign in to your account does not match URL
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: Title: Sign in to your account does not match URL
Invalid T&C link found
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: Invalid link: Terms of use
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: Invalid link: Terms of use
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: No <meta name="author".. found
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: No <meta name="author".. found
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: No <meta name="copyright".. found
Source: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP Parser: No <meta name="copyright".. found
Source: global traffic HTTP traffic detected: GET /asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: rwiqipwvnklaqkuu.ltiliqhting.comConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: rwiqipwvnklaqkuu.ltiliqhting.com
Source: ~DF8164221878F877A2.TMP.1.dr String found in binary or memory: http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20=
Source: {3E7062E8-2B9D-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20=Root
Source: myp0dplr1edpvg99v613ua80[1].htm.2.dr String found in binary or memory: https://aadcdn.msauthimages.net/c1c6b6c8-io4-zs4fy-s8uub0c-ziiztiuzc8njr-nhcgotapjss/logintenantbran
Source: SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20=[1].htm.2.dr String found in binary or memory: https://daabaaru.com/fax/document/?Jacqueline.Schrader
Source: imagestore.dat.2.dr String found in binary or memory: https://daabaaru.com/fax/document/lib/img/favicon.ico
Source: imagestore.dat.2.dr String found in binary or memory: https://daabaaru.com/fax/document/lib/img/favicon.ico~
Source: imagestore.dat.2.dr String found in binary or memory: https://daabaaru.com/fax/document/lib/img/favicon.ico~(
Source: ~DF8164221878F877A2.TMP.1.dr String found in binary or memory: https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1Z
Source: {3E7062E8-2B9D-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://daabaaru.com/fu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20=ax/document
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: classification engine Classification label: mal72.phis.win@3/15@4/3
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFCA8D72B327600857.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5900 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5900 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 321258 URL: http://rwiqipwvnklaqkuu.lti... Startdate: 20/11/2020 Architecture: WINDOWS Score: 72 15 daabaaru.com 2->15 23 Antivirus detection for URL or domain 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Phishing site detected (based on favicon image match) 2->27 29 Yara detected HtmlPhish_10 2->29 7 iexplore.exe 2 61 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 44 7->9         started        dnsIp6 17 daabaaru.com 198.54.120.245, 443, 49713, 49714 NAMECHEAP-NETUS United States 9->17 19 rwiqipwvnklaqkuu.ltiliqhting.com 168.62.48.44, 49711, 49712, 80 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->19 21 2 other IPs or domains 9->21 13 C:\Users\...\myp0dplr1edpvg99v613ua80[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
198.54.120.245
unknown United States
22612 NAMECHEAP-NETUS false
168.62.48.44
unknown United States
8075 MICROSOFT-CORP-MSN-AS-BLOCKUS false
152.199.23.72
unknown United States
15133 EDGECASTUS false

Contacted Domains

Name IP Active
daabaaru.com 198.54.120.245 true
cs1025.wpc.upsiloncdn.net 152.199.23.72 true
rwiqipwvnklaqkuu.ltiliqhting.com 168.62.48.44 true
aadcdn.msauthimages.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://daabaaru.com/fax/document/myp0dplr1edpvg99v613ua80.php?MTYwNTg5MTYwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTEwMDA5MmRjMDdjYWM1YmYzN2UwMTdkM2M5ZGEwOTllYw==&data=SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
http://rwiqipwvnklaqkuu.ltiliqhting.com/asci/SmFjcXVlbGluZS5TY2hyYWRlckByYWJvYmFuay5jb20= true
    unknown