Analysis Report http://microsoftonlineofficeteam.weebly.com

Overview

General Information

Sample URL: http://microsoftonlineofficeteam.weebly.com
Analysis ID: 321294

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish_20
Phishing site detected (based on logo template match)
HTML body contains low number of good links
Suspicious form URL found

Classification

Phishing:

barindex
Yara detected HtmlPhish_20
Source: Yara match File source: 855271.pages.csv, type: HTML
Phishing site detected (based on logo template match)
Source: https://microsoftonlineofficeteam.weebly.com/ Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: Number of links: 0
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: Number of links: 0
Suspicious form URL found
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: Form action: https://microsoftonlineofficeteam.weebly.com/ajax/apps/formSubmitAjax.php
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: Form action: https://microsoftonlineofficeteam.weebly.com/ajax/apps/formSubmitAjax.php
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: No <meta name="author".. found
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: No <meta name="author".. found
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: No <meta name="copyright".. found
Source: https://microsoftonlineofficeteam.weebly.com/ HTTP Parser: No <meta name="copyright".. found
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: microsoftonlineofficeteam.weebly.comConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: microsoftonlineofficeteam.weebly.com
Source: plugins[1].js.2.dr String found in binary or memory: http://hammerjs.github.io/
Source: ga[1].js.2.dr String found in binary or memory: http://www.google-analytics.com
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Source: footerSignup[1].js.2.dr String found in binary or memory: https://cdn2.editmysite.com/js/
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#localhost_support
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
Source: css[1].css0.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN7rgOXOhv.woff)
Source: css[1].css0.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN_r8OXOhv.woff)
Source: css[1].css0.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem6YaGs126MiZpBA-UFUK0Xdcs.woff)
Source: css[1].css0.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem8YaGs126MiZpBA-UFW50d.woff)
Source: css[1].css0.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWiUNhlIqU.woff)
Source: css[1].css0.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWyV9hlIqU.woff)
Source: css[1].css.2.dr String found in binary or memory: https://fonts.gstatic.com/s/quattrocento/v12/OZpEg_xvsDZQL_LKIF7q4jP3zWj8.woff)
Source: css[1].css.2.dr String found in binary or memory: https://fonts.gstatic.com/s/quattrocento/v12/OZpbg_xvsDZQL_LKIF7q4jP_eE3vfqne.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/quattrocentosans/v13/va9X4lja2NVIDdIAAoMR5MfuElaRB0zMj_bTDXDoiw.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/quattrocentosans/v13/va9Z4lja2NVIDdIAAoMR5MfuElaRB0RyklrfPXo.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/quattrocentosans/v13/va9a4lja2NVIDdIAAoMR5MfuElaRB0zMh0P2Hg.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/quattrocentosans/v13/va9c4lja2NVIDdIAAoMR5MfuElaRB0zHt0k.woff)
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://github.com/snowplow/snowplow-javascript-tracker/blob/2.6.2/src/js/tracker.js#L1509
Source: ~DF95679539DE16C271.TMP.1.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/
Source: microsoftonlineofficeteam.weebly[1].xml.2.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/&quot;
Source: ~DF95679539DE16C271.TMP.1.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/FOffice
Source: {1C4F981A-2BAC-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/FRoot
Source: {1C4F981A-2BAC-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/Fchoices.eu/weebly.com/Root
Source: {1C4F981A-2BAC-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/Root
Source: imagestore.dat.2.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/favicon.ico
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/uploads/1/3/4/9/134905392/click-image_orig.png
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/uploads/1/3/4/9/134905392/office-logo_orig.png
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://microsoftonlineofficeteam.weebly.com/uploads/1/3/4/9/134905392/tiny_orig.png
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: ga[1].js.2.dr String found in binary or memory: https://ssl.google-analytics.com
Source: ga[1].js.2.dr String found in binary or memory: https://ssl.google-analytics.com/j/__utm.gif
Source: ga[1].js.2.dr String found in binary or memory: https://stats.g.doubleclick.net/j/collect?
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha#6262736
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha/#6175971
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha/?hl=en#6223828
Source: plugins[1].js.2.dr String found in binary or memory: https://twitter.com/jacobrossi/status/480596438489890816
Source: ga[1].js.2.dr String found in binary or memory: https://www.google.%/ads/ga-audiences?
Source: ga[1].js.2.dr String found in binary or memory: https://www.google.com/analytics/web/inpage/pub/inpage.js?
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://www.google.com/log?format=json&hasfast=true
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://www.google.com/recaptcha/api.js
Source: recaptcha__en[1].js.2.dr, api[1].js.2.dr String found in binary or memory: https://www.google.com/recaptcha/api2/
Source: api[1].js.2.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/UFwvoDBMjc8LiYc1DKXiAomK/recaptcha__en.js
Source: YRETO7NA.htm.2.dr String found in binary or memory: https://www.weebly.com/signup?utm_source=internal&utm_medium=footer
Source: ~DF95679539DE16C271.TMP.1.dr String found in binary or memory: https://www.youronlinechoices.eu/
Source: ~DF95679539DE16C271.TMP.1.dr String found in binary or memory: https://www.youronlinechoices.eu/4Your
Source: imagestore.dat.2.dr String found in binary or memory: https://www.youronlinechoices.eu/favicon.ico~
Source: ~DF95679539DE16C271.TMP.1.dr String found in binary or memory: https://www.youronlinechoices.eu/weebly.com/
Source: ~DF95679539DE16C271.TMP.1.dr String found in binary or memory: https://www.youronlinechoices.eu/weebly.com/d
Source: {1C4F981A-2BAC-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://www.youronlineeofficeteam.weebly.com/
Source: optout_testpage[1].js.2.dr String found in binary or memory: https://yoc.edaa.eu/tpc/step2.js.php
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: classification engine Classification label: mal52.phis.win@3/51@5/4
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF6183A4918010BD9D.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3440 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3440 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 321294 URL: http://microsoftonlineoffic... Startdate: 20/11/2020 Architecture: WINDOWS Score: 52 12 pages-wildcard.weebly.com 2->12 14 microsoftonlineofficeteam.weebly.com 2->14 22 Yara detected HtmlPhish_20 2->22 24 Phishing site detected (based on logo template match) 2->24 7 iexplore.exe 2 62 2->7         started        signatures3 process4 process5 9 iexplore.exe 6 83 7->9         started        dnsIp6 16 pages-wildcard.weebly.com 199.34.228.54, 443, 49706, 49707 WEEBLYUS United States 9->16 18 weebly.map.fastly.net 151.101.1.46, 443, 49716, 49717 FASTLYUS United States 9->18 20 6 other IPs or domains 9->20
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
35.158.107.63
unknown United States
16509 AMAZON-02US false
151.101.1.46
unknown United States
54113 FASTLYUS false
35.163.165.143
unknown United States
16509 AMAZON-02US false
199.34.228.54
unknown United States
27647 WEEBLYUS false

Contacted Domains

Name IP Active
pages-wildcard.weebly.com 199.34.228.54 true
sp-2020021412301152490000000a-1069308460.us-west-2.elb.amazonaws.com 35.163.165.143 true
weebly.map.fastly.net 151.101.1.46 true
youronlinechoices.eu 35.158.107.63 true
ec.editmysite.com unknown unknown
www.youronlinechoices.eu unknown unknown
microsoftonlineofficeteam.weebly.com unknown unknown
cdn2.editmysite.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://www.youronlinechoices.eu/ false
    high
    https://microsoftonlineofficeteam.weebly.com/ false
      high
      http://microsoftonlineofficeteam.weebly.com/ false
        high