Analysis Report http://gomterly.tk/nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ==

Overview

General Information

Sample URL: http://gomterly.tk/nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ==
Analysis ID: 323228

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10
Allocates a big amount of memory (probably used for heap spraying)
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: http://gomterly.tk/nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social usering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\cp8du1264mo0liwz4nkggg76[1].htm, type: DROPPED
HTML body contains low number of good links
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: Number of links: 0
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: Title: Sign in to your account does not match URL
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: Title: Sign in to your account does not match URL
Invalid T&C link found
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: Invalid link: Terms of use
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: Invalid link: Terms of use
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: No <meta name="author".. found
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: No <meta name="author".. found
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: No <meta name="copyright".. found
Source: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP Parser: No <meta name="copyright".. found

Software Vulnerabilities:

barindex
Allocates a big amount of memory (probably used for heap spraying)
Source: iexplore.exe Memory has grown: Private usage: 0MB later: 66MB
Source: global traffic HTTP traffic detected: GET /nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: gomterly.tkConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: gomterly.tk
Source: {7BDBF09E-303C-11EB-90E5-ECF4BB2D2496}.dat.1.dr, ~DFEA39457A0CB7C84C.TMP.1.dr String found in binary or memory: http://gomterly.tk/nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ==
Source: {7BDBF09E-303C-11EB-90E5-ECF4BB2D2496}.dat.1.dr String found in binary or memory: http://gomterly.tk/nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ==Root
Source: KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf.2.dr, KFOmCnqEu92Fr1Mu4mxP[1].ttf.2.dr, KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf.2.dr String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: cp8du1264mo0liwz4nkggg76[1].htm.2.dr String found in binary or memory: https://aadcdn.msauthimages.net/dbd5a2dd-vvz27-qbah61uolzvyjrsjirzzc1kxvx6nwaiet9-sg/logintenantbran
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#localhost_support
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ==[1].htm.2.dr String found in binary or memory: https://portaloutlookn.cloudns.asia/axx/?angelo.desantis
Source: {7BDBF09E-303C-11EB-90E5-ECF4BB2D2496}.dat.1.dr String found in binary or memory: https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjl
Source: imagestore.dat.2.dr String found in binary or memory: https://portaloutlookn.cloudns.asia/axx/lib/img/favicon.ico
Source: imagestore.dat.2.dr String found in binary or memory: https://portaloutlookn.cloudns.asia/axx/lib/img/favicon.ico~
Source: imagestore.dat.2.dr String found in binary or memory: https://portaloutlookn.cloudns.asia/axx/lib/img/favicon.ico~(
Source: ~DFEA39457A0CB7C84C.TMP.1.dr String found in binary or memory: https://portaloutlookn.cloudns.asia/axx/proc?csrftoken=MTYwNjM5OTc5NTZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY
Source: {7BDBF09E-303C-11EB-90E5-ECF4BB2D2496}.dat.1.dr String found in binary or memory: https://portaloutlooknter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ==.cloudns.asia/axx/proc?csrftok
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha#6262736
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha/#6175971
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha/?hl=en#6223828
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://www.google.com/log?format=json&hasfast=true
Source: proc[1].htm.2.dr String found in binary or memory: https://www.google.com/recaptcha/api.js?render=6LdZxQEVAAAAAAZyu_QKXAwC_5GB8yR8bNzpiZ5N
Source: recaptcha__en[1].js.2.dr, anchor[1].htm.2.dr, api[1].js.2.dr String found in binary or memory: https://www.google.com/recaptcha/api2/
Source: {7BDBF09E-303C-11EB-90E5-ECF4BB2D2496}.dat.1.dr String found in binary or memory: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LdZxQEVAAAAAAZyu_QKXAwC_5GB8yR8bNzpiZ5N&co=aHR0
Source: webworker[1].js.2.dr, anchor[1].htm.2.dr, api[1].js.2.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/UFwvoDBMjc8LiYc1DKXiAomK/recaptcha__en.js
Source: anchor[1].htm.2.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/UFwvoDBMjc8LiYc1DKXiAomK/styles__ltr.css
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: classification engine Classification label: mal64.phis.win@3/27@4/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7BDBF09C-303C-11EB-90E5-ECF4BB2D2496}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF6C5CB6288A8B32CA.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2976 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2976 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 323228 URL: http://gomterly.tk/nomter/Y... Startdate: 26/11/2020 Architecture: WINDOWS Score: 64 15 portaloutlookn.cloudns.asia 2->15 23 Antivirus / Scanner detection for submitted sample 2->23 25 Phishing site detected (based on favicon image match) 2->25 27 Yara detected HtmlPhish_10 2->27 7 iexplore.exe 1 51 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 55 7->9         started        dnsIp6 17 gomterly.tk 40.86.189.221, 443, 49722, 49723 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->17 19 cs1025.wpc.upsiloncdn.net 152.199.23.72, 443, 49740, 49741 EDGECASTUS United States 9->19 21 2 other IPs or domains 9->21 13 C:\Users\...\cp8du1264mo0liwz4nkggg76[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
40.86.189.221
unknown United States
8075 MICROSOFT-CORP-MSN-AS-BLOCKUS false
152.199.23.72
unknown United States
15133 EDGECASTUS false

Contacted Domains

Name IP Active
portaloutlookn.cloudns.asia 40.86.189.221 true
gomterly.tk 40.86.189.221 true
cs1025.wpc.upsiloncdn.net 152.199.23.72 true
aadcdn.msauthimages.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://portaloutlookn.cloudns.asia/axx/cp8du1264mo0liwz4nkggg76.php?MTYwNjM5OTgwMDZkMDZjNTRlMTMzYjlkYjc1ZjYxZDhiY2U4OTBlZWU4OTcyNmFkYTE3NDUxYTlmMDVmNDdhZjI3YjM3NjJlOTNhMDhkYjgwZg==&data=YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== true
    unknown
    http://gomterly.tk/nomter/YW5nZWxvLmRlc2FudGlzQGNvZ2Vjb3BlZXIxLmNvbQ== true
      unknown