Analysis Report https://217023.8b.io/

Overview

General Information

Sample URL: https://217023.8b.io/
Analysis ID: 339243

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish_10
Phishing site detected (based on image similarity)
HTML body contains low number of good links
HTML title does not match URL
Suspicious form URL found

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://lacecompound.com/sm/mfile/ SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: 302494.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\f9194c93208089b7e39c01a29ca5d620[1].htm, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\mfile[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://lacecompound.com/sm/mfile/naf/inf/microsoft_logo.svg Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Source: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/inc/microsoft_logo.svg Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Source: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/inf/0.jpg?x=a5dbd4393ff6a725c7e62b61df7e72f0 Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
HTML body contains low number of good links
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: Number of links: 0
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: Title: Sharing Link Validation does not match URL
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: Title: Sharing Link Validation does not match URL
Suspicious form URL found
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: Form action: mai.php
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: Form action: mai.php
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: No <meta name="author".. found
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: No <meta name="author".. found
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: No <meta name="copyright".. found
Source: https://lacecompound.com/sm/mfile/ HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 52.7.227.232:443 -> 192.168.2.3:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.7.227.232:443 -> 192.168.2.3:49720 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.119.132:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.119.132:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.119.132:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 195.181.244.134:443 -> 192.168.2.3:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 195.181.244.134:443 -> 192.168.2.3:49743 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: 217023.8b.io
Source: amp-mustache-0.2[1].js.2.dr String found in binary or memory: http://github.com/janl/mustache.js
Source: 4VFNILYG.htm.2.dr, ~DFDCDB21E6CD7AAD32.TMP.1.dr String found in binary or memory: https://217023.8b.io/
Source: ~DFDCDB21E6CD7AAD32.TMP.1.dr String found in binary or memory: https://217023.8b.io/L
Source: {C6C39364-560F-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://217023.8b.io/Root
Source: amp-mustache-0.2[1].js.2.dr, amp-analytics-0.1[1].js.2.dr, v0[1].js.2.dr String found in binary or memory: https://3p.ampproject.net
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://8b.com
Source: f9194c93208089b7e39c01a29ca5d620[1].htm0.2.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js
Source: v0[1].js.2.dr String found in binary or memory: https://amp.dev/documentation/guides-and-tutorials/develop/style_and_layout/control_layout
Source: v0[1].js.2.dr String found in binary or memory: https://amp.dev/documentation/guides-and-tutorials/learn/experimental
Source: v0[1].js.2.dr String found in binary or memory: https://ampcid.google.com/v1/cache:getClientId?key=AIzaSyDKtqGxnoeIqVM33Uf7hRSa3GJxuzR7mLc
Source: v0[1].js.2.dr String found in binary or memory: https://ampcid.google.com/v1/publisher:getClientId?key=
Source: 4VFNILYG.htm.2.dr, imagestore.dat.2.dr String found in binary or memory: https://app.8b.io/app/themes/webamp/projects/writer/assets/images/logo1.png
Source: amp-mustache-0.2[1].js.2.dr, amp-analytics-0.1[1].js.2.dr, v0[1].js.2.dr String found in binary or memory: https://cdn.ampproject.org
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://cdn.ampproject.org/v0.js
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://cdn.ampproject.org/v0/amp-analytics-0.1.js
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://cdn.ampproject.org/v0/amp-mustache-0.2.js
Source: v0[1].js.2.dr String found in binary or memory: https://developers.google.com/open-source/licenses/bsd
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Forum:400
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Neucha:400
Source: css[2].css.2.dr String found in binary or memory: https://fonts.gstatic.com/s/forum/v11/6aey4Ky-Vb8Ew8IROpQ.woff)
Source: css[1].css.2.dr String found in binary or memory: https://fonts.gstatic.com/s/neucha/v12/q5uGsou0JOdh94bfvQlr.woff)
Source: amp-analytics-0.1[1].js.2.dr String found in binary or memory: https://github.com/ampproject/amphtml/blob/master/spec/amp-iframe-origin-policy.md
Source: {C6C39364-560F-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lacecompound.c
Source: {C6C39364-560F-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lacecompound.cL
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://lacecompound.com/sm/mfile
Source: ~DFDCDB21E6CD7AAD32.TMP.1.dr, mfile[1].htm.2.dr String found in binary or memory: https://lacecompound.com/sm/mfile/
Source: ~DFDCDB21E6CD7AAD32.TMP.1.dr String found in binary or memory: https://lacecompound.com/sm/mfile/.Sharing
Source: ~DFDCDB21E6CD7AAD32.TMP.1.dr String found in binary or memory: https://lacecompound.com/sm/mfile/f
Source: f9194c93208089b7e39c01a29ca5d620[1].htm.2.dr String found in binary or memory: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/?Key=7181801993&amp;rand=13InboxL
Source: ~DFDCDB21E6CD7AAD32.TMP.1.dr String found in binary or memory: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/?Key=7181801993&rand=13InboxLight
Source: imagestore.dat.2.dr String found in binary or memory: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/inf/favicon.ico
Source: imagestore.dat.2.dr String found in binary or memory: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/inf/favicon.ico~
Source: imagestore.dat.2.dr String found in binary or memory: https://lacecompound.com/sm/mfile/f9194c93208089b7e39c01a29ca5d620/inf/favicon.ico~(
Source: v0[1].js.2.dr String found in binary or memory: https://log.amp.dev/?v=012012301722001&id=
Source: amp-loader-0.1[1].js.2.dr String found in binary or memory: https://mths.be/cssescape
Source: 4VFNILYG.htm.2.dr String found in binary or memory: https://r.8b.io/217023/images/background5-h_kjukqdlq.jpg
Source: mfile[1].htm0.2.dr String found in binary or memory: https://spoprod-a.akamaihd.net
Source: amp-mustache-0.2[1].js.2.dr, amp-analytics-0.1[1].js.2.dr, v0[1].js.2.dr String found in binary or memory: https://us-central1-amp-error-reporting.cloudfunctions.net/r
Source: amp-mustache-0.2[1].js.2.dr, amp-analytics-0.1[1].js.2.dr, v0[1].js.2.dr String found in binary or memory: https://us-central1-amp-error-reporting.cloudfunctions.net/r-beta
Source: mfile[1].htm0.2.dr String found in binary or memory: https://vikinggenetics-my.sharepoint.com/personal/datho_vikinggenetics_com_au/_layouts/15/images/pdf
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown HTTPS traffic detected: 52.7.227.232:443 -> 192.168.2.3:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.7.227.232:443 -> 192.168.2.3:49720 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.119.132:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.119.132:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 108.177.119.132:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.24.104.39:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 195.181.244.134:443 -> 192.168.2.3:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 195.181.244.134:443 -> 192.168.2.3:49743 version: TLS 1.2
Source: classification engine Classification label: mal60.phis.win@3/36@7/6
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF609AC1772FA5BA5E.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5560 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5560 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 339243 URL: https://217023.8b.io/ Startdate: 13/01/2021 Architecture: WINDOWS Score: 60 17 app.8b.io 2->17 25 Antivirus detection for URL or domain 2->25 27 Yara detected HtmlPhish_10 2->27 29 Phishing site detected (based on image similarity) 2->29 7 iexplore.exe 2 62 2->7         started        signatures3 process4 process5 9 iexplore.exe 3 68 7->9         started        dnsIp6 19 lacecompound.com 195.181.244.134, 443, 49742, 49743 RACKRAYUABRakrejusLT Lithuania 9->19 21 17825-ipv4.farm.prod.aa-rt.sharepoint.com 104.146.245.41, 443, 49745, 49746 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->21 23 11 other IPs or domains 9->23 13 C:\Users\user\AppData\Local\...\mfile[1].htm, HTML 9->13 dropped 15 f9194c93208089b7e39c01a29ca5d620[1].htm, data 9->15 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
108.177.119.132
unknown United States
15169 GOOGLEUS false
104.146.245.41
unknown United States
8075 MICROSOFT-CORP-MSN-AS-BLOCKUS false
52.7.227.232
unknown United States
14618 AMAZON-AESUS false
195.181.244.134
unknown Lithuania
62282 RACKRAYUABRakrejusLT false
104.24.104.39
unknown United States
13335 CLOUDFLARENETUS false

Private

IP
192.168.2.1

Contacted Domains

Name IP Active
app.8b.io 104.24.104.39 true
lacecompound.com 195.181.244.134 true
r.8b.io 104.24.104.39 true
proxy-8b-io-1762796164.us-east-1.elb.amazonaws.com 52.7.227.232 true
cdn-content.ampproject.org 108.177.119.132 true
17825-ipv4.farm.prod.aa-rt.sharepoint.com 104.146.245.41 true
vikinggenetics-my.sharepoint.com unknown unknown
cdn.ampproject.org unknown unknown
217023.8b.io unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://lacecompound.com/sm/mfile/ true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
https://217023.8b.io/ true
    unknown