Analysis Report MALWARE ACH WIRE PAYMENT ADVICE..xlsx

Overview

General Information

Sample Name: MALWARE ACH WIRE PAYMENT ADVICE..xlsx
Analysis ID: 339405
MD5: a66a202e970df086cc265cb646127bfb
SHA1: c8986173e16bb9b0703490afba594ec5eef08a4a
SHA256: e29c6206512f1f778f1af9a1ff2af2bb82107271e00c873930398b703294d75e

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish_25
Phishing site detected (based on image similarity)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware

Classification

Phishing:

barindex
Yara detected HtmlPhish_25
Source: Yara match File source: 473627.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\ZlFRrg5s[2].htm, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\ZlFRrg5s[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://images.typeform.com/images/nXkRcNPp6wtg/background/large Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE File opened: C:\Windows\SysWOW64\MSVCR100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.6:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.6:49754 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.100:443 -> 192.168.2.6:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.100:443 -> 192.168.2.6:49759 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.6:49760 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.6:49761 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.100:443 -> 192.168.2.6:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.18:443 -> 192.168.2.6:49770 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.18:443 -> 192.168.2.6:49769 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.6:49775 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 162.247.242.19 162.247.242.19
Source: Joe Sandbox View IP Address: 162.247.242.18 162.247.242.18
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown DNS traffic detected: queries for: 24mbw17feyn.typeform.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: http://weather.service.msn.com/data.aspx
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://24mbw17feyn.typeform.com/oembed?url=https%3A%2F%2F24mbw17feyn.typeform.com%2Fto%2FZlFRrg5s
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://24mbw17feyn.typeform.com/to/ZlFRrg5s
Source: {FC4D58F0-5634-11EB-90E5-ECF4BB2D2496}.dat.15.dr String found in binary or memory: https://24mbw17feyn.typeform.com/to/ZlFRrg5s6MlCR0S0FT
Source: {FC4D58F0-5634-11EB-90E5-ECF4BB2D2496}.dat.15.dr String found in binary or memory: https://24mbw17feyn.typeform.com/to/ZlFRrg5sRoot
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://analysis.windows.net/powerbi/api
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.aadrm.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.addins.omex.office.net/appinfo/query
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.addins.omex.office.net/appstate/query
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.cortana.ai
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.diagnostics.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.diagnosticssdf.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.microsoftstream.com/api/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.office.net
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.onedrive.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.powerbi.com/beta/myorg/imports
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://apis.live.net/v5.0/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://arc.msn.com/v4/api/selection
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://augloop.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://augloop.office.com/v2
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://autodiscover-s.outlook.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cdn.entity.
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://clients.config.office.net/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://config.edge.skype.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentities
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentitiesupdated
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cortana.ai
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cortana.ai/api
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://cr.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dataservice.o365filtering.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dataservice.o365filtering.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dev.cortana.ai
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://devnull.onenote.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://directory.services.
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ecs.office.com/config/v2/Office
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://entitlement.diagnostics.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://globaldisco.crm.dynamics.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://graph.ppe.windows.net
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://graph.ppe.windows.net/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://graph.windows.net
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://graph.windows.net/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://images.typeform.com/images/CJr828dpN5yQ/image/default
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://images.typeform.com/images/FYUps4mFKPYK/image/default
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://images.typeform.com/images/nXkRcNPp6wtg/background/large
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://images.typeform.com/images/nXkRcNPp6wtg/background/large);background-position:top
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://incidents.diagnostics.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://lifecycle.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://login.microsoftonline.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://login.windows.local
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://management.azure.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://management.azure.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://messaging.office.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ncus-000.contentsync.
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ncus-000.pagecontentsync.
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://officeapps.live.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://officeci.azurewebsites.net/api/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://onedrive.live.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://onedrive.live.com/embed?
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://outlook.office.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://outlook.office365.com/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://powerlift-frontdesk.acompli.net
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://powerlift.acompli.net
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/apple-touch-icon.png
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/browserconfig.xml
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon-16x16.png
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon-32x32.png
Source: imagestore.dat.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon-32x32.png-
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon.ico
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/safari-pinned-tab.svg
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/site.webmanifest
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://settings.outlook.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://shell.suite.office.com:1443
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://skyapi.live.net/Activity/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://staging.cortana.ai
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://store.office.cn/addinstemplate
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://store.office.com/?productgroup=Outlook
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://store.office.com/addinstemplate
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://store.office.de/addinstemplate
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://store.officeppe.com/addinstemplate
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://tasks.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://templatelogging.office.com/client/log
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://web.microsoftstream.com/video/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://webshell.suite.office.com
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://wus2-000.contentsync.
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://wus2-000.pagecontentsync.
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: E9D02DAF-639A-4CA7-B004-139D7F3D657E.1.dr String found in binary or memory: https://www.odwebp.svc.ms
Source: {FC4D58F0-5634-11EB-90E5-ECF4BB2D2496}.dat.15.dr String found in binary or memory: https://www.typeform.c
Source: ZlFRrg5s[1].htm.16.dr String found in binary or memory: https://www.typeform.com/?utm_campaign=undefined&utm_source=typeform.com-17520522-Free&utm_m
Source: ~DF51C6581021C56EF5.TMP.15.dr String found in binary or memory: https://www.typeform.com/?utm_campaign=undefined&utm_source=typeform.com-17520522-Free&utm_medium=ty
Source: {FC4D58F0-5634-11EB-90E5-ECF4BB2D2496}.dat.15.dr String found in binary or memory: https://www.typeform.cpeform.com/to/ZlFRrg5som/?utm_campaign=undefined&utm_source=typeform.com-17520
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49754
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49764
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49775
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49761
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49770
Source: unknown Network traffic detected: HTTP traffic on port 49761 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49764 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49769 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49770 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49775 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49754 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49769
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.6:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.6:49754 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.100:443 -> 192.168.2.6:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.100:443 -> 192.168.2.6:49759 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.6:49760 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.6:49761 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.100:443 -> 192.168.2.6:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.18:443 -> 192.168.2.6:49770 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.18:443 -> 192.168.2.6:49769 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.6:49775 version: TLS 1.2
Source: classification engine Classification label: mal52.phis.winXLSX@6/26@12/4
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\{3F2B44F2-E1C6-456D-9C85-788527BD975A} - OProcSessId.dat Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6796 CREDAT:17410 /prefetch:2
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6796 CREDAT:82946 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6796 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6796 CREDAT:82946 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE File opened: C:\Windows\SysWOW64\MSVCR100.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 339405 Sample: MALWARE ACH WIRE PAYMENT AD... Startdate: 13/01/2021 Architecture: WINDOWS Score: 52 22 public-assets.typeform.com 2->22 24 d2p6vz8nayi9a3.cloudfront.net 2->24 44 Yara detected HtmlPhish_25 2->44 46 Phishing site detected (based on image similarity) 2->46 7 iexplore.exe 1 56 2->7         started        9 EXCEL.EXE 33 40 2->9         started        signatures3 process4 dnsIp5 12 iexplore.exe 33 7->12         started        16 iexplore.exe 3 44 7->16         started        26 images.typeform.com 9->26 28 d2nvsmtq2poimt.cloudfront.net 9->28 30 24mbw17feyn.typeform.com 9->30 process6 dnsIp7 32 162.247.242.18, 443, 49769, 49770 NEWRELIC-AS-1US United States 12->32 34 js-agent.newrelic.com 12->34 36 24mbw17feyn.typeform.com 12->36 18 C:\Users\user\AppData\...\ZlFRrg5s[2].htm, HTML 12->18 dropped 38 bam.nr-data.net 162.247.242.19, 443, 49760, 49761 NEWRELIC-AS-1US United States 16->38 40 d2nvsmtq2poimt.cloudfront.net 65.9.58.100, 443, 49758, 49759 AMAZON-02US United States 16->40 42 5 other IPs or domains 16->42 20 C:\Users\user\AppData\...\ZlFRrg5s[1].htm, HTML 16->20 dropped file8
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
65.9.58.100
unknown United States
16509 AMAZON-02US false
65.9.58.120
unknown United States
16509 AMAZON-02US false
162.247.242.19
unknown United States
23467 NEWRELIC-AS-1US false
162.247.242.18
unknown United States
23467 NEWRELIC-AS-1US false

Contacted Domains

Name IP Active
d2nvsmtq2poimt.cloudfront.net 65.9.58.100 true
bam.nr-data.net 162.247.242.19 true
d2p6vz8nayi9a3.cloudfront.net 65.9.58.120 true
public-assets.typeform.com unknown unknown
js-agent.newrelic.com unknown unknown
images.typeform.com unknown unknown
24mbw17feyn.typeform.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://www.typeform.com/?utm_campaign=undefined&utm_source=typeform.com-17520522-Free&utm_medium=typeform&utm_content=typeform-closescreen&utm_term=EN false
    high
    https://24mbw17feyn.typeform.com/to/ZlFRrg5s false
      high