Analysis Report ACH REMlTTANCE ADVlCE..xlsx

Overview

General Information

Sample Name: ACH REMlTTANCE ADVlCE..xlsx
Analysis ID: 339432
MD5: 1726734045f013554979c6c7c1932b7c
SHA1: b6c9fb364f0bb8726be22bdacc6dc4f3acb31f7d
SHA256: 46f4cb7548dfcb39a289f186fbd4f9ed8169e1917a29de1c3492773568e5ee45

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish_25
Phishing site detected (based on image similarity)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Steals Internet Explorer cookies

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://ny990xqwsj1.typeform.com/to/qjFrxD7r SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish_25
Source: Yara match File source: 536720.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\qjFrxD7r[1].htm, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\qjFrxD7r[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://images.typeform.com/images/m9zWqYibLnGK/background/large Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49168 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49169 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49170 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49172 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49173 version: TLS 1.2
Source: unknown HTTPS traffic detected: 44.225.192.231:443 -> 192.168.2.22:49174 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.22:49179 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.22:49178 version: TLS 1.2
Source: unknown HTTPS traffic detected: 44.225.192.231:443 -> 192.168.2.22:49175 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49180 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49181 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49185 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49188 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49189 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49192 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49193 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49196 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49197 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49194 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49195 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.35.195.250:443 -> 192.168.2.22:49198 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.35.195.250:443 -> 192.168.2.22:49199 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 162.247.242.19 162.247.242.19
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90BCE4B8.jpeg Jump to behavior
Source: unknown DNS traffic detected: queries for: ny990xqwsj1.typeform.com
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertSHA2SecureServerCA.crl0=
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0L
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: http://ocsp.digicert.com0H
Source: vendors~form.965f5dedbb854e83c6c8[1].js.3.dr String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: vendors~form.965f5dedbb854e83c6c8[1].js.3.dr String found in binary or memory: http://www.jacklmoore.com/autosize
Source: renderer.0f5a683b381b67dbbf89[1].js.3.dr String found in binary or memory: https://github.com/js-cookie/js-cookie
Source: vendors~form.965f5dedbb854e83c6c8[1].js.3.dr String found in binary or memory: https://github.com/kof/animationFrame
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://images.typeform.com/images/FYUps4mFKPYK/image/default
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://images.typeform.com/images/HzxaK5qZrKPU/image/default
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://images.typeform.com/images/m9zWqYibLnGK/background/large
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://images.typeform.com/images/m9zWqYibLnGK/background/large);background-position:top
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://ny990xqwsj1.typefRoot
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/oembed?url=https%3A%2F%2Fny990xqwsj1.typeform.com%2Fto%2FqjFrxD7r
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7r
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7r6MlCR0S0FT
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7r6Root
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7r6om/?utm_campaign=qjFrxD7r&utm_soorm.com/to/qjFrxD7r
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7r6orm.com/to/qjFrxD7r
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7rRoot
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: https://ny990xqwsj1.typeform.com/to/qjFrxD7rz
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/apple-touch-icon.png
Source: ~DFC448DC16F91BBCE4.TMP.6.dr, qjFrxD7r[1].htm.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/browserconfig.xml
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon-16x16.png
Source: qjFrxD7r[1].htm.3.dr, ~DF72A7006BFF98A571.TMP.6.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon-32x32.png
Source: imagestore.dat.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon-32x32.png-
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/favicon.ico
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/safari-pinned-tab.svg
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://public-assets.typeform.com/public/favicon/site.webmanifest
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/blocks-matrix.0544beec0e1a4e11a24a.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/form.9cd5d6381506e5950fe0.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/modern-renderer.36eec26e0148023415c0.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/phonenumber.6ea5ec50b9fa21e816ff.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/renderer.0f5a683b381b67dbbf89.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/vendors~attachment.6e37d3fcdf703c1517e1.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/vendors~blocks-ranking.f8aee16223a106724ea1.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/vendors~form.965f5dedbb854e83c6c8.js
Source: qjFrxD7r[1].htm.3.dr String found in binary or memory: https://renderer-assets.typeform.com/vendors~phonenumber.32d788474b661d4d3074.js
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: https://www.digicert.com/CPS0
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.typeform.c
Source: ~DFBC05D677CD36F01B.TMP.2.dr String found in binary or memory: https://www.typeform.com/?utm_campaign=qjFrxD7r&utm_source=typeform.com-17523577-Free&utm_medium=typ
Source: {739E3DFF-5653-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.typeform.cpeform.com/to/qjFrxD7rz
Source: unknown Network traffic detected: HTTP traffic on port 49185 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49189
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49188
Source: unknown Network traffic detected: HTTP traffic on port 49181 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49185
Source: unknown Network traffic detected: HTTP traffic on port 49189 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49181
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49180
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49195 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49199 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49179
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49178
Source: unknown Network traffic detected: HTTP traffic on port 49180 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49175
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49174
Source: unknown Network traffic detected: HTTP traffic on port 49188 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49170
Source: unknown Network traffic detected: HTTP traffic on port 49198 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49194 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49167 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49169
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49168
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49167
Source: unknown Network traffic detected: HTTP traffic on port 49197 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49168 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49170 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49193 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49174 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49178 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49199
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49198
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49197
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49196
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49195
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49194
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49193
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49192
Source: unknown Network traffic detected: HTTP traffic on port 49196 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49175 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49169 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49192 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49179 -> 443
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49168 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49169 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49170 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49172 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49173 version: TLS 1.2
Source: unknown HTTPS traffic detected: 44.225.192.231:443 -> 192.168.2.22:49174 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.22:49179 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.120:443 -> 192.168.2.22:49178 version: TLS 1.2
Source: unknown HTTPS traffic detected: 44.225.192.231:443 -> 192.168.2.22:49175 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49180 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49181 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49185 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49188 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.106:443 -> 192.168.2.22:49189 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49192 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.58.87:443 -> 192.168.2.22:49193 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49196 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.9.70.129:443 -> 192.168.2.22:49197 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49194 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.247.242.19:443 -> 192.168.2.22:49195 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.35.195.250:443 -> 192.168.2.22:49198 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.35.195.250:443 -> 192.168.2.22:49199 version: TLS 1.2
Source: classification engine Classification label: mal60.phis.winXLSX@8/83@19/7
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$ACH REMlTTANCE ADVlCE..xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRC5AF.tmp Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1976 CREDAT:275457 /prefetch:2
Source: unknown Process created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' https://ny990xqwsj1.typeform.com/to/qjFrxD7r
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2864 CREDAT:275457 /prefetch:2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' https://ny990xqwsj1.typeform.com/to/qjFrxD7r Jump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1976 CREDAT:275457 /prefetch:2 Jump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2864 CREDAT:275457 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior

Stealing of Sensitive Information:

barindex
Steals Internet Explorer cookies
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\EZEPC3VR.txt Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\L42YGXX7.txt Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 339432 Sample: ACH REMlTTANCE ADVlCE..xlsx Startdate: 14/01/2021 Architecture: WINDOWS Score: 60 27 public-assets.typeform.com 2->27 29 d2p6vz8nayi9a3.cloudfront.net 2->29 51 Antivirus detection for URL or domain 2->51 53 Yara detected HtmlPhish_25 2->53 55 Phishing site detected (based on image similarity) 2->55 8 EXCEL.EXE 63 24 2->8         started        11 iexplore.exe 3 35 2->11         started        signatures3 process4 dnsIp5 37 ny990xqwsj1.typeform.com 8->37 39 images.typeform.com 8->39 41 d2nvsmtq2poimt.cloudfront.net 8->41 13 iexplore.exe 1 35 8->13         started        16 iexplore.exe 5 57 11->16         started        process6 dnsIp7 43 ny990xqwsj1.typeform.com 13->43 19 iexplore.exe 38 13->19         started        45 bam.nr-data.net 162.247.242.19, 443, 49180, 49181 NEWRELIC-AS-1US United States 16->45 47 api.segment.io 44.225.192.231, 443, 49174, 49175 AMAZON-02US United States 16->47 49 10 other IPs or domains 16->49 23 C:\Users\user\AppData\...\qjFrxD7r[1].htm, HTML 16->23 dropped file8 process9 dnsIp10 31 52.35.195.250, 443, 49198, 49199 AMAZON-02US United States 19->31 33 renderer-assets.typeform.com 19->33 35 9 other IPs or domains 19->35 25 C:\Users\user\AppData\...\qjFrxD7r[1].htm, HTML 19->25 dropped file11
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
65.9.58.87
unknown United States
16509 AMAZON-02US false
44.225.192.231
unknown United States
16509 AMAZON-02US false
162.247.242.19
unknown United States
23467 NEWRELIC-AS-1US false
65.9.58.106
unknown United States
16509 AMAZON-02US false
52.35.195.250
unknown United States
16509 AMAZON-02US false
65.9.70.129
unknown United States
16509 AMAZON-02US false
65.9.58.120
unknown United States
16509 AMAZON-02US false

Contacted Domains

Name IP Active
d296je7bbdd650.cloudfront.net 65.9.70.129 true
api.segment.io 44.225.192.231 true
d2citsn5wf4j9j.cloudfront.net 65.9.58.106 true
d2nvsmtq2poimt.cloudfront.net 65.9.58.87 true
bam.nr-data.net 162.247.242.19 true
d2p6vz8nayi9a3.cloudfront.net 65.9.58.120 true
cdn.segment.com unknown unknown
renderer-assets.typeform.com unknown unknown
js-agent.newrelic.com unknown unknown
public-assets.typeform.com unknown unknown
images.typeform.com unknown unknown
ny990xqwsj1.typeform.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://ny990xqwsj1.typeform.com/to/qjFrxD7r false
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
high
https://www.typeform.com/?utm_campaign=qjFrxD7r&utm_source=typeform.com-17523577-Free&utm_medium=typeform&utm_content=typeform-footer&utm_term=EN false
    high