Analysis Report http://t.orders.destinationmaternity.com/r/?id=h1fef42,971b0f,971b16&p1=sv.j-ss.xyz?mpeLy=ZGVubmlzLmhvd2FyZEBzY2h3YWIuY29t

Overview

General Information

Sample URL: http://t.orders.destinationmaternity.com/r/?id=h1fef42,971b0f,971b16&p1=sv.j-ss.xyz?mpeLy=ZGVubmlzLmhvd2FyZEBzY2h3YWIuY29t
Analysis ID: 339439

Most interesting Screenshot:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: http://sv.j-ss.xyz/main/ SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: global traffic HTTP traffic detected: GET /r/?id=h1fef42,971b0f,971b16&p1=sv.j-ss.xyz?mpeLy=ZGVubmlzLmhvd2FyZEBzY2h3YWIuY29t HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: t.orders.destinationmaternity.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /?mpeLy=ZGVubmlzLmhvd2FyZEBzY2h3YWIuY29t HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: sv.j-ss.xyz
Source: global traffic HTTP traffic detected: GET /main/ HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: sv.j-ss.xyzCookie: PHPSESSID=rbitbocqmopq23qei9h0376kql
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sv.j-ss.xyzConnection: Keep-AliveCookie: PHPSESSID=rbitbocqmopq23qei9h0376kql
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xe2e23f57,0x01d6ea66</date><accdate>0xe2e23f57,0x01d6ea66</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xe2e23f57,0x01d6ea66</date><accdate>0xe2e23f57,0x01d6ea66</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xe2e703fb,0x01d6ea66</date><accdate>0xe2e703fb,0x01d6ea66</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xe2e703fb,0x01d6ea66</date><accdate>0xe2e703fb,0x01d6ea66</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xe2e703fb,0x01d6ea66</date><accdate>0xe2e703fb,0x01d6ea66</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xe2e703fb,0x01d6ea66</date><accdate>0xe2e703fb,0x01d6ea66</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: t.orders.destinationmaternity.com
Source: ~DF46AFFF78C64CC83D.TMP.1.dr String found in binary or memory: http://sv.j-ss.xyz/main/
Source: ~DF46AFFF78C64CC83D.TMP.1.dr String found in binary or memory: http://sv.j-ss.xyz/main/R
Source: {0C87431F-565A-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: http://sv.j-ss.xyz/main/Root
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf.2.dr, KFOmCnqEu92Fr1Mu4mxP[1].ttf.2.dr, KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf.2.dr String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#localhost_support
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
Source: bootstrap.min[1].css.2.dr String found in binary or memory: https://getbootstrap.com/)
Source: bootstrap.min[1].css.2.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: main[1].htm.2.dr String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha#6262736
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha/#6175971
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://support.google.com/recaptcha/?hl=en#6223828
Source: recaptcha__en[1].js.2.dr String found in binary or memory: https://www.google.com/log?format=json&hasfast=true
Source: main[1].htm.2.dr String found in binary or memory: https://www.google.com/recaptcha/api.js
Source: recaptcha__en[1].js.2.dr, bframe[1].htm.2.dr, anchor[1].htm.2.dr, api[1].js.2.dr String found in binary or memory: https://www.google.com/recaptcha/api2/
Source: ~DF46AFFF78C64CC83D.TMP.1.dr String found in binary or memory: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LdhPvkZAAAAALJ-7_WbPxTqDTrcCZ6aLEK8Y9v-&co=aHR0
Source: ~DF46AFFF78C64CC83D.TMP.1.dr String found in binary or memory: https://www.google.com/recaptcha/api2/bframe?hl=en&v=qc5B-qjP0QEimFYUxcpWJy5B&k=6LdhPvkZAAAAALJ-7_Wb
Source: webworker[1].js.2.dr, bframe[1].htm.2.dr, anchor[1].htm.2.dr, api[1].js.2.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/qc5B-qjP0QEimFYUxcpWJy5B/recaptcha__en.js
Source: bframe[1].htm.2.dr, anchor[1].htm.2.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/qc5B-qjP0QEimFYUxcpWJy5B/styles__ltr.css
Source: classification engine Classification label: mal48.win@3/30@4/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF07DF01E73636D8DB.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5520 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5520 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 339439 URL: http://t.orders.destination... Startdate: 14/01/2021 Architecture: WINDOWS Score: 48 12 favicon.ico 2->12 20 Antivirus detection for URL or domain 2->20 7 iexplore.exe 2 84 2->7         started        signatures3 process4 process5 9 iexplore.exe 6 52 7->9         started        dnsIp6 14 sv.j-ss.xyz 192.236.249.58, 49703, 49704, 80 HOSTWINDSUS United States 9->14 16 destinationmat-rt-prod3-ssl-280079234.us-west-2.elb.amazonaws.com 44.237.144.219, 49700, 49701, 80 AMAZON-02US United States 9->16 18 2 other IPs or domains 9->18
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
44.237.144.219
unknown United States
16509 AMAZON-02US false
192.236.249.58
unknown United States
54290 HOSTWINDSUS false

Contacted Domains

Name IP Active
sv.j-ss.xyz 192.236.249.58 true
destinationmat-rt-prod3-ssl-280079234.us-west-2.elb.amazonaws.com 44.237.144.219 true
stackpath.bootstrapcdn.com unknown unknown
favicon.ico unknown unknown
t.orders.destinationmaternity.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://t.orders.destinationmaternity.com/r/?id=h1fef42,971b0f,971b16&p1=sv.j-ss.xyz?mpeLy=ZGVubmlzLmhvd2FyZEBzY2h3YWIuY29t false
    high
    http://sv.j-ss.xyz/main/ true
    • 1%, Virustotal, Browse
    • SlashNext: Fake Login Page type: Phishing & Social Engineering
    unknown
    http://sv.j-ss.xyz/main/ true
    • 1%, Virustotal, Browse
    • SlashNext: Fake Login Page type: Phishing & Social Engineering
    unknown
    http://sv.j-ss.xyz/favicon.ico false
    • Avira URL Cloud: safe
    unknown
    http://sv.j-ss.xyz/?mpeLy=ZGVubmlzLmhvd2FyZEBzY2h3YWIuY29t false
    • Avira URL Cloud: safe
    unknown