Analysis Report https://lowrybrenda714e.myportfolio.com/

Overview

General Information

Sample URL: https://lowrybrenda714e.myportfolio.com/
Analysis ID: 344886

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Yara detected HtmlPhish_10
HTML body contains low number of good links
HTML title does not match URL
Invalid 'forgot password' link found

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://lowrybrenda714e.myportfolio.com/ SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://nobledriving.co.uk/securefax/Secure/ UrlScan: Label: phishing brand: microsoft Perma Link

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: 609290.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\Secure[1].htm, type: DROPPED
HTML body contains low number of good links
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: Number of links: 0
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: Title: Sign in to Outlook does not match URL
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: Invalid link: Forgot my password
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: Invalid link: Forgot my password
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: No <meta name="author".. found
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: No <meta name="author".. found
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: No <meta name="copyright".. found
Source: https://nobledriving.co.uk/securefax/Secure/ HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 151.101.0.119:443 -> 192.168.2.3:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.0.119:443 -> 192.168.2.3:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 143.204.5.181:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 143.204.5.181:443 -> 192.168.2.3:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.235.215.62:443 -> 192.168.2.3:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.235.215.62:443 -> 192.168.2.3:49722 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: lowrybrenda714e.myportfolio.com
Source: font-awesome[1].css.2.dr String found in binary or memory: http://fontawesome.io
Source: font-awesome[1].css.2.dr String found in binary or memory: http://fontawesome.io/license
Source: main[1].js.2.dr String found in binary or memory: http://jquery.com/
Source: main[1].js.2.dr String found in binary or memory: http://jquery.org/license
Source: main[1].js.2.dr String found in binary or memory: http://sizzlejs.com/
Source: PEOKBA7N.js.2.dr String found in binary or memory: http://typekit.com/eulas/000000000000000000017750
Source: PEOKBA7N.js.2.dr String found in binary or memory: http://typekit.com/eulas/00000000000000007735a6b9
Source: main[1].js.2.dr String found in binary or memory: http://www.appelsiini.net/projects/lazyload
Source: main[1].js.2.dr String found in binary or memory: http://www.opensource.org/licenses/mit-license.php
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/applogos/53_8b36337037cff88c3df203bb73d58e41.png
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.s
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_635a63d500a92a0b8497cdc58d0f66b1.svg
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_96f69d0cefd8a8ba623a182c351ccc64.png
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.s
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_grey_5bc252567ef56db648207d9c36a9d004.p
Source: imagestore.dat.2.dr, Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
Source: imagestore.dat.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico~
Source: imagestore.dat.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico~(
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/picker_account_aad_9de70d1c5191d1852a0d5aac28b44
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/picker_account_add_56e73414003cdb676008ff7857343
Source: Secure[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/picker_more_7568a43cf440757c55d2e7f51557ae1f.svg
Source: Secure[1].htm0.2.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.css
Source: Secure[1].htm0.2.dr String found in binary or memory: https://code.jquery.com/jquery-3.1.1.min.js
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr, ~DFB052A6523F436CBD.TMP.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/$Cust
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/$CustRoot
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/$Custo.uk/securefax/Secure/#Root
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/$Custo.uk/securefax/Secure/Root
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/$Customer
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/Root
Source: CBDX8KFB.htm.2.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/home
Source: ~DFB052A6523F436CBD.TMP.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/p
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://lowrybrenda714e.myportfolio.com/r
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://nobledriving.c
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://nobledriving.ce.myportfolio.com/r
Source: CBDX8KFB.htm.2.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr, ~DFB052A6523F436CBD.TMP.1.dr, Secure[1].htm.2.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/#
Source: ~DFB052A6523F436CBD.TMP.1.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/#.ico
Source: ~DFB052A6523F436CBD.TMP.1.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/#Visited:
Source: {8E041432-60D8-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/$Sign
Source: ~DFB052A6523F436CBD.TMP.1.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/7
Source: ~DFB052A6523F436CBD.TMP.1.dr String found in binary or memory: https://nobledriving.co.uk/securefax/Secure/Visited:
Source: PEOKBA7N.js.2.dr String found in binary or memory: https://p.typekit.net/p.gif
Source: CBDX8KFB.htm.2.dr String found in binary or memory: https://pro2-bar-s3-cdn-cf2.myportfolio.com/92ba9c29-e151-43bb-9cb5-03e2bee5b76a/d42c286c3ea44af105d
Source: PEOKBA7N.js.2.dr String found in binary or memory: https://use.typekit.net/af/3e2979/00000000000000007735a6b9/30/
Source: PEOKBA7N.js.2.dr String found in binary or memory: https://use.typekit.net/af/54d47a/000000000000000000017750/27/
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown HTTPS traffic detected: 151.101.0.119:443 -> 192.168.2.3:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.0.119:443 -> 192.168.2.3:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 143.204.5.181:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 143.204.5.181:443 -> 192.168.2.3:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.235.215.62:443 -> 192.168.2.3:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.235.215.62:443 -> 192.168.2.3:49722 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: classification engine Classification label: mal64.phis.win@3/33@10/5
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFBA9B5AC1B8981F21.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3892 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3892 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 344886 URL: https://lowrybrenda714e.myp... Startdate: 27/01/2021 Architecture: WINDOWS Score: 64 20 Antivirus detection for URL or domain 2->20 22 Antivirus / Scanner detection for submitted sample 2->22 24 Yara detected HtmlPhish_10 2->24 6 iexplore.exe 2 62 2->6         started        process3 process4 8 iexplore.exe 2 61 6->8         started        dnsIp5 14 nobledriving.co.uk 23.235.215.62, 443, 49721, 49722 IMH-WESTUS United States 8->14 16 prod.adobe-prod-view.map.fastly.net 151.101.0.119, 443, 49705, 49706 FASTLYUS United States 8->16 18 10 other IPs or domains 8->18 12 C:\Users\user\AppData\Local\...\Secure[1].htm, HTML 8->12 dropped file6
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
23.235.215.62
unknown United States
22611 IMH-WESTUS false
152.199.23.37
unknown United States
15133 EDGECASTUS false
151.101.0.119
unknown United States
54113 FASTLYUS false
143.204.5.181
unknown United States
16509 AMAZON-02US false
104.16.19.94
unknown United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
pro2-bar-s3-cdn-cf2.myportfolio.com 143.204.5.181 true
cs1100.wpc.omegacdn.net 152.199.23.37 true
cdnjs.cloudflare.com 104.16.19.94 true
prod.adobe-prod-view.map.fastly.net 151.101.0.119 true
nobledriving.co.uk 23.235.215.62 true
lowrybrenda714e.myportfolio.com unknown unknown
use.typekit.net unknown unknown
p.typekit.net unknown unknown
code.jquery.com unknown unknown
js-agent.newrelic.com unknown unknown
aadcdn.msftauth.net unknown unknown
bam-cell.nr-data.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://nobledriving.co.uk/securefax/Secure/ true unknown
https://lowrybrenda714e.myportfolio.com/ false
    high