Analysis Report http://ning.chen.joydevs.com/#bmluZy5jaGVuQHR4ZG90Lmdvdg==

Overview

General Information

Sample URL: http://ning.chen.joydevs.com/#bmluZy5jaGVuQHR4ZG90Lmdvdg==
Analysis ID: 345167

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: http://ning.chen.joydevs.com/#bmluZy5jaGVuQHR4ZG90Lmdvdg== SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://crabpeacock.com/.,/authorize_client_id:syje4bf0-sj1q-bmhq-d2u3-9lgqsdyaf2mc_mnr9dxwtcoh2q6p8ey14uljg7kfia3sv50zblupyteqj3gvidr5xsfbnc271z6k8ahm0ow94cag1owdxztik93vu05lhjrsny6f8eqmb47p2?data=bmluZy5jaGVuQHR4ZG90Lmdvdg== SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://crabpeacock.com/.,/authorize_client_id:syje4bf0-sj1q-bmhq-d2u3-9lgqsdyaf2mc_mnr9dxwtcoh2q6p8ey14uljg7kfia3sv50zblupyteqj3gvidr5xsfbnc271z6k8ahm0ow94cag1owdxztik93vu05lhjrsny6f8eqmb47p2?data=bmluZy5jaGVuQHR4ZG90Lmdvdg== Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: 675052.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\authorize_client_id_syje4bf0-sj1q-bmhq-d2u3-9lgqsdyaf2mc_mnr9dxwtcoh2q6p8ey14uljg7kfia3sv50zblupyteqj3gvidr5xsfbnc271z6k8ahm0ow94cag1owdxztik93vu05lhjrsny6f8eqmb47p2[1].htm, type: DROPPED

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 45.136.244.223:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknown HTTPS traffic detected: 45.136.244.223:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 45.136.244.223:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 27 Jan 2021 18:39:11 GMTServer: ApacheX-Powered-By: PHP/7.2.34Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 199Content-Type: text/html; charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 35 8f c1 0a c2 30 10 44 ef 82 ff b0 c4 83 8a 25 c1 ab a6 fd 02 0f 22 88 07 11 59 e3 4a a2 b1 09 cd 52 f5 ef 4d 2c ee 69 98 1d 1e 33 da f2 d3 37 30 1e 69 4b 78 2d 02 f2 69 76 ec a9 d9 7a c2 44 70 40 c7 52 4a ad 06 b7 84 93 e9 5c 64 e0 4f a4 5a 30 bd 59 dd b1 c7 c1 15 cd 00 e9 b1 03 8b c9 42 0d 2f d7 5e c3 4b fa 60 90 5d 68 65 b1 d7 39 55 22 fb dd 26 27 40 58 e6 98 56 4a 99 0e 2f 91 d0 04 f3 90 26 3c 95 ac 94 80 c5 8f 24 53 f4 8e 67 d3 c9 74 7e 5c 9e 0a e0 4f 0e 91 da 59 26 55 20 ce 89 fc 4d cc f3 53 ab a1 50 ee 93 2b ab ff c0 ac ca e6 2f ef 6e ed 85 fa 00 00 00 Data Ascii: 50D%"YJRM,i370iKx-ivzDp@RJ\dOZ0YB/^K`]he9U"&'@XVJ/&<$Sgt~\OY&U MSP+/n
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: ning.chen.joydevs.comConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: ning.chen.joydevs.com
Source: ~DFC8DFC69DEA962F30.TMP.1.dr String found in binary or memory: http://ning.chen.joydevs.com/#bmluZy5jaGVuQHR4ZG90Lmdvdg==
Source: {F0C07078-60CE-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: http://ning.chen.joydevs.com/#bmluZy5jaGVuQHR4ZG90Lmdvdg==Root
Source: A6FDRX35.htm.2.dr, ~DFC8DFC69DEA962F30.TMP.1.dr, imagestore.dat.2.dr String found in binary or memory: https://crabpeacock.com/.
Source: {F0C07078-60CE-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://crabpeacock.covs.com/#bmluZy5jaGVuQHR4ZG90Lmdvdg==m/.
Source: authorize_client_id_syje4bf0-sj1q-bmhq-d2u3-9lgqsdyaf2mc_mnr9dxwtcoh2q6p8ey14uljg7kfia3sv50zblupyteqj3gvidr5xsfbnc271z6k8ahm0ow94cag1owdxztik93vu05lhjrsny6f8eqmb47p2[1].htm.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v16/mem5YaGs126MiZpBA-UN_r8OUuhs.ttf)
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49747 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49747
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown HTTPS traffic detected: 45.136.244.223:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknown HTTPS traffic detected: 45.136.244.223:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 45.136.244.223:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: classification engine Classification label: mal72.phis.win@3/20@3/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F0C07076-60CE-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF8F7A3B09211FC4BE.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6728 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6728 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 345167 URL: http://ning.chen.joydevs.co... Startdate: 27/01/2021 Architecture: WINDOWS Score: 72 15 crabpeacock.com 2->15 21 Antivirus detection for URL or domain 2->21 23 Antivirus / Scanner detection for submitted sample 2->23 25 Phishing site detected (based on favicon image match) 2->25 27 Yara detected HtmlPhish_10 2->27 7 iexplore.exe 1 51 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 47 7->9         started        dnsIp6 17 ning.chen.joydevs.com 198.187.29.179, 49739, 49740, 80 NAMECHEAP-NETUS United States 9->17 19 crabpeacock.com 45.136.244.223, 443, 49741, 49742 ASBAXETRU Russian Federation 9->19 13 authorize_client_i...y6f8eqmb47p2[1].htm, data 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
45.136.244.223
unknown Russian Federation
51659 ASBAXETRU false
198.187.29.179
unknown United States
22612 NAMECHEAP-NETUS false

Contacted Domains

Name IP Active
ning.chen.joydevs.com 198.187.29.179 true
crabpeacock.com 45.136.244.223 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://ning.chen.joydevs.com/ false
  • Avira URL Cloud: safe
unknown
https://crabpeacock.com/.,/authorize_client_id:syje4bf0-sj1q-bmhq-d2u3-9lgqsdyaf2mc_mnr9dxwtcoh2q6p8ey14uljg7kfia3sv50zblupyteqj3gvidr5xsfbnc271z6k8ahm0ow94cag1owdxztik93vu05lhjrsny6f8eqmb47p2?data=bmluZy5jaGVuQHR4ZG90Lmdvdg== true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown