Analysis Report https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2

Overview

General Information

Sample URL: https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2
Analysis ID: 345225

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Yara detected HtmlPhish_10
Machine Learning detection for dropped file
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid 'forgot password' link found

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2 SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\2021_RFQ_PROSPECT_REVIEW[1].pdf Joe Sandbox ML: detected

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: 657773.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\Priv8[1].htm, type: DROPPED
Phishing site detected (based on logo template match)
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: Number of links: 0
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: Title: Sign in to Outlook does not match URL
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: Invalid link: Forgot my password
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: Invalid link: Forgot my password
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: No <meta name="author".. found
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: No <meta name="author".. found
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: No <meta name="copyright".. found
Source: https://retreatceiling.com/Project2021/Priv8/Priv8/ HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49743 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.228.205:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.228.205:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49759 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49762 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49761 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: app.box.com
Source: preview[1].js.2.dr String found in binary or memory: http://blog.stevenlevithan.com/archives/parseuri
Source: font-awesome[1].css.2.dr String found in binary or memory: http://fontawesome.io
Source: font-awesome[1].css.2.dr String found in binary or memory: http://fontawesome.io/license
Source: preview[1].js.2.dr String found in binary or memory: http://jedwatson.github.io/classnames
Source: core.min[1].js.2.dr String found in binary or memory: http://rock.mit-license.org
Source: preview[1].js.2.dr String found in binary or memory: http://www.box.com)
Source: 2021_RFQ_PROSPECT_REVIEW[1].pdf.2.dr String found in binary or memory: http://www.dynaforms.com
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/applogos/53_8b36337037cff88c3df203bb73d58e41.png
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.s
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_635a63d500a92a0b8497cdc58d0f66b1.svg
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_96f69d0cefd8a8ba623a182c351ccc64.png
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.s
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_grey_5bc252567ef56db648207d9c36a9d004.p
Source: imagestore.dat.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
Source: imagestore.dat.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico~
Source: imagestore.dat.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico~(
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/picker_account_aad_9de70d1c5191d1852a0d5aac28b44
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/picker_account_add_56e73414003cdb676008ff7857343
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/picker_more_7568a43cf440757c55d2e7f51557ae1f.svg
Source: {C4F94028-60D9-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://app.box.c
Source: {C4F94028-60D9-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://app.box.c.com/Project2021/Priv8/Priv8/#Root
Source: {C4F94028-60D9-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://app.box.c.com/Project2021/Priv8/Priv8/k2Root
Source: {C4F94028-60D9-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://app.box.cRoot
Source: ~DF230665274301A536.TMP.1.dr String found in binary or memory: https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2
Source: {C4F94028-60D9-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2Root
Source: ~DF230665274301A536.TMP.1.dr String found in binary or memory: https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2Z2021_RFQ_PROSPECT_REVIEW.pdf
Source: {C4F94028-60D9-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2xygsjhx8uarct1s5ilzuk9uozpewcgk2Root
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/android-chrome-192x192-96i97M.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-114x114-busq-D.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-120x120-K-u4U5.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-144x144-va9pYs.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-152x152-r5tWgh.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-180x180-tV001c.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-57x57-fLlEpj.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-60x60-Uv0qzu.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-72x72-7aVqne.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-76x76-ZVGnRV.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/browserconfig-fdBReK.xml
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-16x16-_kQSW4.png
Source: imagestore.dat.2.dr, xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-32x32-VwW37b.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-96x96-XU7UE1.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-yz-tj-.ico
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/manifest-rw1AEP.json
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/mstile-144x144-pllCM8.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-16x16-Ou5N87.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-32x32-brwW_W.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-96x96-TOQ9Kg.png
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-EHWWyP.ico
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/safari-pinned-tab-jyt2W4.svg
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/enduser/app.9f896c9a9e.css
Source: messagecenter~preview-components~uploads-manager-enduser.22b2a1dc4b[1].css.2.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Bold.woff)
Source: messagecenter~preview-components~uploads-manager-enduser.22b2a1dc4b[1].css.2.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Bold.woff2)
Source: messagecenter~preview-components~uploads-manager-enduser.22b2a1dc4b[1].css.2.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Regular.woff)
Source: messagecenter~preview-components~uploads-manager-enduser.22b2a1dc4b[1].css.2.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Regular.woff2)
Source: xygsjhx8uarct1s5ilzuk9uozpewcgk2[1].htm.2.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-woff.css
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.css
Source: Priv8[1].htm0.2.dr String found in binary or memory: https://code.jquery.com/jquery-3.1.1.min.js
Source: preview[1].js.2.dr String found in binary or memory: https://feross.org
Source: preview[1].js.2.dr String found in binary or memory: https://github.com/derek-watson/jsUri
Source: core.min[1].js.2.dr String found in binary or memory: https://github.com/zloirock/core-js
Source: 2021_RFQ_PROSPECT_REVIEW[1].pdf.2.dr String found in binary or memory: https://retreatceiling.com/Project2021/Priv8/Priv8)
Source: ~DF230665274301A536.TMP.1.dr, Priv8[1].htm.2.dr String found in binary or memory: https://retreatceiling.com/Project2021/Priv8/Priv8/
Source: ~DF230665274301A536.TMP.1.dr String found in binary or memory: https://retreatceiling.com/Project2021/Priv8/Priv8/#
Source: ~DF230665274301A536.TMP.1.dr String found in binary or memory: https://retreatceiling.com/Project2021/Priv8/Priv8/$Sign
Source: ~DF230665274301A536.TMP.1.dr String found in binary or memory: https://retreatceiling.com/Project2021/Priv8/Priv8/k2
Source: preview[1].js.2.dr String found in binary or memory: https://support.box.com
Source: 2021_RFQ_PROSPECT_REVIEW[1].pdf.2.dr String found in binary or memory: https://www.pdfescape.com
Source: 2021_RFQ_PROSPECT_REVIEW[1].pdf.2.dr String found in binary or memory: https://www.pdfescape.com)/CreationDate(D:20210119103539Z)/ModDate(D:20210127165518Z)
Source: 2021_RFQ_PROSPECT_REVIEW[1].pdf.2.dr String found in binary or memory: https://www.radpdf.com
Source: 2021_RFQ_PROSPECT_REVIEW[1].pdf.2.dr String found in binary or memory: https://www.radpdf.com)/Author(Camisani
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49764
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49761
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49764 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49761 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49743 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.228.205:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.228.205:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49759 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49762 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49761 version: TLS 1.2
Source: classification engine Classification label: mal72.phis.win@3/63@9/6
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C4F94026-60D9-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFB9D3966484AB6D52.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6836 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6836 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Windows\SysWOW64\Macromed\Flash\ss.cfg Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 345225 URL: https://app.box.com/s/xygsj... Startdate: 27/01/2021 Architecture: WINDOWS Score: 72 17 cdn01.boxcdn.net 2->17 25 Antivirus detection for URL or domain 2->25 27 Antivirus / Scanner detection for submitted sample 2->27 29 Yara detected HtmlPhish_10 2->29 31 2 other signatures 2->31 7 iexplore.exe 5 52 2->7         started        signatures3 process4 process5 9 iexplore.exe 5 96 7->9         started        dnsIp6 19 retreatceiling.com 69.49.228.205, 443, 49756, 49757 UNIFIEDLAYER-AS-1US United States 9->19 21 cs1100.wpc.omegacdn.net 152.199.23.37, 443, 49760, 49761 EDGECASTUS United States 9->21 23 7 other IPs or domains 9->23 13 C:\Users\user\AppData\Local\...\Priv8[1].htm, HTML 9->13 dropped 15 C:\Users\...\2021_RFQ_PROSPECT_REVIEW[1].pdf, PDF 9->15 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
185.235.236.200
unknown Germany
33011 BOXNETUS false
185.235.236.197
unknown Germany
33011 BOXNETUS false
69.49.228.205
unknown United States
46606 UNIFIEDLAYER-AS-1US false
185.235.236.201
unknown Germany
33011 BOXNETUS false
152.199.23.37
unknown United States
15133 EDGECASTUS false
104.16.19.94
unknown United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
cs1100.wpc.omegacdn.net 152.199.23.37 true
api.box.com 185.235.236.197 true
public.boxcloud.com 185.235.236.200 true
cdnjs.cloudflare.com 104.16.19.94 true
retreatceiling.com 69.49.228.205 true
app.box.com 185.235.236.201 true
code.jquery.com unknown unknown
aadcdn.msftauth.net unknown unknown
cdn01.boxcdn.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://app.box.com/s/xygsjhx8uarct1s5ilzuk9uozpewcgk2 false
    high
    https://retreatceiling.com/Project2021/Priv8/Priv8/ true
    • SlashNext: Fake Login Page type: Phishing & Social Engineering
    unknown