Analysis Report coltTicket#513473.htm

Overview

General Information

Sample Name: coltTicket#513473.htm
Analysis ID: 356444
MD5: 3ca789514cb60dff80297f34e6d5d8d2
SHA1: af1d0e030396f002d3c3483bb49f4a83bfffadb5
SHA256: 38e2ad98dfd9b623e015abb651aa5e1f3ad7ff7d6631baff43dcc00626a9a967

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found
JA3 SSL client fingerprint seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: 088753.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\authorize_client_id_1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m[1].htm, type: DROPPED
Phishing site detected (based on logo template match)
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: Number of links: 0
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: Title: verify your login does not match URL
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: Title: verify your login does not match URL
Invalid T&C link found
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: Invalid link: Terms of use
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: Invalid link: Terms of use
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: No <meta name="author".. found
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: No <meta name="author".. found
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: No <meta name="copyright".. found
Source: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 103.134.152.4:443 -> 192.168.2.7:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.134.152.4:443 -> 192.168.2.7:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.134.152.4:443 -> 192.168.2.7:49715 version: TLS 1.2

Networking:

barindex
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7383101f,0x01d709fd</date><accdate>0x7383101f,0x01d709fd</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7383101f,0x01d709fd</date><accdate>0x7383101f,0x01d709fd</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x73857292,0x01d709fd</date><accdate>0x73857292,0x01d709fd</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x73857292,0x01d709fd</date><accdate>0x73857292,0x01d709fd</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x7387d4f7,0x01d709fd</date><accdate>0x7387d4f7,0x01d709fd</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x7387d4f7,0x01d709fd</date><accdate>0x7387d4f7,0x01d709fd</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: meval.id
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: authorize_client_id_1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m[1].htm.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v16/mem5YaGs126MiZpBA-UN_r8OUuhs.ttf)
Source: {9B717CCA-75F0-11EB-90E6-ECF4BB82F7E0}.dat.1.dr String found in binary or memory: https://meval.id/Officdesk/Desktop/coltTicket#513473.htmeV4/authorize_client_id:1zres7px-z1ow-l78w-u
Source: ~DF4E1E16A9BC55B3B6.TMP.1.dr String found in binary or memory: https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseoma
Source: imagestore.dat.2.dr String found in binary or memory: https://meval.id/OfficeV4/images/favicon.ico~
Source: coltTicket#513473.htm String found in binary or memory: https://meval.id/OfficeV4?lionel.puig
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown HTTPS traffic detected: 103.134.152.4:443 -> 192.168.2.7:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.134.152.4:443 -> 192.168.2.7:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.134.152.4:443 -> 192.168.2.7:49715 version: TLS 1.2
Source: classification engine Classification label: mal68.phis.winHTM@3/29@2/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B717CC8-75F0-11EB-90E6-ECF4BB82F7E0}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user~1\AppData\Local\Temp\~DF7924CC926C2A478F.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5256 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5256 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 356444 Sample: coltTicket#513473.htm Startdate: 23/02/2021 Architecture: WINDOWS Score: 68 15 meval.id 2->15 19 Antivirus detection for URL or domain 2->19 21 Phishing site detected (based on favicon image match) 2->21 23 Yara detected HtmlPhish_10 2->23 25 Phishing site detected (based on logo template match) 2->25 7 iexplore.exe 2 74 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 47 7->9         started        dnsIp6 17 meval.id 103.134.152.4, 443, 49706, 49707 CLOUDHOST-AS-APCloudHostPteLtdSG Singapore 9->17 13 authorize_client_i...cid09z4b1f2m[1].htm, data 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
103.134.152.4
unknown Singapore
138608 CLOUDHOST-AS-APCloudHostPteLtdSG false

Contacted Domains

Name IP Active
meval.id 103.134.152.4 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://meval.id/OfficeV4/authorize_client_id:1zres7px-z1ow-l78w-uhas-vj53h0tpifmz_j8xb0quz4kdwseomaf29iy56l3nvgph7rct1w52ba18t0h6glcqn9dkuj43ozxvspmei7fryvs57pokxyhgujl8r3eaq6tnwcid09z4b1f2m?data=bGlvbmVsLnB1aWdAY29sdC5uZXQ= true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown