Analysis Report https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7t

Overview

General Information

Sample URL: https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7t
Analysis ID: 358584
Infos:

Most interesting Screenshot:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7t SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 64.202.125.18:443 -> 192.168.2.4:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.18:443 -> 192.168.2.4:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49715 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49716 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49717 version: TLS 1.2
Source: unknown HTTPS traffic detected: 130.211.11.159:443 -> 192.168.2.4:49720 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.15:443 -> 192.168.2.4:49718 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.15:443 -> 192.168.2.4:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.18:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.15:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.53:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.53:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: public.3.basecamp.com
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://apis.google.com/js/platform.js?onload=setupGoogleSignIn
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com/assets/billing-4200b9e83e3eb94932d80c6cbcaca79
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com/assets/desktop-09334a52f8be90f7ab2c69fb59eb0ea
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com/assets/fonts-0adca736826e5341a26aa294e6302bb22
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com/assets/packs/libraries-a6ab6002c86dc39bd54d.js
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com/assets/public-e8b06a8ee10d5c07ccf7e91ef27eaae0
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://bc3-production-assets-cdn.basecamp-static.com/assets/rich_text-7df2a91e108ef44ef372558ec3956
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://mibghgh.weebly
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://mibghgh.weebly.com
Source: ~DFA5A270FBA6D61E89.TMP.1.dr String found in binary or memory: https://mibghgh.weebly.com/m/p/9HoiMQPNPfT1V5JoFAC5GG7t
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://mibghgh.weeblyamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7t
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://public.3..com/m/p/9HoiMQPNPfT1V5JoFAC5GG7tRoot
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://public.3.Root
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://public.3.ba24b-7732-4312-b6e5-6bb75d448e48
Source: 9HoiMQPNPfT1V5JoFAC5GG7t[1].htm.2.dr String found in binary or memory: https://public.3.basecamp.com/buckets/20950190/vaults/3492664608
Source: imagestore.dat.2.dr String found in binary or memory: https://public.3.basecamp.com/favicon-32x32.png
Source: ~DFA5A270FBA6D61E89.TMP.1.dr String found in binary or memory: https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7t
Source: ~DFA5A270FBA6D61E89.TMP.1.dr String found in binary or memory: https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7tNYou
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7tRoot
Source: {EF122194-77AA-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7tamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7tRoot
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown HTTPS traffic detected: 64.202.125.18:443 -> 192.168.2.4:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.18:443 -> 192.168.2.4:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49715 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49716 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.224.94.82:443 -> 192.168.2.4:49717 version: TLS 1.2
Source: unknown HTTPS traffic detected: 130.211.11.159:443 -> 192.168.2.4:49720 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.15:443 -> 192.168.2.4:49718 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.15:443 -> 192.168.2.4:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.18:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.202.125.15:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.53:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.53:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: classification engine Classification label: mal48.win@3/22@11/6
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EF122192-77AA-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF8853F3693435E5B4.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6136 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6136 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 358584 URL: https://public.3.basecamp.c... Startdate: 25/02/2021 Architecture: WINDOWS Score: 48 13 public.3.basecamp.com 2->13 15 3.basecamp.com 2->15 27 Antivirus / Scanner detection for submitted sample 2->27 7 iexplore.exe 1 51 2->7         started        signatures3 process4 dnsIp5 17 d30fxesrqrvb2r.cloudfront.net 7->17 19 bc3-production-assets-cdn.basecamp-static.com 7->19 10 iexplore.exe 3 51 7->10         started        process6 dnsIp7 21 pages-wildcard.weebly.com 199.34.228.53, 443, 49732, 49733 WEEBLYUS United States 10->21 23 beanstalk.37signals.com 130.211.11.159, 443, 49720 GOOGLEUS United States 10->23 25 9 other IPs or domains 10->25
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
64.202.125.18
unknown United States
25657 BASECAMPUS false
64.202.125.15
unknown United States
25657 BASECAMPUS false
130.211.11.159
unknown United States
15169 GOOGLEUS false
151.101.1.46
unknown United States
54113 FASTLYUS false
13.224.94.82
unknown United States
16509 AMAZON-02US false
199.34.228.53
unknown United States
27647 WEEBLYUS false

Contacted Domains

Name IP Active
pages-wildcard.weebly.com 199.34.228.53 true
3.basecamp.com 64.202.125.15 true
d30fxesrqrvb2r.cloudfront.net 13.224.94.73 true
weebly.map.fastly.net 151.101.1.46 true
beanstalk.37signals.com 130.211.11.159 true
public.3.basecamp.com 64.202.125.18 true
mibghgh.weebly.com unknown unknown
cdn2.editmysite.com unknown unknown
cdn1.editmysite.com unknown unknown
bc3-production-assets-cdn.basecamp-static.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://mibghgh.weebly.com/ false
    high
    https://public.3.basecamp.com/p/9HoiMQPNPfT1V5JoFAC5GG7t false
      high