Analysis Report https://ebiclean.cl/f/xx/index.html

Overview

General Information

Sample URL: https://ebiclean.cl/f/xx/index.html
Analysis ID: 363569
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Phishing site detected (based on shot template match)
Yara detected HtmlPhish_10
Yara detected HtmlPhish_7
Phishing site detected (based on logo template match)
Allocates a big amount of memory (probably used for heap spraying)
HTML body contains low number of good links
HTML title does not match URL

Classification

Phishing:

barindex
Phishing site detected (based on shot template match)
Source: https://ebiclean.cl/f/xx/index.html Matcher: Template: office matched
Yara detected HtmlPhish_10
Source: Yara match File source: 888683.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm, type: DROPPED
Yara detected HtmlPhish_7
Source: Yara match File source: 888683.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm, type: DROPPED
Phishing site detected (based on logo template match)
Source: https://ebiclean.cl/f/xx/index.html Matcher: Template: onedrive matched
HTML body contains low number of good links
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: Number of links: 0
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: Title: OneDrive | Login does not match URL
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: Title: OneDrive | Login does not match URL
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: No <meta name="author".. found
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: No <meta name="author".. found
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: No <meta name="copyright".. found
Source: https://ebiclean.cl/f/xx/index.html HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 50.87.153.169:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 50.87.153.169:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 50.87.153.169:443 -> 192.168.2.4:49755 version: TLS 1.2

Software Vulnerabilities:

barindex
Allocates a big amount of memory (probably used for heap spraying)
Source: iexplore.exe Memory has grown: Private usage: 0MB later: 117MB
Source: unknown DNS traffic detected: queries for: ebiclean.cl
Source: index[1].htm.3.dr String found in binary or memory: http://gmail.com/
Source: hover[1].css.3.dr String found in binary or memory: http://ianlunn.co.uk/
Source: hover[1].css.3.dr String found in binary or memory: http://ianlunn.github.io/Hover/)
Source: popper.min[1].js.3.dr String found in binary or memory: http://opensource.org/licenses/MIT).
Source: index[1].htm.3.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Source: index[1].htm.3.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
Source: index[1].htm.3.dr String found in binary or memory: https://code.jquery.com/jquery-3.1.1.min.js
Source: index[1].htm.3.dr String found in binary or memory: https://code.jquery.com/jquery-3.2.1.slim.min.js
Source: index[1].htm.3.dr String found in binary or memory: https://code.jquery.com/jquery-3.3.1.js
Source: ~DF1469E06B57433F87.TMP.1.dr String found in binary or memory: https://ebiclean.cl/f/xx/index.html
Source: {6AA36182-7D29-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://ebiclean.cl/f/xx/index.htmlRoot
Source: ~DF1469E06B57433F87.TMP.1.dr String found in binary or memory: https://ebiclean.cl/f/xx/index.htmlh
Source: imagestore.dat.3.dr String found in binary or memory: https://ebiclean.cl/favicon.ico
Source: free-fa-regular-400[1].eot.3.dr, free.min[1].css.3.dr String found in binary or memory: https://fontawesome.com
Source: free.min[1].css.3.dr String found in binary or memory: https://fontawesome.com/license/free
Source: free-fa-regular-400[1].eot.3.dr, free-fa-solid-900[1].eot.3.dr String found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: index[1].htm.3.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Archivo
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v12/tss0ApVBdCYD5Q7hcxTE1ArZ0bbwiXo.woff)
Source: bootstrap.min[1].css.3.dr, bootstrap.min[1].js.3.dr String found in binary or memory: https://getbootstrap.com)
Source: bootstrap.min[2].js.3.dr String found in binary or memory: https://getbootstrap.com/)
Source: hover[1].css.3.dr String found in binary or memory: https://github.com/IanLunn/Hover
Source: bootstrap.min[2].js.3.dr, bootstrap.min[1].css.3.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap.min[2].js.3.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: 585b051251[1].js.3.dr String found in binary or memory: https://ka-f.fontawesome.com
Source: 585b051251[1].js.3.dr String found in binary or memory: https://kit.fontawesome.com
Source: index[1].htm.3.dr String found in binary or memory: https://kit.fontawesome.com/585b051251.js
Source: index[1].htm.3.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
Source: index[1].htm.3.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
Source: index[1].htm.3.dr String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown HTTPS traffic detected: 50.87.153.169:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 50.87.153.169:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 50.87.153.169:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: classification engine Classification label: mal68.phis.win@3/29@8/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6AA36180-7D29-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF78FAAA9CF2850A33.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6788 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6788 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 363569 URL: https://ebiclean.cl/f/xx/in... Startdate: 04/03/2021 Architecture: WINDOWS Score: 68 15 ebiclean.cl 2->15 23 Phishing site detected (based on shot template match) 2->23 25 Yara detected HtmlPhish_10 2->25 27 Yara detected HtmlPhish_7 2->27 29 Phishing site detected (based on logo template match) 2->29 7 iexplore.exe 1 51 2->7         started        signatures3 process4 process5 9 iexplore.exe 57 7->9         started        dnsIp6 17 ebiclean.cl 50.87.153.169, 443, 49733, 49734 UNIFIEDLAYER-AS-1US United States 9->17 19 cdnjs.cloudflare.com 104.16.18.94, 443, 49745, 49746 CLOUDFLARENETUS United States 9->19 21 5 other IPs or domains 9->21 13 C:\Users\user\AppData\Local\...\index[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
50.87.153.169
ebiclean.cl United States
46606 UNIFIEDLAYER-AS-1US false
104.16.18.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
cdnjs.cloudflare.com 104.16.18.94 true
ebiclean.cl 50.87.153.169 true
stackpath.bootstrapcdn.com unknown unknown
ka-f.fontawesome.com unknown unknown
code.jquery.com unknown unknown
kit.fontawesome.com unknown unknown
maxcdn.bootstrapcdn.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://ebiclean.cl/f/xx/index.html true unknown