Analysis Report equinitiTicket#51347303511505986.htm

Overview

General Information

Sample Name: equinitiTicket#51347303511505986.htm
Analysis ID: 363748
MD5: 07a72696ec306e32bd82c97adecb0a00
SHA1: 56ce4d5adf0e27e63c4a2a4d4e6f3e0340bf23a7
SHA256: ff12c57b1e82a05c56405df0f9a31f57057d2dca3522b5a5aaf7915eccfe0c68
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://foodtecafrica.com/common/auth/authorize_client_id:3v7t1n8s-a5rl-7igk-uy1f-g08d7xjokfw1_oiywbv49mzl6gctus3rahnj2k5q7f08d1epx9uakrz27pi6qxfncedjlh4tmo8vy5g0wb13siynf6e2boasx5mgjph9twcdvk8zr3714ul0q?data=emFrLm5ld21hbkBlcXVpbml0aS5jb20= UrlScan: Label: phishing brand: microsoft Perma Link

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://foodtecafrica.com/common/auth/authorize_client_id:3v7t1n8s-a5rl-7igk-uy1f-g08d7xjokfw1_oiywbv49mzl6gctus3rahnj2k5q7f08d1epx9uakrz27pi6qxfncedjlh4tmo8vy5g0wb13siynf6e2boasx5mgjph9twcdvk8zr3714ul0q?data=emFrLm5ld21hbkBlcXVpbml0aS5jb20= Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: 76766.pages.csv, type: HTML

Compliance:

barindex
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 207.174.215.254:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 207.174.215.254:443 -> 192.168.2.4:49756 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown DNS traffic detected: queries for: foodtecafrica.com
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, manifest.json0.0.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, manifest.json0.0.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr, 5bd75231-5773-48a9-b9fd-f8c53144f5e5.tmp.1.dr, bafaf7f6-9d61-48b4-b4ed-987c02904db1.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: Current Session.0.dr, e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr String found in binary or memory: https://foodtecafrica.com
Source: History.0.dr String found in binary or memory: https://foodtecafrica.com/common/?zak.newman
Source: Favicons.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth/?/emFrLm5ld21hbkBlcXVpbml0aS5jb20=
Source: Favicons.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth/?/emFrLm5ld21hbkBlcXVpbml0aS5jb20==
Source: History.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth/?/emFrLm5ld21hbkBlcXVpbml0aS5jb20=Verify
Source: History.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth/authorize_client_id:3v7t1n8s-a5rl-7igk-uy1f-g08d7xjokfw1_oiywb
Source: Favicons.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth/images/favicon.ico
Source: Favicons.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth?/emFrLm5ld21hbkBlcXVpbml0aS5jb20=
Source: History.0.dr String found in binary or memory: https://foodtecafrica.com/common/auth?/emFrLm5ld21hbkBlcXVpbml0aS5jb20=Verify
Source: History.0.dr String found in binary or memory: https://foodtecafrica.com/common?zak.newman
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://play.google.com
Source: 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://r5---sn-h0jeln7l.gvt1.com
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, manifest.json0.0.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: e72e0f2c-6e97-4ca9-8d2a-3cc80341ca33.tmp.1.dr, 5bccae93-e38e-4f82-9914-5484dce55fc1.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49761
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49761 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown HTTPS traffic detected: 207.174.215.254:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 207.174.215.254:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: classification engine Classification label: mal64.phis.winHTM@36/171@3/6
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6041F42A-1B30.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\51fcfd65-e9fb-46a5-93cd-719e7ccb4fd6.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized 'C:\Users\user\Desktop\equinitiTicket#51347303511505986.htm'
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1536,15388751358428902676,16190953219467586011,131072 --lang=en-GB --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1800 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1536,15388751358428902676,16190953219467586011,131072 --lang=en-GB --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1800 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 363748 Sample: equinitiTicket#513473035115... Startdate: 05/03/2021 Architecture: WINDOWS Score: 64 13 foodtecafrica.com 2->13 27 Antivirus detection for URL or domain 2->27 29 Phishing site detected (based on favicon image match) 2->29 31 Yara detected HtmlPhish_10 2->31 7 chrome.exe 14 433 2->7         started        signatures3 process4 dnsIp5 15 192.168.2.1 unknown unknown 7->15 17 192.168.2.5 unknown unknown 7->17 19 239.255.255.250 unknown Reserved 7->19 10 chrome.exe 18 7->10         started        process6 dnsIp7 21 foodtecafrica.com 207.174.215.254, 443, 49734, 49735 PUBLIC-DOMAIN-REGISTRYUS United States 10->21 23 googlehosted.l.googleusercontent.com 172.217.23.33, 443, 49742 GOOGLEUS United States 10->23 25 2 other IPs or domains 10->25
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
207.174.215.254
foodtecafrica.com United States
394695 PUBLIC-DOMAIN-REGISTRYUS false
239.255.255.250
unknown Reserved
unknown unknown false
172.217.23.33
googlehosted.l.googleusercontent.com United States
15169 GOOGLEUS false

Private

IP
192.168.2.1
192.168.2.5
127.0.0.1

Contacted Domains

Name IP Active
foodtecafrica.com 207.174.215.254 true
googlehosted.l.googleusercontent.com 172.217.23.33 true
clients2.googleusercontent.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://foodtecafrica.com/common/auth/authorize_client_id:3v7t1n8s-a5rl-7igk-uy1f-g08d7xjokfw1_oiywbv49mzl6gctus3rahnj2k5q7f08d1epx9uakrz27pi6qxfncedjlh4tmo8vy5g0wb13siynf6e2boasx5mgjph9twcdvk8zr3714ul0q?data=emFrLm5ld21hbkBlcXVpbml0aS5jb20= true unknown