Analysis Report Paid561571.htm

Overview

General Information

Sample Name: Paid561571.htm
Analysis ID: 363829
MD5: 34b0610fb39400c8e26a062f15c82b7e
SHA1: b63e46c20b06f2111aeb4c986f02bbee0e5de15e
SHA256: 6f49afc966c3172c1fdf6be50d268a58dac5f837559b7753ab5ae74997442103
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Phishing site detected (based on favicon image match)
Yara detected HtmlPhish_10
Yara detected obfuscated html page
Obfuscated HTML file found
Phishing site detected (based on logo template match)
HTML title does not match URL
IP address seen in connection with other malware
Invalid 'forgot password' link found
JA3 SSL client fingerprint seen in connection with other malware
None HTTPS page querying sensitive user data (password, username or email)

Classification

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: file:///C:/Users/user/Desktop/Paid561571.htm Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish_10
Source: Yara match File source: 888683.pages.csv, type: HTML
Yara detected obfuscated html page
Source: Yara match File source: Paid561571.htm, type: SAMPLE
Phishing site detected (based on logo template match)
Source: file:///C:/Users/user/Desktop/Paid561571.htm Matcher: Template: microsoft matched
HTML title does not match URL
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: Title: Sign in to Outlook does not match URL
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: Invalid link: Forgot my password
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: Invalid link: Forgot my password
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/Paid561571.htm HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49720 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 152.199.23.37 152.199.23.37
Source: Joe Sandbox View IP Address: 104.16.19.94 104.16.19.94
Source: Joe Sandbox View IP Address: 104.16.19.94 104.16.19.94
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: privacystatement[1].htm.2.dr String found in binary or memory: <ul><li>Sources of personal data: Interactions with users</li><li>Purposes of Processing (Collection and Sharing with Third Parties): Provide our products; product improvement; product development; customer support; and help, secure, and troubleshoot</li><li>Recipients: Service providers and user-directed entities</li></ul></li></ul><p>While the bulleted list above contains the primary sources and purposes of processing for each category of personal data, we also collect personal data from the sources listed in the <a target="_blank" class="mscom-link" href="#mainpersonaldatawecollect">Personal data we collect</a> section, such as developers who create experiences through or for Microsoft products. Similarly, we process all categories of personal data for the purposes described in the <a target="_blank" class="mscom-link" href="#mainhowweusepersonaldatamodule">How we use personal data</a> section, such as meeting our legal obligations, developing our workforce, and doing research.</p><p><strong>Disclosures of personal data for business or commercial purposes</strong>. As indicated in the <a target="_blank" class="mscom-link" href="#mainreasonswesharepersonaldatamodule">Reasons we share personal data</a> section, we share personal data with third parties for various business and commercial purposes. The primary business and commercial purposes for which we share personal data are the purposes of processing listed in the table above. However, we share all categories of personal data for the business and commercial purposes in the <a class="mscom-link" href="#mainreasonswesharepersonaldatamodule">Reasons we share personal data</a> section.</p></span></div><div class="divModuleDescription"><span id="Header13">Advertising</span><span id="navigationHeader13">Advertising</span><span id="moduleName13">mainadvertisingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription13"><p>Advertising allows us to provide, support, and improve some of our products. Microsoft does not use what you say in email, chat, video calls or voice mail, or your documents, photos, or other personal files to target ads to you. We use other data, detailed below, for advertising in our products and on third-party properties. For example:</p><ul><li>Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as <a target="_blank" class="mscom-link" href="https://www.microsoft.com">Microsoft.com</a>, MSN, and Bing.</li><li>When the advertising ID is enabled in Windows 10 as part of your privacy settings, third parties can access and use the advertising ID (much the same way that websites can access and use a unique identifier stored in a cookie) to select and deliver ads in such apps.</li><li>We may share data we collect with partners, such as Verizon Media, AppNexus, or Facebook (see below), so that the ads you see in our products and their products ar
Source: privacystatement[1].htm.2.dr String found in binary or memory: s <a target="_blank" class="mscom-link" href="https://www.linkedin.com/legal/privacy-policy">Privacy Policy</a>.</p></span></div><div class="divModuleDescription"><span id="Header29">Search, Microsoft Edge, and artificial intelligence</span><span id="navigationHeader29">Search, Microsoft Edge, and artificial intelligence</span><span id="moduleName29">mainsearchaimodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription29" aria-expanded="false"><p>Search and artificial intelligence products connect you with information and intelligently sense, process, and act on information equals www.linkedin.com (Linkedin)
Source: privacystatement[1].htm.2.dr String found in binary or memory: s health, oral health, osteoporosis, skin health, sleep, and vision / eye care. We will also personalize ads based on custom, non-sensitive health-related interest categories as requested by advertisers.</li><li><strong>Children and advertising</strong>. We do not deliver personalized advertising to children whose birthdate in their Microsoft account identifies them as under 16 years of age.</li><li><strong>Data retention</strong>. For personalized advertising, we retain data for no more than 13 months, unless we obtain your consent to retain the data longer.</li><li><strong>Data sharing</strong>. In some cases, we share with advertisers reports about the data we have collected on their sites or ads.</li></ul><p><strong>Data collected by other advertising companies</strong>. Advertisers sometimes include their own web beacons (or those of their other advertising partners) within their advertisements that we display, enabling them to set and read their own cookie. Additionally, Microsoft partners with third-party ad companies to help provide some of our advertising services, and we also allow other third-party ad companies to display advertisements on our sites. These third parties may place cookies on your computer and collect data about your online activities across websites or online services. These companies currently include, but are not limited to: <a target="_blank" class="mscom-link" href="https://www.appnexus.com/">AppNexus</a>, <a target="_blank" class="mscom-link" href="https://www.facebook.com/help/568137493302217">Facebook</a>, <a target="_blank" class="mscom-link" href="https://www.media.net/adchoices">Media.net</a>, <a target="_blank" class="mscom-link" href="https://my.outbrain.com/recommendations-settings/home">Outbrain</a>, <a target="_blank" class="mscom-link" href="https://www.taboola.com/privacy-policy#user-choices-and-optout">Taboola</a> and <a target="_blank" class="mscom-link" href="https://www.verizonmedia.com/policies/us/en/verizonmedia/privacy/index.html">Verizon Media</a>. Select any of the preceding links to find more information on each company's practices, including the choices it offers. Many of these companies are also members of the <a target="_blank" class="mscom-link" href="https://www.networkadvertising.org/managing/opt_out.aspx">NAI</a> or <a target="_blank" class="mscom-link" href="https://www.aboutads.info/choices/">DAA</a>, which each provide a simple way to opt out of ad targeting from participating companies.</p></span></div><div class="divModuleDescription"><span id="Header14">Collection of data from children</span><span id="navigationHeader14">Collection of data from children</span><span id="moduleName14">maincollectionofdatafromchildrenmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription14"><p>When a Microsoft product collects age, and there is an age in your jurisdiction under which parental consent or authorization is required to u
Source: unknown DNS traffic detected: queries for: cdnjs.cloudflare.com
Source: font-awesome[1].css.2.dr String found in binary or memory: http://fontawesome.io
Source: font-awesome[1].css.2.dr String found in binary or memory: http://fontawesome.io/license
Source: icons[1].eot.2.dr String found in binary or memory: http://fontello.com
Source: icons[1].eot.2.dr String found in binary or memory: http://fontello.comiconsRegulariconsiconsVersion
Source: 17-f90ef1[1].js.2.dr String found in binary or memory: http://github.com/requirejs/almond/LICENSE
Source: privacystatement[1].htm.2.dr String found in binary or memory: http://www.asp.net/ajaxlibrary/CDN.ashx.
Source: servicesagreement[1].htm.2.dr String found in binary or memory: http://www.mpegla.com
Source: servicesagreement[1].htm.2.dr String found in binary or memory: http://www.mpegla.com).
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://aka.ms/DPA
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://aka.ms/kinectprivacy/
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://aka.ms/redeemrewards
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://aka.ms/redeemrewards).
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://aka.ms/taxservice
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://aka.ms/useterms
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://developer.yahoo.com/flurry/end-user-opt-out/
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://ec.europa.eu/info/law/law-topic/data-protection/data-transfers-outside-eu/adequacy-protectio
Source: app[1].css.2.dr String found in binary or memory: https://github.com/h5bp/html5-boilerplate/blob/master/src/css/main.css
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://login.skype.com/login
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://mixer.com/about/tos
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://mixer.com/contact
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://mixpanel.com/optout
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://ondemand.webtrends.com/support/optout.asp
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://priv-policy.imrworldwide.com/priv/browser/us/en/optout.html
Source: {6E400DE5-7DFA-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://privacy.micros
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://signin.kissmetrics.com/privacy/#controls
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://skype.com/go/myaccount
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://support.xbox.com/help/family-online-safety/online-safety/manage-online-safety-and-privacy-se
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://support.xbox.com/help/friends-social-activity/community/use-safety-settings
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://tools.google.com/dlpage/gaoptout
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.aboutads.info/
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.acuityads.com/opt-out/
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.adjust.com/opt-out/
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.adr.org
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.appnexus.com/
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.appsflyer.com/optout
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.clicktale.net/disable.html
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.google.com/intl/en_ALL/help/terms_maps.html
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.here.com/)
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.linkedin.com/legal/privacy-policy
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html
Source: {6E400DE5-7DFA-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://www.microsoft.
Source: {6E400DE5-7DFA-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: https://www.microsoft./Desktop/Paid561571.htm
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.optimizely.com/legal/opt-out/
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.privacyshield.gov/welcome
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com).
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com/go/allrates
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com/go/legal
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com/go/legal.broadcast
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com/go/store.reactivate.credit
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.skype.com/go/ustax
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.xbox.com
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/Legal/ThirdPartyDataSharing
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/en-US/Legal/CodeOfConduct
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/en-US/Legal/CodeOfConduct)
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/legal/codeofconduct
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/managedatacollection
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/xbox-game-studios
Source: servicesagreement[1].htm.2.dr String found in binary or memory: https://www.xbox.com/xbox-game-studios)
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.youradchoices.ca
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.youradchoices.ca/fr
Source: privacystatement[1].htm.2.dr String found in binary or memory: https://www.youronlinechoices.com/
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.3:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.3:49720 version: TLS 1.2
Source: classification engine Classification label: mal72.phis.evad.winHTM@3/44@6/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFE0206310410160BF.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6016 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6016 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Data Obfuscation:

barindex
Obfuscated HTML file found
Source: Paid561571.htm Initial file: Did not found title: "Sign in to Outlook" in HTML/HTM content
Source: Paid561571.htm Initial file: Did not found title: "Sign in to Outlook" in HTML/HTM content
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 363829 Sample: Paid561571.htm Startdate: 05/03/2021 Architecture: WINDOWS Score: 72 12 cs1100.wpc.omegacdn.net 2->12 14 aadcdn.msftauth.net 2->14 22 Phishing site detected (based on favicon image match) 2->22 24 Yara detected HtmlPhish_10 2->24 26 Yara detected obfuscated html page 2->26 28 2 other signatures 2->28 7 iexplore.exe 2 64 2->7         started        signatures3 process4 process5 9 iexplore.exe 1 73 7->9         started        dnsIp6 16 cs1100.wpc.omegacdn.net 152.199.23.37, 443, 49708, 49709 EDGECASTUS United States 9->16 18 cdnjs.cloudflare.com 104.16.19.94, 443, 49706, 49707 CLOUDFLARENETUS United States 9->18 20 5 other IPs or domains 9->20
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
152.199.23.37
cs1100.wpc.omegacdn.net United States
15133 EDGECASTUS false
104.16.19.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
cs1100.wpc.omegacdn.net 152.199.23.37 true
cdnjs.cloudflare.com 104.16.19.94 true
code.jquery.com unknown unknown
aadcdn.msftauth.net unknown unknown
assets.onestore.ms unknown unknown
ajax.aspnetcdn.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
file:///C:/Users/user/Desktop/Paid561571.htm true
    low