Analysis Report https://plateflippers.com/OH2/GG8/

Overview

General Information

Sample URL: https://plateflippers.com/OH2/GG8/
Analysis ID: 363940
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Phishing site detected (based on shot template match)
Yara detected HtmlPhish_7
Yara detected obfuscated html page
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found
Yara detected Encrypted html page by third party sevices

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://plateflippers.com/OH2/GG8/ Avira URL Cloud: detection malicious, Label: phishing
Source: https://plateflippers.com/OH2/GG8/ SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://plateflippers.com/OH2/GG8/Outlook.php SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: https://plateflippers.com/OH2/GG8/Othermail.php SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: https://plateflippers.com/OH2/GG8/Office365.php SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: https://plateflippers.com/OH2/GG8/Root Avira URL Cloud: Label: phishing
Source: https://plateflippers.com/OH2/GG8/f Avira URL Cloud: Label: phishing
Source: https://plateflippers.com/OH2/GG8/Outlook.phpp2/GG8/Office365.php Avira URL Cloud: Label: phishing
Source: https://plateflippers.com/OH2/GG8/Outlook.phpBSign Avira URL Cloud: Label: phishing
Multi AV Scanner detection for submitted file
Source: https://plateflippers.com/OH2/GG8/ Virustotal: Detection: 10% Perma Link

Phishing:

barindex
Phishing site detected (based on shot template match)
Source: https://plateflippers.com/OH2/GG8/ Matcher: Template: microsoft matched
Yara detected HtmlPhish_7
Source: Yara match File source: 849224.pages.csv, type: HTML
Yara detected obfuscated html page
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\GG8[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://plateflippers.com/OH2/GG8/images/Onedrive-logo.png Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Phishing site detected (based on logo template match)
Source: https://plateflippers.com/OH2/GG8/Outlook.php Matcher: Template: microsoft matched
Source: https://plateflippers.com/OH2/GG8/Office365.php Matcher: Template: office matched
HTML body contains low number of good links
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: Number of links: 0
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: Number of links: 0
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Number of links: 1
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: Number of links: 0
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: Number of links: 0
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Number of links: 1
HTML title does not match URL
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: Title: One Drive does not match URL
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Title: One Drive does not match URL
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: Title: One Drive does not match URL
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Title: One Drive does not match URL
Invalid T&C link found
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Invalid link: Terms
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Invalid link: Privacy & Cookies
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Invalid link: Terms
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: Invalid link: Privacy & Cookies
Yara detected Encrypted html page by third party sevices
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\GG8[1].htm, type: DROPPED
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: No <meta name="author".. found
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: No <meta name="author".. found
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: No <meta name="author".. found
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: No <meta name="author".. found
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: No <meta name="author".. found
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: No <meta name="author".. found
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: No <meta name="copyright".. found
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: No <meta name="copyright".. found
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: No <meta name="copyright".. found
Source: https://plateflippers.com/OH2/GG8/Outlook.php HTTP Parser: No <meta name="copyright".. found
Source: https://plateflippers.com/OH2/GG8/Othermail.php HTTP Parser: No <meta name="copyright".. found
Source: https://plateflippers.com/OH2/GG8/Office365.php HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 162.241.127.18:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.241.127.18:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.241.127.18:443 -> 192.168.2.4:49770 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.4:49777 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.4:49778 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.4:49779 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: plateflippers.com
Source: fontawesome-webfont[1].eot.2.dr, font-awesome.min[1].css.2.dr String found in binary or memory: http://fontawesome.io
Source: font-awesome.min[1].css.2.dr String found in binary or memory: http://fontawesome.io/license
Source: fontawesome-webfont[1].eot.2.dr String found in binary or memory: http://fontawesome.io/license/
Source: fontawesome-webfont[1].eot.2.dr String found in binary or memory: http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
Source: Othermail[1].htm.2.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js
Source: Othermail[1].htm.2.dr String found in binary or memory: https://code.jquery.com/jquery-3.1.1.slim.min.js
Source: style[1].css.2.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN7rgOUuhv.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN8rsOUuhv.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN_r8OUuhv.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UNirkOUuhv.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem6YaGs126MiZpBA-UFUK0Zdcs.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem8YaGs126MiZpBA-UFVZ0d.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKW-U9hrIqU.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWiUNhrIqU.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWyV9hrIqU.woff)
Source: css[1].css1.2.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKXGUdhrIqU.woff)
Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.dr, bootstrap.min[1].css0.2.dr String found in binary or memory: https://getbootstrap.com)
Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].js0.2.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: Othermail[1].htm.2.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.css
Source: Othermail[1].htm.2.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.js
Source: Othermail[1].htm.2.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Source: ~DF8ADC395168C1F92B.TMP.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/
Source: ~DF8ADC395168C1F92B.TMP.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/Office365.php
Source: ~DF8ADC395168C1F92B.TMP.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/Othermail.php
Source: ~DF8ADC395168C1F92B.TMP.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/Outlook.php
Source: ~DF8ADC395168C1F92B.TMP.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/Outlook.phpBSign
Source: ~DF8ADC395168C1F92B.TMP.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/Outlook.phpp2/GG8/Office365.php
Source: {B49B7545-7DC0-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/Root
Source: ~DF8ADC395168C1F92B.TMP.1.dr, {B49B7545-7DC0-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://plateflippers.com/OH2/GG8/f
Source: Outlook[1].htm.2.dr String found in binary or memory: https://signup.live.com
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49779 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49770 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49751 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49776 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49778 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 49774 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49779
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49778
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49777
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49776
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49775
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49774
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49751
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49770
Source: unknown Network traffic detected: HTTP traffic on port 49775 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49777 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 162.241.127.18:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.241.127.18:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.241.127.18:443 -> 192.168.2.4:49770 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.4:49777 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.4:49778 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.4:49779 version: TLS 1.2
Source: classification engine Classification label: mal96.phis.win@3/42@5/3
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B49B7543-7DC0-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFE69385337526499A.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6904 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6904 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 363940 URL: https://plateflippers.com/O... Startdate: 05/03/2021 Architecture: WINDOWS Score: 96 15 plateflippers.com 2->15 23 Antivirus detection for URL or domain 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 5 other signatures 2->29 7 iexplore.exe 1 52 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 70 7->9         started        dnsIp6 17 plateflippers.com 162.241.127.18, 443, 49745, 49746 UNIFIEDLAYER-AS-1US United States 9->17 19 cdnjs.cloudflare.com 104.16.19.94, 443, 49758, 49760 CLOUDFLARENETUS United States 9->19 21 2 other IPs or domains 9->21 13 C:\Users\user\AppData\Local\...behaviorgraphG8[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
104.18.10.207
maxcdn.bootstrapcdn.com United States
13335 CLOUDFLARENETUS false
104.16.19.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false
162.241.127.18
plateflippers.com United States
46606 UNIFIEDLAYER-AS-1US false

Contacted Domains

Name IP Active
plateflippers.com 162.241.127.18 true
cdnjs.cloudflare.com 104.16.19.94 true
maxcdn.bootstrapcdn.com 104.18.10.207 true
code.jquery.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://plateflippers.com/OH2/GG8/Office365.php true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
https://plateflippers.com/OH2/GG8/Outlook.php true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
https://plateflippers.com/OH2/GG8/ true
    unknown
    https://plateflippers.com/OH2/GG8/Othermail.php true
    • SlashNext: Fake Login Page type: Phishing & Social Engineering
    unknown