Analysis Report https://edulibsworg.ru/ertyhtbgrvfcdsetrbgv4refcd.php

Overview

General Information

Sample URL: https://edulibsworg.ru/ertyhtbgrvfcdsetrbgv4refcd.php
Analysis ID: 364015
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish_10
HTML body contains low number of good links
HTML title does not match URL

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: 585948.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\kujyhnbgfvdctyu[1].htm, type: DROPPED
HTML body contains low number of good links
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: Number of links: 0
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: Title: ...Login... does not match URL
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: Title: ...Login... does not match URL
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: No <meta name="author".. found
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: No <meta name="author".. found
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: No <meta name="copyright".. found
Source: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_50916076bcb9a742\MSVCR90.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 103.153.182.185:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.153.182.185:443 -> 192.168.2.22:49166 version: TLS 1.2
Source: unknown HTTPS traffic detected: 134.70.24.1:443 -> 192.168.2.22:49172 version: TLS 1.2
Source: unknown HTTPS traffic detected: 134.70.24.1:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49173 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49174 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.22:49184 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.22:49183 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49185 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49186 version: TLS 1.2
Source: C:\Program Files\Internet Explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\favicon[1].ico Jump to behavior
Source: unknown DNS traffic detected: queries for: edulibsworg.ru
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.1.dr String found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F8008506.1.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: popper.min[1].js.1.dr String found in binary or memory: http://opensource.org/licenses/MIT).
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://abogadosparatodoswnet.ru/ytrgfrtyhnbgfvdc25feb/next.php
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://code.jquery.com/jquery-3.2.1.slim.min.js
Source: free.min[1].css.1.dr String found in binary or memory: https://fontawesome.com
Source: free.min[1].css.1.dr String found in binary or memory: https://fontawesome.com/license/free
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Archivo
Source: css[1].css.1.dr String found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v12/tss0ApVBdCYD5Q7hcxTE1ArZ0bbwiXo.woff)
Source: bootstrap.min[1].css.1.dr, bootstrap.min[1].js.1.dr String found in binary or memory: https://getbootstrap.com)
Source: bootstrap.min[1].js0.1.dr String found in binary or memory: https://getbootstrap.com/)
Source: bootstrap.min[1].css.1.dr, bootstrap.min[1].js0.1.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap.min[1].js0.1.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://kit.fontawesome.com/585b051251.js
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://logo.clearbit.com/
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
Source: {BD316631-7E18-11EB-ADCF-ECF4BBB5915B}.dat.0.dr, ~DF61C7615D0C13BE7F.TMP.0.dr String found in binary or memory: https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnb
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://storage.googleapis.com/oijhgbfvergyt4res.appspot.com/landing.css
Source: kujyhnbgfvdctyu[1].htm.1.dr String found in binary or memory: https://storage.googleapis.com/oijhgbfvergyt4res.appspot.com/weblogo.png
Source: unknown Network traffic detected: HTTP traffic on port 49184 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49185 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49186 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49166
Source: unknown Network traffic detected: HTTP traffic on port 49183 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49165 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49165
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49186
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49174
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49185
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49184
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49183
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49166 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49174 -> 443
Source: unknown HTTPS traffic detected: 103.153.182.185:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.153.182.185:443 -> 192.168.2.22:49166 version: TLS 1.2
Source: unknown HTTPS traffic detected: 134.70.24.1:443 -> 192.168.2.22:49172 version: TLS 1.2
Source: unknown HTTPS traffic detected: 134.70.24.1:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49173 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49174 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.22:49184 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.22:49183 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49185 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.22:49186 version: TLS 1.2
Source: classification engine Classification label: mal56.phis.win@3/29@9/4
Source: C:\Program Files\Internet Explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD31662F-7E18-11EB-ADCF-ECF4BBB5915B}.dat Jump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF560C05FD321D069A.TMP Jump to behavior
Source: C:\Program Files\Internet Explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:268 CREDAT:275457 /prefetch:2
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:268 CREDAT:275457 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_50916076bcb9a742\MSVCR90.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 364015 URL: https://edulibsworg.ru/erty... Startdate: 05/03/2021 Architecture: WINDOWS Score: 56 15 favicon.ico 2->15 23 Antivirus detection for URL or domain 2->23 25 Yara detected HtmlPhish_10 2->25 7 iexplore.exe 7 37 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 35 7->9         started        dnsIp6 17 edulibsworg.ru 103.153.182.185, 443, 49165, 49166 TWIDC-AS-APTWIDCLimitedHK unknown 9->17 19 objectstorage.us-ashburn-1.oci.oraclecloud.com 134.70.24.1, 443, 49171, 49172 ORACLE-BMC-31898US United States 9->19 21 7 other IPs or domains 9->21 13 C:\Users\user\...\kujyhnbgfvdctyu[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
104.18.10.207
stackpath.bootstrapcdn.com United States
13335 CLOUDFLARENETUS false
103.153.182.185
edulibsworg.ru unknown
134687 TWIDC-AS-APTWIDCLimitedHK false
104.16.18.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false
134.70.24.1
objectstorage.us-ashburn-1.oci.oraclecloud.com United States
31898 ORACLE-BMC-31898US false

Contacted Domains

Name IP Active
stackpath.bootstrapcdn.com 104.18.10.207 true
cdnjs.cloudflare.com 104.16.18.94 true
maxcdn.bootstrapcdn.com 104.18.10.207 true
edulibsworg.ru 103.153.182.185 true
objectstorage.us-ashburn-1.oci.oraclecloud.com 134.70.24.1 true
ka-f.fontawesome.com unknown unknown
code.jquery.com unknown unknown
kit.fontawesome.com unknown unknown
objectstorage.us-ashburn-1.oraclecloud.com unknown unknown
favicon.ico unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://objectstorage.us-ashburn-1.oraclecloud.com/n/idx0jpmo1evz/b/ythgrffrtyujnhtbgvrfcd/o/kujyhnbgfvdctyu.html false
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
high