Analysis Report %F0%9F%93%A9-Tina_Cfisd_HP29VF.htm

Overview

General Information

Sample Name: %F0%9F%93%A9-Tina_Cfisd_HP29VF.htm
Analysis ID: 364055
MD5: 55e8459fd775c236c493f21f36a6ba45
SHA1: e7a99dbb4450838203dba66b03ec60c78dac50f7
SHA256: bd841306b786d46ef57695e1f458a58140684626d444baf3c783ae439fa11ead
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish_10
Yara detected obfuscated html page
HTML body contains low number of good links
HTML title does not match URL
IP address seen in connection with other malware
Invalid 'forgot password' link found
Invalid T&C link found
JA3 SSL client fingerprint seen in connection with other malware
Unusual large HTML page

Classification

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: 21604.pages.csv, type: HTML
Yara detected obfuscated html page
Source: Yara match File source: %F0%9F%93%A9-Tina_Cfisd_HP29VF.htm, type: SAMPLE
HTML body contains low number of good links
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Number of links: 0
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Title: Sign in to Outlook does not match URL
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Invalid link: Forgot my password
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Invalid link: Forgot my password
Invalid T&C link found
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Invalid link: Terms of use
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Invalid link: Privacy & cookies
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Invalid link: Terms of use
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Invalid link: Privacy & cookies
Unusual large HTML page
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Total size: 1901989
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: Total size: 1901989
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: No <meta name="author".. found
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: No <meta name="author".. found
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: No <meta name="copyright".. found
Source: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= HTTP Parser: No <meta name="copyright".. found

Compliance:

barindex
Creates a directory in C:\Program Files
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Creates license or readme file
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\6396_291140863\LICENSE.txt Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 52.52.65.159:443 -> 192.168.2.3:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.52.65.159:443 -> 192.168.2.3:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.52.65.159:443 -> 192.168.2.3:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.192.142.116:443 -> 192.168.2.3:49712 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 152.199.23.72 152.199.23.72
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^ equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^Z equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: convoy.app
Source: 77EC63BDA74BD0D0E0426DC8F8008506.1.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://aadcdn.msauthimages.net
Source: manifest.json0.0.dr, 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: Ruleset Data.0.dr String found in binary or memory: https://adwords.google.com/
Source: manifest.json0.0.dr, 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: History.0.dr String found in binary or memory: https://cnvy.app.link/O9lDJUMI3U?routeType=Offers&~channel=repeat_request_reload_email&~email_featur
Source: 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://content-autofill.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: History.0.dr String found in binary or memory: https://convoy.app/search?routeType=Offers&~channel=repeat_request_reload_email&~email_feature=repea
Source: 004b85ab-df46-44d4-b943-340acdc4ef9b.tmp.1.dr, 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr, 750e1841-fc76-49f9-a83d-9675ea47ac15.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://oomslalaservice.com
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://play.google.com
Source: 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://r5---sn-4g5e6nz7.gvt1.com
Source: 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: Current Session.0.dr String found in binary or memory: https://sharepointuploadsfus5.z13.web.core.windows.net/#
Source: History.0.dr String found in binary or memory: https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQi
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: Current Session.0.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://storage.googleapis.com
Source: History.0.dr String found in binary or memory: https://storage.googleapis.com/shmxcpgboxsao1.appspot.com/index.html#dGluYS5rYXJtb3V0QGNmaXNkLm5ldA=
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://t.dripemail2.com
Source: History.0.dr String found in binary or memory: https://t.dripemail2.com/c/eyJhY2NvdW50X2lkIjoiNDgxODMzMSIsImRlbGl2ZXJ5X2lkIjoibTllYTV3NTFkdWFsbWJpa
Source: manifest.json0.0.dr, 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 432b2f1f-5519-4732-b9e6-7a8d72085144.tmp.1.dr, 372e50c5-ba47-47e8-9a8b-c80a5d221ffc.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49702 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49702
Source: unknown HTTPS traffic detected: 52.52.65.159:443 -> 192.168.2.3:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.52.65.159:443 -> 192.168.2.3:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.52.65.159:443 -> 192.168.2.3:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.192.142.116:443 -> 192.168.2.3:49712 version: TLS 1.2
Source: classification engine Classification label: mal56.phis.winHTM@35/175@7/10
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6042F34C-18FC.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\701b3d3c-ac60-49c1-ac8c-fc4cc3e28ae3.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized 'C:\Users\user\Desktop\%F0%9F%93%A9-Tina_Cfisd_HP29VF.htm'
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1520,6376799053035196430,7750294235629446408,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1736 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1520,6376799053035196430,7750294235629446408,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1736 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\6396_291140863\LICENSE.txt Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 364055 Sample: %F0%9F%93%A9-Tina_Cfisd_HP2... Startdate: 05/03/2021 Architecture: WINDOWS Score: 56 22 Yara detected HtmlPhish_10 2->22 24 Yara detected obfuscated html page 2->24 6 chrome.exe 14 432 2->6         started        process3 dnsIp4 12 192.168.2.1 unknown unknown 6->12 14 239.255.255.250 unknown Reserved 6->14 9 chrome.exe 19 6->9         started        process5 dnsIp6 16 oomslalaservice.com 104.219.248.112, 443, 49727, 49730 NAMECHEAP-NETUS United States 9->16 18 web.blz22prdstr18a.store.core.windows.net 20.60.7.97, 443, 49719, 49720 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->18 20 9 other IPs or domains 9->20
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
152.199.23.72
cs1025.wpc.upsiloncdn.net United States
15133 EDGECASTUS false
104.219.248.112
oomslalaservice.com United States
22612 NAMECHEAP-NETUS false
20.60.7.97
web.blz22prdstr18a.store.core.windows.net United States
8075 MICROSOFT-CORP-MSN-AS-BLOCKUS false
52.52.65.159
convoy.app United States
16509 AMAZON-02US false
34.192.142.116
t.dripemail2.com United States
14618 AMAZON-AESUS false
239.255.255.250
unknown Reserved
unknown unknown false
172.217.23.65
googlehosted.l.googleusercontent.com United States
15169 GOOGLEUS false
13.224.193.100
cnvy.app.link United States
16509 AMAZON-02US false

Private

IP
192.168.2.1
127.0.0.1

Contacted Domains

Name IP Active
web.blz22prdstr18a.store.core.windows.net 20.60.7.97 true
oomslalaservice.com 104.219.248.112 true
t.dripemail2.com 34.192.142.116 true
cnvy.app.link 13.224.193.100 true
cs1025.wpc.upsiloncdn.net 152.199.23.72 true
convoy.app 52.52.65.159 true
googlehosted.l.googleusercontent.com 172.217.23.65 true
clients2.googleusercontent.com unknown unknown
aadcdn.msauthimages.net unknown unknown
sharepointuploadsfus5.z13.web.core.windows.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://sharepointuploadsfus5.z13.web.core.windows.net/#eyJlbWFpbCI6InRpbmEua2FybW91dEBjZmlzZC5uZXQiLCJyYW5kIjoiZG1NcFBXSm42eXFGWjRnM25KMzM0bDZ3OHlZMzZlOWlHbTlMa0RQSFdGbHoxN1RoM0RRNGtUNmx6aGpyIn0= false
    high