Analysis Report receipt-xxxx.htm

Overview

General Information

Sample Name: receipt-xxxx.htm
Analysis ID: 383585
MD5: 2ded001890d716d7a47887df38c01102
SHA1: ec0914e310db45e38e54728634b8c9e7f7bb6e70
SHA256: 9e0a82abb1eeacfd1b7bcb8c67bff4ad686a38de8119e71d1d187db2d350c986
Infos:

Most interesting Screenshot:

Errors
  • URL in Office document is not reachable.

Detection

Phisher
Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected Phisher
JA3 SSL client fingerprint seen in connection with other malware

Classification

Phishing:

barindex
Yara detected Phisher
Source: Yara match File source: receipt-xxxx.htm, type: SAMPLE
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 162.241.124.32:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.241.124.32:443 -> 192.168.2.3:49725 version: TLS 1.2

Networking:

barindex
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: global traffic HTTP traffic detected: GET /12gfr/ HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: vsp.wayshop.grConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: vsp.wayshop.gr
Source: receipt-xxxx.htm String found in binary or memory: http://Vsp.wayshop.gr/12gfr/#alec.mahmood
Source: {F12A48C6-9836-11EB-90E4-ECF4BB862DED}.dat.1.dr String found in binary or memory: http://vsp.wayshop.gr/
Source: ~DF6DAB1688D85D34DD.TMP.1.dr String found in binary or memory: http://vsp.wayshop.gr/12gfr/
Source: ~DF6DAB1688D85D34DD.TMP.1.dr String found in binary or memory: http://vsp.wayshop.gr/12gfr/#alec.mahmood
Source: ~DF6DAB1688D85D34DD.TMP.1.dr String found in binary or memory: http://vsp.wayshop.gr/12gfr/8
Source: 12gfr[1].htm.2.dr String found in binary or memory: https://aimlessanimation.com/2020/?email=
Source: ~DF6DAB1688D85D34DD.TMP.1.dr String found in binary or memory: https://aimlessanimation.com/2020/?email=alec.mahmood
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown HTTPS traffic detected: 162.241.124.32:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.241.124.32:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: classification engine Classification label: mal48.phis.winHTM@3/15@3/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFB42B6B68F6C0AA1B.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6584 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6584 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 383585 Sample: receipt-xxxx.htm Startdate: 07/04/2021 Architecture: WINDOWS Score: 48 15 Yara detected Phisher 2->15 6 iexplore.exe 2 64 2->6         started        process3 process4 8 iexplore.exe 44 6->8         started        dnsIp5 11 aimlessanimation.com 162.241.124.32, 443, 49724, 49725 UNIFIEDLAYER-AS-1US United States 8->11 13 vsp.wayshop.gr 88.99.136.47, 49721, 49722, 80 HETZNER-ASDE Germany 8->13
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
88.99.136.47
vsp.wayshop.gr Germany
24940 HETZNER-ASDE false
162.241.124.32
aimlessanimation.com United States
46606 UNIFIEDLAYER-AS-1US false

Contacted Domains

Name IP Active
aimlessanimation.com 162.241.124.32 true
vsp.wayshop.gr 88.99.136.47 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://vsp.wayshop.gr/12gfr/ false
  • Avira URL Cloud: safe
unknown