Analysis Report https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc

Overview

General Information

Sample URL: https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc
Analysis ID: 384773
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found
Suspicious form URL found

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: 715575.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\li6orbsabcm5o36s3wlba8p8[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://erffggf.cf/jd/sharepoint-0/img/logo.png Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Phishing site detected (based on logo template match)
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Number of links: 0
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Title: Sharing Link Validation does not match URL
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Title: Sharing Link Validation does not match URL
Invalid T&C link found
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Invalid link: Privacy & Cookies
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Invalid link: Privacy & Cookies
Suspicious form URL found
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Form action: verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: Form action: verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: No <meta name="author".. found
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: No <meta name="author".. found
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: No <meta name="copyright".. found
Source: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 198.54.125.84:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 198.54.125.84:443 -> 192.168.2.4:49762 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: app.box.com
Source: preview[1].js.4.dr String found in binary or memory: http://blog.stevenlevithan.com/archives/parseuri
Source: preview[1].js.4.dr String found in binary or memory: http://jedwatson.github.io/classnames
Source: core.min[1].js.4.dr String found in binary or memory: http://rock.mit-license.org
Source: preview[1].css.4.dr String found in binary or memory: http://www.box.com)
Source: Servpro[1].pdf.4.dr String found in binary or memory: https://955b0f04ec1842b79e6727b6d5210de0.svc.dynamics.com/t/r/t1CFDnMTkqEtehk9U1_TVxBOL5s3sA69Juxjkt
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.Root
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.box.cRoot
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.box.cbox.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc8Servpro.pdf
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wcRoot
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://app.box.csharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxnbox.com/s/ldmpej4bc
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/android-chrome-192x192-96i97M.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-114x114-busq-D.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-120x120-K-u4U5.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-144x144-va9pYs.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-152x152-r5tWgh.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-180x180-tV001c.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-57x57-fLlEpj.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-60x60-Uv0qzu.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-72x72-7aVqne.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/apple-touch-icon-76x76-ZVGnRV.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/browserconfig-fdBReK.xml
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-16x16-_kQSW4.png
Source: imagestore.dat.4.dr, ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-32x32-VwW37b.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-96x96-XU7UE1.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/favicon-yz-tj-.ico
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/manifest-rw1AEP.json
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/mstile-144x144-pllCM8.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-16x16-Ou5N87.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-32x32-brwW_W.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-96x96-TOQ9Kg.png
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/notification-favicon-EHWWyP.ico
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/_assets/img/favicons/safari-pinned-tab-jyt2W4.svg
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/enduser/app.62d2420f86.css
Source: messagecenter~preview-components~uploads-manager-enduser.de71b9769a[1].css.4.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Bold.woff)
Source: messagecenter~preview-components~uploads-manager-enduser.de71b9769a[1].css.4.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Bold.woff2)
Source: messagecenter~preview-components~uploads-manager-enduser.de71b9769a[1].css.4.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Regular.woff)
Source: messagecenter~preview-components~uploads-manager-enduser.de71b9769a[1].css.4.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-Regular.woff2)
Source: ldmpej4bczs3ra2es3qlr0qrqifh99wc[1].htm.4.dr String found in binary or memory: https://cdn01.boxcdn.net/fonts/1.0.2/lato/Lato-woff.css
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://erffggf.cf/jd/
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://erffggf.cf/jd/ldmpej4bczs3ra2es3qlr0qrqifh99wc
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn
Source: {9EFB6EFB-995A-11EB-90EB-ECF4BBEA1588}.dat.2.dr, ~DF1D930BD22B0D5A83.TMP.2.dr String found in binary or memory: https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fi
Source: preview[1].js.4.dr String found in binary or memory: https://feross.org
Source: li6orbsabcm5o36s3wlba8p8[1].htm.4.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: css[1].css.4.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UNirkOUuhv.woff)
Source: preview[1].js.4.dr String found in binary or memory: https://github.com/derek-watson/jsUri
Source: core.min[1].js.4.dr String found in binary or memory: https://github.com/zloirock/core-js
Source: preview[1].js.4.dr String found in binary or memory: https://support.box.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.201:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.197:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.235.236.200:443 -> 192.168.2.4:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 198.54.125.84:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 198.54.125.84:443 -> 192.168.2.4:49762 version: TLS 1.2
Source: classification engine Classification label: mal72.phis.win@3/60@7/5
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9EFB6EF9-995A-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF999979F56005C7E8.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6644 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6644 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Windows\SysWOW64\Macromed\Flash\ss.cfg Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Next
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 384773 URL: https://app.box.com/s/ldmpe... Startdate: 09/04/2021 Architecture: WINDOWS Score: 72 15 cdn01.boxcdn.net 2->15 23 Antivirus detection for URL or domain 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Yara detected HtmlPhish10 2->27 29 2 other signatures 2->29 7 iexplore.exe 5 52 2->7         started        signatures3 process4 process5 9 iexplore.exe 5 92 7->9         started        dnsIp6 17 erffggf.cf 198.54.125.84, 443, 49762, 49763 NAMECHEAP-NETUS United States 9->17 19 api.box.com 185.235.236.197, 443, 49745, 49746 BOXNETUS Germany 9->19 21 6 other IPs or domains 9->21 13 C:\Users\...\li6orbsabcm5o36s3wlba8p8[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
185.235.236.200
public.boxcloud.com Germany
33011 BOXNETUS false
185.235.236.197
api.box.com Germany
33011 BOXNETUS false
185.235.236.201
app.box.com Germany
33011 BOXNETUS false
198.54.125.84
erffggf.cf United States
22612 NAMECHEAP-NETUS false

Private

IP
192.168.2.1

Contacted Domains

Name IP Active
api.box.com 185.235.236.197 true
public.boxcloud.com 185.235.236.200 true
app.box.com 185.235.236.201 true
erffggf.cf 198.54.125.84 true
cdn01.boxcdn.net unknown unknown
955b0f04ec1842b79e6727b6d5210de0.svc.dynamics.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://erffggf.cf/jd/sharepoint-0/li6orbsabcm5o36s3wlba8p8.php?rand=13InboxLightaspxn.1774256418&fid&1252899642&fid.1&fav.1&email= true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
https://app.box.com/s/ldmpej4bczs3ra2es3qlr0qrqifh99wc false
    high