Analysis Report RemitSwift119353 xlsx.htm

Overview

General Information

Sample Name: RemitSwift119353 xlsx.htm
Analysis ID: 385276
MD5: ca3a56c1d6eebe70576bb7196f53b1d0
SHA1: 72d5d6ef29bd345f17dcff7c299f47558e745d3e
SHA256: 3a6422545bcba48ce42dcbce1838b7042d8e5546f2ae527af18e7cd8b53ee879
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
Yara detected HtmlPhish14
Yara detected obfuscated html page
Obfuscated HTML file found
Phishing site detected (based on logo template match)
HTML title does not match URL
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
None HTTPS page querying sensitive user data (password, username or email)
Suspicious form URL found

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: RemitSwift119353 xlsx.htm Virustotal: Detection: 20% Perma Link

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 610930.0.links.csv, type: HTML
Source: Yara match File source: 610930.pages.csv, type: HTML
Yara detected HtmlPhish14
Source: Yara match File source: 610930.0.links.csv, type: HTML
Source: Yara match File source: 610930.pages.csv, type: HTML
Yara detected obfuscated html page
Source: Yara match File source: RemitSwift119353 xlsx.htm, type: SAMPLE
Phishing site detected (based on logo template match)
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Matcher: Template: microsoft matched
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm Matcher: Template: microsoft matched
HTML title does not match URL
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: Title: Sign in to your account does not match URL
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: Title: Sign in to your account does not match URL
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: Title: Sign in to your account does not match URL
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: Title: Sign in to your account does not match URL
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: Has password / email / username input fields
Suspicious form URL found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: Form action: https://ggman.my//routes/index.php
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: Form action: https://ggman.my//routes/index.php
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: Form action: https://ggman.my//routes/index.php
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: Form action: https://ggman.my//routes/index.php
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.4:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.4:49740 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 217.160.0.18 217.160.0.18
Source: Joe Sandbox View IP Address: 192.229.221.185 192.229.221.185
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown DNS traffic detected: queries for: clientconfig.passport.net
Source: 17-f90ef1[1].js.3.dr String found in binary or memory: http://github.com/requirejs/almond/LICENSE
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://aka.ms/redeemrewards
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://ec.europa.eu/consumers/odr
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://ec.europa.eu/consumers/odr);
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://mixer.com/contact
Source: {FB42B5C1-9B60-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://privacy.micros
Source: ~DF21D4BF00FAEEC794.TMP.1.dr String found in binary or memory: https://privacy.microsoft./en-GB/privacystatement
Source: ~DF21D4BF00FAEEC794.TMP.1.dr String found in binary or memory: https://privacy.microsoft./en-GB/privacystatementsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.google.com/intl/en_ALL/help/terms_maps.html
Source: {FB42B5C1-9B60-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://www.microsoft.
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.skype.com/go/allrates
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.skype.com/go/emergency
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.skype.com/go/emergency/
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.skype.com/go/legal
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.skype.com/go/legal.broadcast
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.skype.com/go/store.reactivate.credit
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.xbox.com/xbox-game-studios
Source: servicesagreement[1].htm.3.dr String found in binary or memory: https://www.xbox.com/xbox-game-studios)
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.4:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.4:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: classification engine Classification label: mal88.phis.evad.winHTM@3/31@9/4
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FB42B5BF-9B60-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFFED1E8E288005E12.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: RemitSwift119353 xlsx.htm Virustotal: Detection: 20%
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6780 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6780 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Data Obfuscation:

barindex
Obfuscated HTML file found
Source: RemitSwift119353 xlsx.htm Initial file: Did not found title: "Sign in to your account" in HTML/HTM content
Source: RemitSwift119353 xlsx.htm Initial file: Did not found title: "Sign in to your account" in HTML/HTM content
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385276 Sample: RemitSwift119353 xlsx.htm Startdate: 12/04/2021 Architecture: WINDOWS Score: 88 12 logincdn.msauth.net 2->12 14 cs1227.wpc.alphacdn.net 2->14 16 clientconfig.passport.net 2->16 24 Multi AV Scanner detection for submitted file 2->24 26 Phishing site detected (based on favicon image match) 2->26 28 Yara detected HtmlPhish14 2->28 30 4 other signatures 2->30 7 iexplore.exe 1 54 2->7         started        signatures3 process4 process5 9 iexplore.exe 1 59 7->9         started        dnsIp6 18 raktaxis.co.uk 217.160.0.18, 443, 49731, 49732 ONEANDONE-ASBrauerstrasse48DE Germany 9->18 20 cs1100.wpc.omegacdn.net 152.199.23.37, 443, 49728, 49729 EDGECASTUS United States 9->20 22 7 other IPs or domains 9->22
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
217.160.0.18
raktaxis.co.uk Germany
8560 ONEANDONE-ASBrauerstrasse48DE false
192.229.221.185
cs1227.wpc.alphacdn.net United States
15133 EDGECASTUS false
152.199.23.37
cs1100.wpc.omegacdn.net United States
15133 EDGECASTUS false

Private

IP
192.168.2.1

Contacted Domains

Name IP Active
cs1100.wpc.omegacdn.net 152.199.23.37 true
cs1227.wpc.alphacdn.net 192.229.221.185 true
raktaxis.co.uk 217.160.0.18 true
logincdn.msauth.net unknown unknown
clientconfig.passport.net unknown unknown
aadcdn.msftauth.net unknown unknown
ajax.aspnetcdn.com unknown unknown
privacy.microsoft unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=gunnar.grech@go.com.mt&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 true
    low
    file:///C:/Users/user/Desktop/RemitSwift119353%20xlsx.htm true
      low
      https://privacy.microsoft./en-GB/privacystatement true
        unknown