Analysis Report https://goldenislesskincare.com/office365/index.php

Overview

General Information

Sample URL: https://goldenislesskincare.com/office365/index.php
Analysis ID: 385431
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://goldenislesskincare.com/office365/index.php UrlScan: detection malicious, Label: phishing brand: microsoft Perma Link
Antivirus detection for URL or domain
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Source: https://goldenislesskincare.com/office365/login.php# UrlScan: Label: phishing brand: microsoft Perma Link
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 UrlScan: Label: phishing brand: microsoft Perma Link

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 936905.0.links.csv, type: HTML
Source: Yara match File source: 936905.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\login[1].htm, type: DROPPED
Phishing site detected (based on image similarity)
Source: https://goldenislesskincare.com/office365/assets/images/logo.svg Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Source: https://goldenislesskincare.com/office365/assets/images/background.jpg Matcher: Found strong image similarity, brand: Microsoft Jump to dropped file
Phishing site detected (based on logo template match)
Source: https://goldenislesskincare.com/office365/login.php# Matcher: Template: microsoft matched
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: Number of links: 0
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: Number of links: 0
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: Number of links: 0
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: No <meta name="author".. found
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: No <meta name="author".. found
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: No <meta name="author".. found
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: No <meta name="author".. found
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: No <meta name="copyright".. found
Source: https://goldenislesskincare.com/office365/login.php# HTTP Parser: No <meta name="copyright".. found
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: No <meta name="copyright".. found
Source: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 64.187.225.237:443 -> 192.168.2.5:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.187.225.237:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.187.225.237:443 -> 192.168.2.5:49712 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: goldenislesskincare.com
Source: popper.min[1].js.4.dr String found in binary or memory: http://opensource.org/licenses/MIT).
Source: login[1].htm.4.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js
Source: login[1].htm.4.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.3/umd/popper.min.js
Source: bootstrap.min[1].css.4.dr, bootstrap.min[1].js.4.dr String found in binary or memory: https://getbootstrap.com/)
Source: bootstrap.min[1].css.4.dr, bootstrap.min[1].js.4.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap.min[1].js.4.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: imagestore.dat.4.dr String found in binary or memory: https://goldenislesskincare.com/office365/assets/images/favicon.ico
Source: imagestore.dat.4.dr String found in binary or memory: https://goldenislesskincare.com/office365/assets/images/favicon.ico~
Source: imagestore.dat.4.dr String found in binary or memory: https://goldenislesskincare.com/office365/assets/images/favicon.ico~(
Source: ~DFF4F623BDEC391A40.TMP.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/index.php
Source: {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/index.phpRoot
Source: {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/index.phpncare.com/office365/login.phpRoot
Source: {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.p=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&
Source: {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.pd1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679
Source: ~DFF4F623BDEC391A40.TMP.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.php
Source: ~DFF4F623BDEC391A40.TMP.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.php#=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737
Source: {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnhp
Source: ~DFF4F623BDEC391A40.TMP.2.dr, {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.67
Source: {1B20509C-9BD2-11EB-90E5-ECF4BB570DC9}.dat.2.dr String found in binary or memory: https://goldenislesskincare.com/office365/login.phpncare.com/office365/login.php#wa=wsignin1.0&rpsnv
Source: login[1].htm.4.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.1.3/css/bootstrap.min.css
Source: login[1].htm.4.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49702 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49702
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown HTTPS traffic detected: 64.187.225.237:443 -> 192.168.2.5:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.187.225.237:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.18.10.207:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 64.187.225.237:443 -> 192.168.2.5:49712 version: TLS 1.2
Source: classification engine Classification label: mal80.phis.win@3/18@4/3
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1B20509A-9BD2-11EB-90E5-ECF4BB570DC9}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DFB5A58295C3633009.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2548 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2548 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385431 URL: https://goldenislesskincare... Startdate: 12/04/2021 Architecture: WINDOWS Score: 80 15 goldenislesskincare.com 2->15 23 Antivirus detection for URL or domain 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Phishing site detected (based on favicon image match) 2->27 29 3 other signatures 2->29 7 iexplore.exe 1 51 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 45 7->9         started        dnsIp6 17 goldenislesskincare.com 64.187.225.237, 443, 49702, 49703 QUICKPACKETUS United States 9->17 19 cdnjs.cloudflare.com 104.16.18.94, 443, 49705, 49706 CLOUDFLARENETUS United States 9->19 21 maxcdn.bootstrapcdn.com 104.18.10.207, 443, 49707, 49708 CLOUDFLARENETUS United States 9->21 13 C:\Users\user\AppData\Local\...\login[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
64.187.225.237
goldenislesskincare.com United States
46261 QUICKPACKETUS false
104.18.10.207
maxcdn.bootstrapcdn.com United States
13335 CLOUDFLARENETUS false
104.16.18.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
cdnjs.cloudflare.com 104.16.18.94 true
maxcdn.bootstrapcdn.com 104.18.10.207 true
goldenislesskincare.com 64.187.225.237 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://goldenislesskincare.com/office365/login.php# true unknown
https://goldenislesskincare.com/office365/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 true
  • 100%, UrlScan, Browse
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown