Analysis Report https://myeducation.netc.navy.mil/webta/home.html

Overview

General Information

Sample URL: https://myeducation.netc.navy.mil/webta/home.html
Analysis ID: 387996
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 60%

Signatures

No high impact signatures.

Classification

There are no high impact signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 205.85.30.125:443 -> 192.168.2.7:49697 version: TLS 1.2
Source: unknown HTTPS traffic detected: 205.85.30.125:443 -> 192.168.2.7:49696 version: TLS 1.2
Source: global traffic HTTP traffic detected: GET /bridge/caCertsIssuedTofbcag4.p7c HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/10.0Host: repo.fpki.gov
Source: global traffic HTTP traffic detected: GET /bridge/caCertsIssuedTofbcag4.p7c HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/10.0Host: repo.fpki.gov
Source: global traffic HTTP traffic detected: GET /bridge/certificates/STRACBridgeRootCA.p7c HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/10.0Host: pki.strac.org
Source: unknown DNS traffic detected: queries for: myeducation.netc.navy.mil
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://aia.certipath.com/CertiPathBridgeCA-G3.p7c0
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://aia.makeidentitysafe.com/sibca.p7c0
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://cacer.symauth.com/mpki/FortiorSolutionsICA2018.p7c0
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://certstatus.fti.org0Z
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://certstatus.strac.org0L
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://certstatus.strac.org0Q
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://crl.certipath.com/CertiPathBridgeCA-G3.crl0
Source: 0192D13C45C9AB89127886822889A6160.2.dr String found in binary or memory: http://crl.defence.gov.au/pki/crl/ADIOCA.crl0
Source: 0192D13C45C9AB89127886822889A6160.2.dr String found in binary or memory: http://crl.defence.gov.au/pki0
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr, 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://crl.disa.mil/crl/DODINTEROPERABILITYROOTCA2.crl0
Source: 3EB18C7B0A0719AAA1141CD8C5D8430A0.2.dr String found in binary or memory: http://crl.disa.mil/crl/DODROOTCA3.crl0l
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr String found in binary or memory: http://crl.disa.mil/crl/USDODCCEBINTEROPERABILITYROOTCA2.crl0
Source: 07D9B6BD3671FEA6AAF5B49151819D290.2.dr String found in binary or memory: http://crl.disa.mil/issuedby/DODINTEROPERABILITYROOTCA2_IB.p7c0
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr String found in binary or memory: http://crl.disa.mil/issuedby/DODROOTCA3_IB.p7c0
Source: 07D9B6BD3671FEA6AAF5B49151819D29.2.dr String found in binary or memory: http://crl.disa.mil/issuedto/DODINTEROPERABILITYROOTCA2_IT.p7c
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr String found in binary or memory: http://crl.disa.mil/issuedto/DODINTEROPERABILITYROOTCA2_IT.p7c0
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C.2.dr String found in binary or memory: http://crl.disa.mil/issuedto/DODROOTCA3_IT.p7c
Source: 3EB18C7B0A0719AAA1141CD8C5D8430A0.2.dr String found in binary or memory: http://crl.disa.mil/issuedto/DODROOTCA3_IT.p7c0
Source: 0192D13C45C9AB89127886822889A616.2.dr String found in binary or memory: http://crl.disa.mil/issuedto/USDODCCEBINTEROPERABILITYROOTCA2_IT.p7c
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr String found in binary or memory: http://crl.disa.mil/issuedto/USDODCCEBINTEROPERABILITYROOTCA2_IT.p7c0
Source: 3EB18C7B0A0719AAA1141CD8C5D8430A.2.dr String found in binary or memory: http://crl.disa.mil/sign/DODSWCA_54.cer
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://crl.makeidentitysafe.com/sibca.crl0
Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 0192D13C45C9AB89127886822889A6160.2.dr String found in binary or memory: http://ocsp.defence.gov.au0j
Source: 3EB18C7B0A0719AAA1141CD8C5D8430A0.2.dr String found in binary or memory: http://ocsp.disa.mil0
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr String found in binary or memory: http://ocsp.disa.mil0J
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://ocsp.disa.mil0Q
Source: 92B4E4A7AF9423521FFED0DEDEE45E6C0.2.dr String found in binary or memory: http://ocsp.disa.mil0Z
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://pki-crl.symauth.com/FortiorSolutions/FortiorSolutionsICA2018.crl0
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://pki-ocsp.symauth.com0E
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://pki.fti.org/fti_ca/certificates/FTICA.p7c0
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://pki.fti.org/fti_ca/certificates/FTICA.p7c0%
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://pki.fti.org/fti_ca/crl/FTICA.crl0s
Source: 004E57B65F99837F48C0700F1E6CC681.2.dr String found in binary or memory: http://pki.strac.org/bridge/certificates/STRACBridgeRootCA.p7c
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://pki.strac.org/bridge/certificates/STRACBridgeRootCA.p7c0
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://pki.strac.org/bridge/crl/STRACBridgeRootCA.crl0
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://pub.carillonfedserv.com/CAcerts/CFSCA2.p7c0/
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://pub.carillonfedserv.com/CRL/CFSCA2.crl0
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://pub.carillonfedserv.com/ocsp0
Source: 004E57B65F99837F48C0700F1E6CC6810.2.dr String found in binary or memory: http://repo.fpki.gov/bridge/caCertsIssuedByfbcag4.p7c0
Source: 05762D5FA3F6598254134AC9682E08F4.2.dr String found in binary or memory: http://repo.fpki.gov/bridge/caCertsIssuedTofbcag4.p7c
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://repo.fpki.gov/bridge/caCertsIssuedTofbcag4.p7c07
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://repo.fpki.gov/bridge/fbcag4.crl0
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://repo.fpki.gov/fcpca/caCertsIssuedTofcpcag2.p7c07
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://repo.fpki.gov/fcpca/fcpcag2.crl0
Source: 4CCD903D73EB7EFE434F6D744EEFC5A3.2.dr String found in binary or memory: http://tscp-aia.symauth.com/IssuedTo-tscpbcasha256.p7c
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://tscp-aia.symauth.com/IssuedTo-tscpbcasha256.p7c0
Source: 05762D5FA3F6598254134AC9682E08F40.2.dr String found in binary or memory: http://tscp-crl.symauth.com/tscpbcasha256.crl0
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: http://tscp-sia.symauth.com/IssuedBy-tscpbcasha256.p7c0
Source: ~DF6B7D3C5DEAF48CCD.TMP.1.dr String found in binary or memory: https://myeducation.netc.navy.mil/webta/home.html
Source: {45CF7CBC-9E5B-11EB-90E6-ECF4BB82F7E0}.dat.1.dr String found in binary or memory: https://myeducation.netc.navy.mil/webta/home.htmlRoot
Source: 4CCD903D73EB7EFE434F6D744EEFC5A30.2.dr String found in binary or memory: https://pub.carillonfedserv.com/CertificatePolicy.pdf0
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49697
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49696
Source: unknown Network traffic detected: HTTP traffic on port 49696 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49697 -> 443
Source: unknown HTTPS traffic detected: 205.85.30.125:443 -> 192.168.2.7:49697 version: TLS 1.2
Source: unknown HTTPS traffic detected: 205.85.30.125:443 -> 192.168.2.7:49696 version: TLS 1.2
Source: classification engine Classification label: unknown0.win@3/30@6/3
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{45CF7CBA-9E5B-11EB-90E6-ECF4BB82F7E0}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user~1\AppData\Local\Temp\~DF997E2E9D72C1F602.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1976 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1976 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 387996 URL: https://myeducation.netc.na... Startdate: 15/04/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 1 51 2->5         started        process3 7 iexplore.exe 52 5->7         started        dnsIp4 10 myeducation.netc.navy.mil 205.85.30.125, 443, 49696, 49697 DNIC-ASBLK-00616-00665US United States 7->10 12 pki.strac.org 172.67.10.220, 49707, 80 CLOUDFLARENETUS United States 7->12 14 5 other IPs or domains 7->14
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
205.85.30.125
myeducation.netc.navy.mil United States
665 DNIC-ASBLK-00616-00665US false
13.32.240.46
d1j5ckqeil9o7.cloudfront.net United States
16509 AMAZON-02US false
172.67.10.220
pki.strac.org United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
pki.strac.org 172.67.10.220 true
d1j5ckqeil9o7.cloudfront.net 13.32.240.46 true
myeducation.netc.navy.mil 205.85.30.125 true
tscp-aia.symauth.com unknown unknown
repo.fpki.gov unknown unknown
crl.disa.mil unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://pki.strac.org/bridge/certificates/STRACBridgeRootCA.p7c false
  • Avira URL Cloud: safe
unknown
http://repo.fpki.gov/bridge/caCertsIssuedTofbcag4.p7c false
  • Avira URL Cloud: safe
unknown