Analysis Report #Ud83d#Udce0Lori's Fax VM-002.html

Overview

General Information

Sample Name: #Ud83d#Udce0Lori's Fax VM-002.html
Analysis ID: 412657
MD5: dd018534b722864fa8404de333621478
SHA1: e304a5ef3e4786cef59479da2ad59f69528763da
SHA256: 3c2937c71e855da9c18788eedf697d036b0ec62010f8b6ee2277696a8349d2ac
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
Yara detected HtmlPhish3
Yara detected Phisher
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://raghadstayl.com/phfax/todwll/aphcdnjr38g21buqsiwfemok6vyz9t540l7xdfyz3h15mti2cb8x4el967wvsja0nuqkogprxl3wvneaqy5izj0ckrftpsu7m9h218d46bgo?data=bG9yaUBjYXZhLmNvbQ== SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://raghadstayl.com/phfax/todwll/aphcdnjr38g21buqsiwfemok6vyz9t540l7xdfyz3h15mti2cb8x4el967wvsja0nuqkogprxl3wvneaqy5izj0ckrftpsu7m9h218d46bgo?data=bG9yaUBjYXZhLmNvbQ== Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 70118.pages.csv, type: HTML
Yara detected HtmlPhish3
Source: Yara match File source: 70118.pages.csv, type: HTML
Yara detected Phisher
Source: Yara match File source: #Ud83d#Udce0Lori's Fax VM-002.html, type: SAMPLE
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: unknown HTTPS traffic detected: 13.224.193.12:443 -> 192.168.2.5:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.79.62.225:443 -> 192.168.2.5:49741 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.79.62.225:443 -> 192.168.2.5:49740 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Ruleset Data.1.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.1.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^ equals www.facebook.com (Facebook)
Source: Ruleset Data.1.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^>- equals www.facebook.com (Facebook)
Source: Ruleset Data.1.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: doreenbrown.co.za
Source: 77EC63BDA74BD0D0E0426DC8F8008506.3.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: manifest.json0.1.dr, 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://accounts.google.com
Source: manifest.json0.1.dr, 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://apis.google.com
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.1.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.1.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.3.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr, 2c9daf34-360e-47e3-bd47-7cb8fb610dda.tmp.3.dr, 4d68cbbb-c5c6-4205-b99f-92b08a650e3e.tmp.3.dr String found in binary or memory: https://dns.google
Source: Current Session.1.dr String found in binary or memory: https://doreenbrown.co.za
Source: History.1.dr, History Provider Cache.1.dr String found in binary or memory: https://doreenbrown.co.za/tele/cd/?lori
Source: History.1.dr, History Provider Cache.1.dr String found in binary or memory: https://doreenbrown.co.za/tele/cd?lori
Source: manifest.json0.1.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.1.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.1.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.1.dr String found in binary or memory: https://hangouts.google.com/
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr String found in binary or memory: https://logo.clearbit.com
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.1.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr String found in binary or memory: https://r5---sn-n02xgoxufvg3-2gbs.gvt1.com
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr String found in binary or memory: https://raghadstayl.com
Source: History.1.dr, History Provider Cache.1.dr String found in binary or memory: https://raghadstayl.com/phfax/todwll/aphcdnjr38g21buqsiwfemok6vyz9t540l7xdfyz3h15mti2cb8x4el967wvsja
Source: Favicons.1.dr String found in binary or memory: https://raghadstayl.com/phfax/todwll/bG9yaUBjYXZhLmNvbQ==
Source: History Provider Cache.1.dr String found in binary or memory: https://raghadstayl.com/phfax/todwll/bG9yaUBjYXZhLmNvbQ==2
Source: History.1.dr String found in binary or memory: https://raghadstayl.com/phfax/todwll/bG9yaUBjYXZhLmNvbQ==signin
Source: Favicons.1.dr String found in binary or memory: https://raghadstayl.com/phfax/todwll/images/favicon.ico
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.1.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json83.1.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json83.1.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: manifest.json0.1.dr, 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://www.google.com
Source: manifest.json.1.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.1.dr String found in binary or memory: https://www.google.com;
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 4fd2613b-1edf-4333-9a79-0ba77e88f48e.tmp.3.dr, 5ea0e6f8-9224-475c-9543-23cce0815b5d.tmp.3.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.1.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49747 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49747
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 13.224.193.12:443 -> 192.168.2.5:49742 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.79.62.225:443 -> 192.168.2.5:49741 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.79.62.225:443 -> 192.168.2.5:49740 version: TLS 1.2
Source: classification engine Classification label: mal80.phis.winHTML@40/230@6/7
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-609CA1ED-6A4.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\908ec0d7-8b6f-4061-a457-c031b12bb4dc.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\#Ud83d#Udce0Lori's Fax VM-002.html'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,1771043468460452259,206189002582279930,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1940 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,1771043468460452259,206189002582279930,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1940 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 412657 Sample: #Ud83d#Udce0Lori's Fax VM-0... Startdate: 12/05/2021 Architecture: WINDOWS Score: 80 13 raghadstayl.com 2->13 15 logo.clearbit.com 2->15 17 d26p066pn2w0s0.cloudfront.net 2->17 29 Antivirus detection for URL or domain 2->29 31 Phishing site detected (based on favicon image match) 2->31 33 Yara detected HtmlPhish10 2->33 35 2 other signatures 2->35 7 chrome.exe 15 501 2->7         started        signatures3 process4 dnsIp5 19 192.168.2.1 unknown unknown 7->19 21 239.255.255.250 unknown Reserved 7->21 10 chrome.exe 20 7->10         started        process6 dnsIp7 23 doreenbrown.co.za 102.130.117.20, 443, 49707 xneeloZA South Africa 10->23 25 raghadstayl.com 199.79.62.225, 443, 49718, 49719 PUBLIC-DOMAIN-REGISTRYUS United States 10->25 27 5 other IPs or domains 10->27
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
199.79.62.225
raghadstayl.com United States
394695 PUBLIC-DOMAIN-REGISTRYUS false
216.58.212.129
googlehosted.l.googleusercontent.com United States
15169 GOOGLEUS false
102.130.117.20
doreenbrown.co.za South Africa
37153 xneeloZA false
13.224.193.12
d26p066pn2w0s0.cloudfront.net United States
16509 AMAZON-02US false
239.255.255.250
unknown Reserved
unknown unknown false

Private

IP
192.168.2.1
127.0.0.1

Contacted Domains

Name IP Active
d26p066pn2w0s0.cloudfront.net 13.224.193.12 true
doreenbrown.co.za 102.130.117.20 true
raghadstayl.com 199.79.62.225 true
googlehosted.l.googleusercontent.com 216.58.212.129 true
clients2.googleusercontent.com unknown unknown
logo.clearbit.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://raghadstayl.com/phfax/todwll/aphcdnjr38g21buqsiwfemok6vyz9t540l7xdfyz3h15mti2cb8x4el967wvsja0nuqkogprxl3wvneaqy5izj0ckrftpsu7m9h218d46bgo?data=bG9yaUBjYXZhLmNvbQ== true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown