Analysis Report 5781525.html

Overview

General Information

Sample Name: 5781525.html
Analysis ID: 412702
MD5: 963645e8c8c7d2d5a505148091b9c210
SHA1: 85fd4aa0118f6e4396efa21ea2c0ddbeb16606a3
SHA256: 054dfe9971347a123b2403c59f0ee17dc6c90861d7b9e2815c512c9b4cf57cd1
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
Yara detected HtmlPhish44
Yara detected obfuscated html page
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
IP address seen in connection with other malware
Invalid 'forgot password' link found
Invalid T&C link found
JA3 SSL client fingerprint seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: 5781525.html Avira: detected
Antivirus detection for URL or domain
Source: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg== SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Multi AV Scanner detection for submitted file
Source: 5781525.html Virustotal: Detection: 16% Perma Link

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 69819.pages.csv, type: HTML
Yara detected HtmlPhish44
Source: Yara match File source: 5781525.html, type: SAMPLE
Yara detected obfuscated html page
Source: Yara match File source: 5781525.html, type: SAMPLE
Phishing site detected (based on image similarity)
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov Matcher: Found strong image similarity, brand: Microsoft image: 69819.img.2.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
Phishing site detected (based on logo template match)
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Number of links: 0
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Title: Sign in to Outlook does not match URL
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Invalid link: Forgot my password
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Invalid link: Forgot my password
Invalid T&C link found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Invalid link: Terms of use
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Invalid link: Privacy & cookies
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Invalid link: Terms of use
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: Invalid link: Privacy & cookies
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: No <meta name="author".. found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: No <meta name="author".. found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: No <meta name="copyright".. found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: unknown HTTPS traffic detected: 5.144.130.32:443 -> 192.168.2.7:49767 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 192.0.77.2 192.0.77.2
Source: Joe Sandbox View IP Address: 192.0.77.2 192.0.77.2
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: esd.rwbdg.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: esd.rwbdg.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36Accept: image/avif,image/webp,image/apng,image/*,*/*;q=0.8Referer: http://esd.rwbdg.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^ equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^>- equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: esd.rwbdg.com
Source: unknown HTTP traffic detected: POST /wild/api.php HTTP/1.1Host: esd.rwbdg.comConnection: keep-aliveContent-Length: 70Accept: */*X-Requested-With: XMLHttpRequestUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36Content-Type: application/x-www-form-urlencoded; charset=UTF-8Origin: http://esd.rwbdg.comReferer: http://esd.rwbdg.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Data Raw: 63 55 73 65 72 4e 61 76 53 3d 61 48 52 30 63 48 4d 36 4c 79 39 33 63 6d 6c 30 5a 58 4a 73 65 53 35 6a 59 53 38 6a 62 57 52 33 61 57 78 7a 62 32 35 41 5a 58 4e 6b 4c 6e 64 68 4c 6d 64 76 64 67 25 33 44 25 33 44 Data Ascii: cUserNavS=aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg%3D%3D
Source: 5781525.html String found in binary or memory: http://Esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg==%22%20%2F%3E
Source: 77EC63BDA74BD0D0E0426DC8F8008506.1.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: Current Session.0.dr String found in binary or memory: http://esd.rwbdg.com
Source: Current Session.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg==
Source: History-journal.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg==/
Source: History Provider Cache.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg==2
Source: History Provider Cache.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg==2:
Source: e222f00a6abb9a7f_0.0.dr String found in binary or memory: http://rwbdg.com/
Source: Reporting and NEL.1.dr String found in binary or memory: https://a.nel.cloudflare.com/report?s=KZBKllTKVh2%2BpqjyoAKr6aVDca7Zvi43xe4jhYTHAfFVfL8ExtCspoyn0Mv9
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, manifest.json0.0.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, manifest.json0.0.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json1.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://code.jquery.com
Source: e222f00a6abb9a7f_0.0.dr String found in binary or memory: https://code.jquery.com/jquery-3.5.1.js
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://content-autofill.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 61f0595b-1646-4806-b570-8a2728771dea.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr, 4f7d6df5-31e0-4b7d-9859-a360ded4b227.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: 602f5f874f3385c7_0.0.dr String found in binary or memory: https://google.com/8&
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://i0.wp.com
Source: 000003.log3.0.dr, 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, Current Session.0.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://kristenbakercoach.com
Source: 91be9c6b8d3150fe_0.0.dr String found in binary or memory: https://kristenbakercoach.com/8&
Source: Favicons-journal.0.dr, Favicons.0.dr String found in binary or memory: https://kristenbakercoach.com/favicon.ico
Source: Current Session.0.dr, History-journal.0.dr, Favicons-journal.0.dr, Favicons.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/?csrftoken=MTYyMDg0ODAzM2QzZjE1NGExMzM1YTYzODE1ZGQ3O
Source: History-journal.0.dr, Favicons-journal.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/?referrer=mdwilson
Source: Current Session.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/check.php
Source: History.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/check.php/
Source: Current Session.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/check.php2iT
Source: Current Session.0.dr String found in binary or memory: https://kristenbakercoach.comh
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json1.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://r5---sn-n02xgoxufvg3-2gbs.gvt1.com
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json1.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: Current Session.0.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://writerly.ca
Source: History-journal.0.dr, Favicons-journal.0.dr String found in binary or memory: https://writerly.ca/#mdwilson
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr String found in binary or memory: https://www.eaqarat-iran.ir
Source: Network Action Predictor.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/
Source: Current Session.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/?email=mdwilson%40esd.wa.gov
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/?email=mdwilson%40esd.wa.govSign
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/checkemail?email=mdwilson
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/index?email=mdwilson
Source: Favicons.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/lib/img/favicon.ico
Source: Favicons.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/lib/img/favicon.ico-
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYz
Source: 000003.log3.0.dr, 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, Current Session.0.dr, manifest.json0.0.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://www.google.com
Source: Current Session.0.dr String found in binary or memory: https://www.google.com%
Source: manifest.json1.0.dr, 000003.log0.0.dr String found in binary or memory: https://www.google.com/
Source: Current Session.0.dr String found in binary or memory: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Ldr7MUaAAAAAMaYQTNpSsqRobZNq7kDdyq0WezE&co=aHR0
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 0fe43e07-72aa-45bd-9c71-5446d45d43e6.tmp.1.dr, 082d3550-76a6-48f0-be76-54b30bb9e679.tmp.1.dr, a508464e-0920-44e2-bc96-581f1b293411.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: 91be9c6b8d3150fe_0.0.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/npGaewopg1UaB8CNtYfx-y1j/recaptcha__en.js
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49766
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 49766 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49793 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49795 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49797 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49797
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49796
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49795
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49793
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49792
Source: unknown Network traffic detected: HTTP traffic on port 49767 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49796 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49792 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49767
Source: unknown HTTPS traffic detected: 5.144.130.32:443 -> 192.168.2.7:49767 version: TLS 1.2
Source: classification engine Classification label: mal100.phis.winHTML@44/242@8/9
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-609CAC28-17AC.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user~1\AppData\Local\Temp\0b9fa15e-48be-40e3-968c-22a9608503bb.tmp Jump to behavior
Source: 5781525.html Virustotal: Detection: 16%
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\5781525.html'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1404,3373839678695000741,8713529130945255826,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1696 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1404,3373839678695000741,8713529130945255826,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1696 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 412702 Sample: 5781525.html Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 13 www.eaqarat-iran.ir 2->13 15 prda.aadg.msidentity.com 2->15 17 eaqarat-iran.ir 2->17 29 Antivirus detection for URL or domain 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 6 other signatures 2->35 7 chrome.exe 15 501 2->7         started        signatures3 process4 dnsIp5 19 192.168.2.1 unknown unknown 7->19 21 239.255.255.250 unknown Reserved 7->21 10 chrome.exe 25 7->10         started        process6 dnsIp7 23 kristenbakercoach.com 192.254.185.127, 443, 49736, 49737 UNIFIEDLAYER-AS-1US United States 10->23 25 esd.rwbdg.com 103.120.64.61, 49715, 49716, 49717 IDNIC-SUITEN-AS-IDPTSUITENINOVASISUKSESID Indonesia 10->25 27 8 other IPs or domains 10->27
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
103.120.64.61
esd.rwbdg.com Indonesia
137373 IDNIC-SUITEN-AS-IDPTSUITENINOVASISUKSESID false
172.67.150.89
writerly.ca United States
13335 CLOUDFLARENETUS false
5.144.130.32
eaqarat-iran.ir Iran (ISLAMIC Republic Of)
59441 HOSTIRAN-NETWORKIR false
192.0.77.2
i0.wp.com United States
2635 AUTOMATTICUS false
239.255.255.250
unknown Reserved
unknown unknown false
192.254.185.127
kristenbakercoach.com United States
46606 UNIFIEDLAYER-AS-1US false
142.250.185.65
googlehosted.l.googleusercontent.com United States
15169 GOOGLEUS false

Private

IP
192.168.2.1
127.0.0.1

Contacted Domains

Name IP Active
writerly.ca 172.67.150.89 true
kristenbakercoach.com 192.254.185.127 true
i0.wp.com 192.0.77.2 true
googlehosted.l.googleusercontent.com 142.250.185.65 true
esd.rwbdg.com 103.120.64.61 true
eaqarat-iran.ir 5.144.130.32 true
clients2.googleusercontent.com unknown unknown
code.jquery.com unknown unknown
www.eaqarat-iran.ir unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://esd.rwbdg.com/ false
  • Avira URL Cloud: safe
unknown
http://esd.rwbdg.com/wild/api.php false
  • Avira URL Cloud: safe
unknown
https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0ODA0OGQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJhMTc1NGEyN2RmZjQ2YzE1NTRmMWZkYWYyNGVmOTViMQ==&email=mdwilson@esd.wa.gov true
    unknown
    https://kristenbakercoach.com/wp-admin/js/redir/?csrftoken=MTYyMDg0ODAzM2QzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJkNzNiZjA1MmE2ZjMxNDA1ZGY5YTgwMDNiMThhZTRjMg== true
      unknown
      http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jbWR3aWxzb25AZXNkLndhLmdvdg== true
      • SlashNext: Fake Login Page type: Phishing & Social Engineering
      unknown
      http://esd.rwbdg.com/favicon.ico false
      • Avira URL Cloud: safe
      unknown