Analysis Report 5781525.html

Overview

General Information

Sample Name: 5781525.html
Analysis ID: 412711
MD5: 9bf051dc4c81afeaeff5030f34e53fd4
SHA1: 607b98c2ce9abd3a92d1734065a2a8844609e2c5
SHA256: 18914ce325d9f374223492b1f48c41db41a0e9c0c8461f42522c76bd8bfb4a68
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
Yara detected HtmlPhish44
Yara detected obfuscated html page
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
IP address seen in connection with other malware
Invalid 'forgot password' link found
Invalid T&C link found
JA3 SSL client fingerprint seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: 5781525.html Avira: detected
Antivirus detection for URL or domain
Source: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y= SlashNext: Label: Fake Login Page type: Phishing & Social Engineering
Multi AV Scanner detection for submitted file
Source: 5781525.html Virustotal: Detection: 16% Perma Link

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 53636.pages.csv, type: HTML
Yara detected HtmlPhish44
Source: Yara match File source: 5781525.html, type: SAMPLE
Yara detected obfuscated html page
Source: Yara match File source: 5781525.html, type: SAMPLE
Phishing site detected (based on image similarity)
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov Matcher: Found strong image similarity, brand: Microsoft image: 53636.img.2.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
Phishing site detected (based on logo template match)
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Number of links: 0
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Title: Sign in to Outlook does not match URL
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Invalid link: Forgot my password
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Invalid link: Forgot my password
Invalid T&C link found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Invalid link: Terms of use
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Invalid link: Privacy & cookies
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Invalid link: Terms of use
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: Invalid link: Privacy & cookies
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: No <meta name="author".. found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: No <meta name="author".. found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: No <meta name="copyright".. found
Source: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: unknown HTTPS traffic detected: 5.144.130.32:443 -> 192.168.2.3:49775 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 192.0.77.2 192.0.77.2
Source: Joe Sandbox View IP Address: 192.0.77.2 192.0.77.2
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: esd.rwbdg.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: esd.rwbdg.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36Accept: image/avif,image/webp,image/apng,image/*,*/*;q=0.8Referer: http://esd.rwbdg.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^ equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ad.*^ajaxpipe^>- equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: esd.rwbdg.com
Source: unknown HTTP traffic detected: POST /wild/api.php HTTP/1.1Host: esd.rwbdg.comConnection: keep-aliveContent-Length: 64Accept: */*X-Requested-With: XMLHttpRequestUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36Content-Type: application/x-www-form-urlencoded; charset=UTF-8Origin: http://esd.rwbdg.comReferer: http://esd.rwbdg.com/Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Data Raw: 63 55 73 65 72 4e 61 76 53 3d 61 48 52 30 63 48 4d 36 4c 79 39 33 63 6d 6c 30 5a 58 4a 73 65 53 35 6a 59 53 38 6a 63 47 68 6c 5a 57 74 6c 51 47 56 7a 5a 43 35 33 59 53 35 6e 62 33 59 25 33 44 Data Ascii: cUserNavS=aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y%3D
Source: 5781525.html String found in binary or memory: http://Esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y=%22%20%2F%3E
Source: 77EC63BDA74BD0D0E0426DC8F8008506.1.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: Current Session.0.dr String found in binary or memory: http://esd.rwbdg.com
Source: Current Session.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y=
Source: Current Session.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y=$
Source: History-journal.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y=/
Source: History Provider Cache.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y=2
Source: History Provider Cache.0.dr String found in binary or memory: http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y=2:
Source: e222f00a6abb9a7f_0.0.dr String found in binary or memory: http://rwbdg.com/u
Source: Reporting and NEL.1.dr String found in binary or memory: https://a.nel.cloudflare.com/report?s=ppHr7A2wLF5kAcE6y%2BVpsyCo9aMygCPKYaC9CDSC%2BOjgJWlpB82XDV9HuT
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, manifest.json0.0.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, manifest.json0.0.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json1.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://code.jquery.com
Source: e222f00a6abb9a7f_0.0.dr String found in binary or memory: https://code.jquery.com/jquery-3.5.1.js
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://content-autofill.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.1.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, a272768a-2d2b-447d-9f4d-ad5da35b066d.tmp.1.dr, 08d7be13-d743-4068-aaec-c768e3510e7b.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: 602f5f874f3385c7_0.0.dr String found in binary or memory: https://google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://i0.wp.com
Source: 000003.log6.0.dr String found in binary or memory: https://kristenbakercoach.com
Source: 91be9c6b8d3150fe_0.0.dr String found in binary or memory: https://kristenbakercoach.com/
Source: Favicons-journal.0.dr String found in binary or memory: https://kristenbakercoach.com/favicon.ico
Source: Current Session.0.dr, Favicons-journal.0.dr, History.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/?csrftoken=MTYyMDg0OTEzMWQzZjE1NGExMzM1YTYzODE1ZGQ3O
Source: Favicons-journal.0.dr, History.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/?referrer=pheeke
Source: Current Session.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/check.php
Source: History.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/check.php/
Source: Current Session.0.dr String found in binary or memory: https://kristenbakercoach.com/wp-admin/js/redir/check.php4
Source: Current Session.0.dr String found in binary or memory: https://kristenbakercoach.comh
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json1.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://play.google.com
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://r5---sn-n02xgoxufvg3-2gbs.gvt1.com
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json1.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: Current Session.0.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://writerly.ca
Source: History-journal.0.dr, Favicons-journal.0.dr String found in binary or memory: https://writerly.ca/#pheeke
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr String found in binary or memory: https://www.eaqarat-iran.ir
Source: Network Action Predictor-journal.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/
Source: Current Session.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/?email=pheeke%40esd.wa.gov
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/?email=pheeke%40esd.wa.govSign
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/checkemail?email=pheeke
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/index?email=pheeke
Source: Favicons.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/lib/img/favicon.ico
Source: Favicons.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/lib/img/favicon.ico-
Source: History.0.dr String found in binary or memory: https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYz
Source: 000003.log6.0.dr String found in binary or memory: https://www.google.com
Source: Current Session.0.dr String found in binary or memory: https://www.google.com%
Source: QuotaManager.0.dr, 000003.log0.0.dr String found in binary or memory: https://www.google.com/
Source: QuotaManager.0.dr String found in binary or memory: https://www.google.com//
Source: Current Session.0.dr String found in binary or memory: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Ldr7MUaAAAAAMaYQTNpSsqRobZNq7kDdyq0WezE&co=aHR0
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: Current Session.0.dr String found in binary or memory: https://www.google.comh
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json1.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 8ee250fc-7e00-4ade-a5e0-b2a701ed64b7.tmp.1.dr, 34d8e2ae-acb6-4142-b400-5ae0a041f5ff.tmp.1.dr, 7a860c75-6872-43b8-94de-e9bbc76d61a5.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: 91be9c6b8d3150fe_0.0.dr String found in binary or memory: https://www.gstatic.com/recaptcha/releases/npGaewopg1UaB8CNtYfx-y1j/recaptcha__en.js
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49787
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49786
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49789 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49787 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49791 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49774 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49772 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49775
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49774
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49772
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49791
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49790
Source: unknown Network traffic detected: HTTP traffic on port 49786 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49775 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 49790 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49789
Source: unknown HTTPS traffic detected: 5.144.130.32:443 -> 192.168.2.3:49775 version: TLS 1.2
Source: classification engine Classification label: mal100.phis.winHTML@46/250@8/9
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-609CB072-150C.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\b3562bd3-ce72-4819-8cc6-eb3135f46536.tmp Jump to behavior
Source: QuotaManager.0.dr Binary or memory string: CREATE TABLE HostQuotaTable(host TEXT NOT NULL, type INTEGER NOT NULL, quota INTEGER DEFAULT 0, UNIQUE(host, type));
Source: 5781525.html Virustotal: Detection: 16%
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\5781525.html'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1492,177793998006335442,11202177534024855872,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1708 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1492,177793998006335442,11202177534024855872,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1708 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 412711 Sample: 5781525.html Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 13 www.eaqarat-iran.ir 2->13 15 eaqarat-iran.ir 2->15 27 Antivirus detection for URL or domain 2->27 29 Antivirus / Scanner detection for submitted sample 2->29 31 Multi AV Scanner detection for submitted file 2->31 33 6 other signatures 2->33 7 chrome.exe 16 501 2->7         started        signatures3 process4 dnsIp5 17 192.168.2.1 unknown unknown 7->17 19 239.255.255.250 unknown Reserved 7->19 10 chrome.exe 25 7->10         started        process6 dnsIp7 21 kristenbakercoach.com 192.254.185.127, 443, 49738, 49739 UNIFIEDLAYER-AS-1US United States 10->21 23 esd.rwbdg.com 103.120.64.61, 49717, 49718, 49720 IDNIC-SUITEN-AS-IDPTSUITENINOVASISUKSESID Indonesia 10->23 25 8 other IPs or domains 10->25
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
103.120.64.61
esd.rwbdg.com Indonesia
137373 IDNIC-SUITEN-AS-IDPTSUITENINOVASISUKSESID false
5.144.130.32
eaqarat-iran.ir Iran (ISLAMIC Republic Of)
59441 HOSTIRAN-NETWORKIR false
142.250.185.65
googlehosted.l.googleusercontent.com United States
15169 GOOGLEUS false
172.67.150.89
writerly.ca United States
13335 CLOUDFLARENETUS false
192.0.77.2
i0.wp.com United States
2635 AUTOMATTICUS false
239.255.255.250
unknown Reserved
unknown unknown false
192.254.185.127
kristenbakercoach.com United States
46606 UNIFIEDLAYER-AS-1US false

Private

IP
192.168.2.1
127.0.0.1

Contacted Domains

Name IP Active
writerly.ca 172.67.150.89 true
kristenbakercoach.com 192.254.185.127 true
i0.wp.com 192.0.77.2 true
googlehosted.l.googleusercontent.com 142.250.185.65 true
esd.rwbdg.com 103.120.64.61 true
eaqarat-iran.ir 5.144.130.32 true
clients2.googleusercontent.com unknown unknown
code.jquery.com unknown unknown
www.eaqarat-iran.ir unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://esd.rwbdg.com/ false
  • Avira URL Cloud: safe
unknown
http://esd.rwbdg.com/wild/api.php false
  • Avira URL Cloud: safe
unknown
http://esd.rwbdg.com/#aHR0cHM6Ly93cml0ZXJseS5jYS8jcGhlZWtlQGVzZC53YS5nb3Y= true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown
https://kristenbakercoach.com/wp-admin/js/redir/?csrftoken=MTYyMDg0OTEzMWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDIwOWIyZTg4OGIwYjc5MGQ0ZWUyNDk5YzUyZmJiNGNjYw== true
    unknown
    https://www.eaqarat-iran.ir/wp-admin/js/eng/app/nextlogin?csrftoken=MTYyMDg0OTE0NWQzZjE1NGExMzM1YTYzODE1ZGQ3OGIxZWFkM2UxMWVkOWE0MWJiMDJjNzcxMzM4YzdmNDhhY2QyNjA4N2E3OGU2ZDQ3OGQyNg==&email=pheeke@esd.wa.gov true
      unknown
      http://esd.rwbdg.com/favicon.ico false
      • Avira URL Cloud: safe
      unknown