Analysis Report https://ciscomessagingportal.gq/authen?error=1#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f

Overview

General Information

Sample URL: https://ciscomessagingportal.gq/authen?error=1#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f
Analysis ID: 412848
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Yara detected HtmlPhish10

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://ciscomessagingportal.gq/authen?error=1#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://ciscomessagingportal.gq/#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: 093954.pages.csv, type: HTML
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 162.0.237.234:443 -> 192.168.2.5:49688 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.0.237.234:443 -> 192.168.2.5:49689 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.0.237.234:443 -> 192.168.2.5:49690 version: TLS 1.2
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf4c5a426,0x01d747d0</date><accdate>0xf4c5a426,0x01d747d0</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf4c5a426,0x01d747d0</date><accdate>0xf4c5a426,0x01d747d0</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf4c8066f,0x01d747d0</date><accdate>0xf4c8066f,0x01d747d0</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf4c8066f,0x01d747d0</date><accdate>0xf4c8066f,0x01d747d0</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf4ca68d0,0x01d747d0</date><accdate>0xf4ca68d0,0x01d747d0</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf4ca68d0,0x01d747d0</date><accdate>0xf4ca68d0,0x01d747d0</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: ciscomessagingportal.gq
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: ~DFF7FAC163A929FC02.TMP.1.dr, {1E0C7D41-B3C4-11EB-90E5-ECF4BB570DC9}.dat.1.dr String found in binary or memory: https://ciscomessagingportal.gq/#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover
Source: imagestore.dat.2.dr String found in binary or memory: https://ciscomessagingportal.gq/images/favicon.ico
Source: imagestore.dat.2.dr String found in binary or memory: https://ciscomessagingportal.gq/images/favicon.ico~
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49689
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49688
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49690
Source: unknown Network traffic detected: HTTP traffic on port 49689 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49690 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49688 -> 443
Source: unknown HTTPS traffic detected: 162.0.237.234:443 -> 192.168.2.5:49688 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.0.237.234:443 -> 192.168.2.5:49689 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.0.237.234:443 -> 192.168.2.5:49690 version: TLS 1.2
Source: classification engine Classification label: mal64.phis.win@3/20@2/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1E0C7D3F-B3C4-11EB-90E5-ECF4BB570DC9}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF0DA9C130E8F06E70.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6088 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6088 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Confirm
Source: C:\Program Files\internet explorer\iexplore.exe Automated click: Confirm
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 412848 URL: https://ciscomessagingporta... Startdate: 13/05/2021 Architecture: WINDOWS Score: 64 12 ciscomessagingportal.gq 2->12 16 Antivirus detection for URL or domain 2->16 18 Antivirus / Scanner detection for submitted sample 2->18 20 Yara detected HtmlPhish10 2->20 7 iexplore.exe 1 74 2->7         started        signatures3 process4 process5 9 iexplore.exe 2 37 7->9         started        dnsIp6 14 ciscomessagingportal.gq 162.0.237.234, 443, 49688, 49689 NAMECHEAP-NETUS Canada 9->14
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
162.0.237.234
ciscomessagingportal.gq Canada
22612 NAMECHEAP-NETUS false

Contacted Domains

Name IP Active
ciscomessagingportal.gq 162.0.237.234 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://ciscomessagingportal.gq/#owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fautodiscover.com%2fowa%2f true
  • SlashNext: Fake Login Page type: Phishing & Social Engineering
unknown