Analysis Report http://www.7638928272.i-qlab.com/negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=

Overview

General Information

Sample URL: http://www.7638928272.i-qlab.com/negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=
Analysis ID: 432857
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: http://www.7638928272.i-qlab.com/negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20= SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
Antivirus detection for URL or domain
Source: https://cgmrental.holacliente.com/ash4/OV4/authorize_client_id:chzwnd8j-qhms-5h8y-qul7-u1mfg6ywz8xl_9d2vrxyqzkhuf4n71w3pjob56ia0esg8ctml1ov9nusch3d0pekq82btyz4l5g6wmra7jfixvmhyg37nxpde2sakzql6u5bw9fojt1r4i80c?data=bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20= SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://cgmrental.holacliente.com/ash4/OV4/authorize_client_id:chzwnd8j-qhms-5h8y-qul7-u1mfg6ywz8xl_9d2vrxyqzkhuf4n71w3pjob56ia0esg8ctml1ov9nusch3d0pekq82btyz4l5g6wmra7jfixvmhyg37nxpde2sakzql6u5bw9fojt1r4i80c?data=bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20= Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 414408.pages.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\authorize_client_id_chzwnd8j-qhms-5h8y-qul7-u1mfg6ywz8xl_9d2vrxyqzkhuf4n71w3pjob56ia0esg8ctml1ov9nusch3d0pekq82btyz4l5g6wmra7jfixvmhyg37nxpde2sakzql6u5bw9fojt1r4i80c[1].htm, type: DROPPED
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 192.185.129.4:443 -> 192.168.2.5:49699 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.129.4:443 -> 192.168.2.5:49700 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.5:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.129.4:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: global traffic HTTP traffic detected: GET /negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20= HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: www.7638928272.i-qlab.comConnection: Keep-Alive
Source: unknown DNS traffic detected: queries for: www.7638928272.i-qlab.com
Source: ~DF45FF1EEBBA1355C4.TMP.1.dr String found in binary or memory: http://www.7638928272.i-qlab.com/negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=
Source: {77C7E403-CA6A-11EB-90E5-ECF4BB570DC9}.dat.1.dr String found in binary or memory: http://www.7638928272.i-qlab.com/negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=Root
Source: authorize_client_id_chzwnd8j-qhms-5h8y-qul7-u1mfg6ywz8xl_9d2vrxyqzkhuf4n71w3pjob56ia0esg8ctml1ov9nusch3d0pekq82btyz4l5g6wmra7jfixvmhyg37nxpde2sakzql6u5bw9fojt1r4i80c[1].htm.2.dr String found in binary or memory: https://aadcdn.msauthimages.net/dbd5a2dd-xahzdxkxsnzqmxzzxchyicgv6e6hhqsxb5qphb4dwrw/logintenantbran
Source: ~DF45FF1EEBBA1355C4.TMP.1.dr String found in binary or memory: https://cgmrental.holacliente.com/ash4/OV4/authorize_client_id:chzwnd8j-qhms-5h8y-qul7-u1mfg6ywz8xl_
Source: bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=[1].htm.2.dr String found in binary or memory: https://cgmrental.holacliente.com/ash4/OV4/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=
Source: imagestore.dat.2.dr String found in binary or memory: https://cgmrental.holacliente.com/ash4/OV4/images/favicon.ico~
Source: {77C7E403-CA6A-11EB-90E5-ECF4BB570DC9}.dat.1.dr String found in binary or memory: https://cgmrental.holai-qlab.com/negwtod/bWxhd3NvbkBwbGF0aW51bWVxdWl0eS5jb20=cliente.com/ash4/OV4/au
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49700
Source: unknown Network traffic detected: HTTP traffic on port 49699 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49699
Source: unknown Network traffic detected: HTTP traffic on port 49702 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49700 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49702
Source: unknown HTTPS traffic detected: 192.185.129.4:443 -> 192.168.2.5:49699 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.129.4:443 -> 192.168.2.5:49700 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.5:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.129.4:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: classification engine Classification label: mal72.phis.win@3/22@4/3
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{77C7E401-CA6A-11EB-90E5-ECF4BB570DC9}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF489A48BFD53532FE.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:328 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:328 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs