Analysis Report https://docs.google.com/document/d/e/2PACX-1vRAHP7hrvpDz9KQUwv-UGYQwMoqaq4CogO-Ounm_Bj43rDT7FbutuHOxu--J36ilf9tiDQdTEuajLGO/pub

Overview

General Information

Sample URL: https://docs.google.com/document/d/e/2PACX-1vRAHP7hrvpDz9KQUwv-UGYQwMoqaq4CogO-Ounm_Bj43rDT7FbutuHOxu--J36ilf9tiDQdTEuajLGO/pub
Analysis ID: 433028
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish10

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://funfid.com/.ae/en/NV6588123/ SlashNext: Label: Internet Scam type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: 849224.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\NV6588123[1].htm, type: DROPPED
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 142.250.180.225:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.180.225:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.79.236:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.79.236:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: unknown DNS traffic detected: queries for: lh4.googleusercontent.com
Source: bootstrap[1].css.4.dr String found in binary or memory: http://getbootstrap.com)
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://docs.google.com/
Source: pub[1].htm.4.dr String found in binary or memory: https://docs.google.com/abuse?id=AKkXjoxHU2Ro_M6x9yL_8xIK15El_49QE3ABJ-SEzZ4BuKp2mHKNF18S31OH5BVEvdW
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr, ~DF6D99441CB1FA02B4.TMP.2.dr String found in binary or memory: https://docs.google.com/document/d/e/2PACX-1vRAHP7hrvpDz9KQUwv-UGYQwMoqaq4CogO-Ounm_Bj43rDT7FbutuHOx
Source: css[1].css0.4.dr String found in binary or memory: https://fonts.google.com/license/googlerestricted
Source: pub[1].htm.4.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Google
Source: pub[1].htm.4.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Roboto
Source: css[1].css0.4.dr String found in binary or memory: https://fonts.gstatic.com/s/googlesans/v27/4UaGrENHsxJlGDuGo1OIlL3Owpg.woff)
Source: css[1].css.4.dr String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxM.woff)
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://funfid.com/.ae
Source: url[1].htm.4.dr String found in binary or memory: https://funfid.com/.ae/en/
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://funfid.com/.ae/en/&sa=D&source=editors&ust=1623393681163000&usg=AOvVaw1EVQHT19sUbRoot
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://funfid.com/.ae/en/&sa=D&source=editors&ust=1623393681163000&usg=AOvVaw1EVQHT19sUbqCGwqho_dPr
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://funfid.com/.ae/en/NV6588123/
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://funfid.com/.ae/en/NV6588123/FPayTabs
Source: imagestore.dat.4.dr String found in binary or memory: https://funfid.com/.ae/en/NV6588123/files/favicon.png
Source: ~DF6D99441CB1FA02B4.TMP.2.dr String found in binary or memory: https://funfid.com/.ae/en/NV6588123/unfid.com/.ae/en/&sa=D&source=editors&ust=1623393681163000&usg=A
Source: bootstrap[1].css.4.dr String found in binary or memory: https://github.com/h5bp/html5-boilerplate/blob/master/src/css/main.css
Source: bootstrap[1].css.4.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: NV6588123[1].htm.4.dr String found in binary or memory: https://mci.gov.sa/
Source: imagestore.dat.4.dr, pub[1].htm.4.dr String found in binary or memory: https://ssl.gstatic.com/docs/documents/images/kix-favicon7.ico
Source: imagestore.dat.4.dr String found in binary or memory: https://ssl.gstatic.com/docs/documents/images/kix-favicon7.ico~
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://www.google.com
Source: imagestore.dat.4.dr String found in binary or memory: https://www.google.com/favicon.ico
Source: imagestore.dat.4.dr String found in binary or memory: https://www.google.com/favicon.ico~
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://www.google.com/url?q=https://funfid.com/.ae/en/&sa=D&source=editors&ust=1623393681163000&usg
Source: {A4953545-CA77-11EB-90EB-ECF4BBEA1588}.dat.2.dr String found in binary or memory: https://www.google.comm/document/d/e/2PACX-1vRAHP7hrvpDz9KQUwv-UGYQwMoqaq4CogO-Ounm_Bj43rDT7FbutuHOx
Source: NV6588123[1].htm.4.dr String found in binary or memory: https://www.paytabs.com/terms_conditions
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown HTTPS traffic detected: 142.250.180.225:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.180.225:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.79.236:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.79.236:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: classification engine Classification label: mal56.phis.win@3/35@2/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A4953543-CA77-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF1E12EB6036C3D8D3.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6368 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6368 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs