Analysis Report https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.html

Overview

General Information

Sample URL: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.html
Analysis ID: 433166
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish7
Yara signature match

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.html SlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.html Matcher: Template: onedrive matched with high similarity
Yara detected HtmlPhish7
Source: Yara match File source: 088753.pages.csv, type: HTML
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49713 version: TLS 1.2
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xdfdd8672,0x01d75ef4</date><accdate>0xdfdd8672,0x01d75ef4</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xdfdd8672,0x01d75ef4</date><accdate>0xdfdd8672,0x01d75ef4</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xdfe4ad77,0x01d75ef4</date><accdate>0xdfe4ad77,0x01d75ef4</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xdfe4ad77,0x01d75ef4</date><accdate>0xdfe4ad77,0x01d75ef4</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xdfe4ad77,0x01d75ef4</date><accdate>0xdfe4ad77,0x01d75ef4</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xdfe4ad77,0x01d75ef4</date><accdate>0xdfe4ad77,0x01d75ef4</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://financialanalyst.org/Wealth%20Management%20Treatise.pdf
Source: style[1].css.3.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v20/mem5YaGs126MiZpBA-UN7rgOUuhv.woff)
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v20/mem5YaGs126MiZpBA-UN8rsOUuhv.woff)
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v20/mem5YaGs126MiZpBA-UN_r8OUuhv.woff)
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v20/mem5YaGs126MiZpBA-UNirkOUuhv.woff)
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/opensans/v20/mem8YaGs126MiZpBA-UFVZ0d.woff)
Source: {10CA994A-CAE8-11EB-90E6-ECF4BB82F7E0}.dat.1.dr String found in binary or memory: https://jaquel988.s3.e
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.html
Source: {10CA994A-CAE8-11EB-90E6-ECF4BB82F7E0}.dat.1.dr String found in binary or memory: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.htmlRoot
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/index.htmlWdtRWdtR
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/ndex.html
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://jaquel988.s3.eu-de.cloud-object-storage.appdomain.cloud/holistically/ndex.htmljaquel988.s3.e
Source: imagestore.dat.3.dr, ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://p.sfx.ms/images/favicon.ico
Source: imagestore.dat.3.dr String found in binary or memory: https://p.sfx.ms/images/favicon.ico~
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://smtpro101.com/email-list/onedrive24/css/style.css
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://smtpro101.com/email-list/onedrive24/images/logo.png
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://smtpro101.com/email-list/onedrive24/images/mail.png
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://smtpro101.com/email-list/onedrive24/images/office.png
Source: ~DF817BDD5B6435F8E1.TMP.1.dr String found in binary or memory: https://smtpro101.com/email-list/onedrive24/images/other.png
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.194.129:443 -> 192.168.2.7:49713 version: TLS 1.2

System Summary:

barindex
Yara signature match
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\index[1].htm, type: DROPPED Matched rule: SUSP_Base64_Encoded_Hex_Encoded_Code date = 2019-04-29, author = Florian Roth, description = Detects hex encoded code that has been base64 encoded, score = https://www.nextron-systems.com/2019/04/29/spotlight-threat-hunting-yara-rule-example/
Source: classification engine Classification label: mal64.phis.win@3/39@4/2
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{10CA9948-CAE8-11EB-90E6-ECF4BB82F7E0}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user~1\AppData\Local\Temp\~DF8FCD22B476545039.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2884 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2884 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs