Windows Analysis Report https://chimneycriminal.com/d/er/ea/index.html

Overview

General Information

Sample URL: https://chimneycriminal.com/d/er/ea/index.html
Analysis ID: 438535
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish10
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found
Suspicious form URL found

Classification

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm, type: DROPPED
Phishing site detected (based on logo template match)
Source: https://chimneycriminal.com/d/er/ea/index.html Matcher: Template: aol matched
HTML body contains low number of good links
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Number of links: 0
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Title: Dropbox does not match URL
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Title: Dropbox does not match URL
Invalid T&C link found
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Invalid link: Need help?
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Invalid link: Need help?
Suspicious form URL found
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s1.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s2.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s345.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s345.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s345.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s6.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s1.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s2.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s345.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s345.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s345.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: Form action: s6.php
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: No <meta name="author".. found
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: No <meta name="author".. found
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: No <meta name="copyright".. found
Source: https://chimneycriminal.com/d/er/ea/index.html HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 69.49.229.16:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.229.16:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.229.16:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x683aaf4c,0x01d76781</date><accdate>0x683aaf4c,0x01d76781</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x683aaf4c,0x01d76781</date><accdate>0x683aaf4c,0x01d76781</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x6860d4d5,0x01d76781</date><accdate>0x6860d4d5,0x01d76781</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x6860d4d5,0x01d76781</date><accdate>0x6860d4d5,0x01d76781</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x6860d4d5,0x01d76781</date><accdate>0x6860d4d5,0x01d76781</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x6860d4d5,0x01d76781</date><accdate>0x6860d4d5,0x01d76781</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: chimneycriminal.com
Source: msapplication.xml.1.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.dr String found in binary or memory: http://www.youtube.com/
Source: imagestore.dat.2.dr String found in binary or memory: https://chimneycriminal.com/d/er/ea/img/favicon.ico
Source: ~DF81E8D53A1AD6C473.TMP.1.dr String found in binary or memory: https://chimneycriminal.com/d/er/ea/index.html
Source: {918DCD4A-D374-11EB-90EB-ECF4BBEA1588}.dat.1.dr String found in binary or memory: https://chimneycriminal.com/d/er/ea/index.htmlRoot
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49754
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 49754 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown HTTPS traffic detected: 69.49.229.16:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.229.16:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 69.49.229.16:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: classification engine Classification label: mal52.phis.win@3/32@2/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{918DCD48-D374-11EB-90EB-ECF4BBEA1588}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF41DA1EA9355D0F2A.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6480 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6480 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs