Windows Analysis Report Convert HEX uit phishing mail.htm

Overview

General Information

Sample Name: Convert HEX uit phishing mail.htm
Analysis ID: 452149
MD5: bdcd079a5d19d6e7770c3ed82d71d772
SHA1: 2564b052fc982da1f2baed9c19953f38da140406
SHA256: 0a3ad129462284db86e44bb0ce8d12317915c8fe79d7301f77d774110654461b
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
IP address seen in connection with other malware
Invalid 'forgot password' link found
Invalid T&C link found
JA3 SSL client fingerprint seen in connection with other malware
None HTTPS page querying sensitive user data (password, username or email)
Suspicious form URL found

Classification

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: Convert HEX uit phishing mail.htm, type: SAMPLE
Source: Yara match File source: 21097.pages.csv, type: HTML
Phishing site detected (based on image similarity)
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm Matcher: Found strong image similarity, brand: Microsoft image: 21097.img.2.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
Phishing site detected (based on logo template match)
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Number of links: 0
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Number of links: 0
HTML title does not match URL
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Title: Sign in to Outlook does not match URL
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Title: Sign in to Outlook does not match URL
Invalid 'forgot password' link found
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Invalid link: Forgot my password
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Invalid link: Forgot my password
Invalid T&C link found
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Invalid link: Terms of use
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Invalid link: Privacy & cookies
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Invalid link: Terms of use
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Invalid link: Privacy & cookies
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Has password / email / username input fields
Suspicious form URL found
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Form action: https://divisaoeletrica.com.br/sn/fresd.php
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: Form action: https://divisaoeletrica.com.br/sn/fresd.php
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/Convert%20HEX%20uit%20phishing%20mail.htm HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\3520_663501212\LICENSE.txt Jump to behavior
Source: unknown HTTPS traffic detected: 151.101.12.193:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49738 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 151.101.12.193 151.101.12.193
Source: Joe Sandbox View IP Address: 151.101.12.193 151.101.12.193
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: aadcdn.msftauth.net
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr String found in binary or memory: https://aadcdn.msftauth.net
Source: Convert HEX uit phishing mail.htm String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/applogos/53_8b36337037cff88c3df203bb73d58e41.png
Source: Convert HEX uit phishing mail.htm String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
Source: Convert HEX uit phishing mail.htm String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.
Source: Convert HEX uit phishing mail.htm, Favicons.0.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
Source: Convert HEX uit phishing mail.htm String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.
Source: manifest.json0.0.dr, 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: manifest.json0.0.dr, 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: Convert HEX uit phishing mail.htm, Current Session.0.dr String found in binary or memory: https://divisaoeletrica.com.br/sn/fresd.php
Source: da36ed04-88c5-40a4-b059-eb9836bd7189.tmp.1.dr, 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, d4ab6060-f37d-4ea2-905c-eec3c17613f6.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr String found in binary or memory: https://i.stack.imgur.com
Source: Convert HEX uit phishing mail.htm String found in binary or memory: https://i.stack.imgur.com/vzbuQ.jpg);
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr String found in binary or memory: https://r3---sn-1gi7znes.gvt1.com
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: manifest.json0.0.dr, 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 9dfe1fee-4a66-4581-83f1-c3e0e326be03.tmp.1.dr, 65e5e673-e0b6-42f0-9fae-90f9fde41682.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown HTTPS traffic detected: 151.101.12.193:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49738 version: TLS 1.2
Source: classification engine Classification label: mal64.phis.winHTM@36/178@6/8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60F8FB2C-DC0.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\7eca31ac-bd15-435d-ad41-c55750ca56de.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\Convert HEX uit phishing mail.htm'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,14357687303338385437,9119543046795049864,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1708 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,14357687303338385437,9119543046795049864,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1708 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\3520_663501212\LICENSE.txt Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs