Windows Analysis Report Remittance.html

Overview

General Information

Sample Name: Remittance.html
Analysis ID: 452312
MD5: 1dd3d108e04a63ab04097cab5f10a921
SHA1: f4efed64ae9894307197126c22a21e57e8783114
SHA256: bbde5d42af6fd69db1901c341452a98c25fd5b8499c661b94cc24d45ea67bc86
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish10
HTML body contains low number of good links
HTML title does not match URL
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
None HTTPS page querying sensitive user data (password, username or email)

Classification

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: Remittance.html, type: SAMPLE
Source: Yara match File source: 46832.pages.csv, type: HTML
HTML body contains low number of good links
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: Number of links: 0
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: Number of links: 0
HTML title does not match URL
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: Title: Adobe Online - Pdf Reader! does not match URL
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: Title: Adobe Online - Pdf Reader! does not match URL
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/Remittance.html HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\4168_38619290\LICENSE.txt Jump to behavior
Source: unknown HTTPS traffic detected: 50.16.239.65:443 -> 192.168.2.3:49722 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox View IP Address: 104.16.18.94 104.16.18.94
Source: Joe Sandbox View IP Address: 104.16.18.94 104.16.18.94
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: Ruleset Data.1.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.1.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: cdnjs.cloudflare.com
Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: Reporting and NEL.2.dr String found in binary or memory: https://a.nel.cloudflare.com/report/v3?s=uVY7OXxDC%2BiAzyymndWhSKTzKCnWvCZNdSKu5QKW1A46NZtfMXOxecT7H
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, manifest.json0.1.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://accounts.google.com
Source: Remittance.html String found in binary or memory: https://api.ipify.org?format=json
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, manifest.json0.1.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://apis.google.com
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://cdnjs.cloudflare.com
Source: Remittance.html String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.1.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.1.dr String found in binary or memory: https://content.googleapis.com
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr, 5ea4ab61-ad13-4b75-952c-b82929c22263.tmp.2.dr, 892a86e7-b00b-4adf-aeb5-0be4fe83df99.tmp.2.dr String found in binary or memory: https://dns.google
Source: manifest.json0.1.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.1.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.1.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.1.dr String found in binary or memory: https://hangouts.google.com/
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.1.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://play.google.com
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://r2---sn-h0jeln7e.gvt1.com
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.1.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json83.1.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json83.1.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: Remittance.html String found in binary or memory: https://topbrandsolutions.co.za/js.php
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, manifest.json0.1.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://www.google.com
Source: manifest.json.1.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.1.dr String found in binary or memory: https://www.google.com;
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.1.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.1.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 48df04dc-ff9b-4ec4-a84f-97918f468f8a.tmp.2.dr, 4afd69e8-f247-4022-92bc-c403c19bd8dc.tmp.2.dr, 50f8a42d-830e-4ac8-8f88-ee44c3e78ed0.tmp.2.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.1.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown HTTPS traffic detected: 50.16.239.65:443 -> 192.168.2.3:49722 version: TLS 1.2
Source: classification engine Classification label: mal48.phis.winHTML@35/184@5/8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60F9633C-1048.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\3c78cb66-206a-4278-bf9a-f05e94f16e4b.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\Remittance.html'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,10324375867687729821,3875551371938988928,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1700 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,10324375867687729821,3875551371938988928,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1700 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\4168_38619290\LICENSE.txt Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs