Windows Analysis Report https://ballardagency-my.sharepoint.com/:u:/p/linda_davidson/EUJ1_psy-lhNg86-55dcNsUB8Ohn7k8q2Vtm1Wl6wQekUA?download=1

Overview

General Information

Sample URL: https://ballardagency-my.sharepoint.com/:u:/p/linda_davidson/EUJ1_psy-lhNg86-55dcNsUB8Ohn7k8q2Vtm1Wl6wQekUA?download=1
Analysis ID: 458931
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Phishing site detected (based on favicon image match)
Yara detected HtmlPhish44
Phishing site detected (based on logo template match)
No HTML title found
None HTTPS page querying sensitive user data (password, username or email)

Classification

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish44
Source: Yara match File source: C:\Users\user\Downloads\37341020-383d-44e0-be87-80eb5cb51d67.tmp, type: DROPPED
Phishing site detected (based on logo template match)
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html Matcher: Template: microsoft matched
No HTML title found
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: HTML title missing
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: HTML title missing
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Downloads/Invoice%20revised%20000101%20and%20Proposal.html HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\1200_638644549\LICENSE.txt Jump to behavior
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: clients2.google.com
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, manifest.json0.0.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, manifest.json0.0.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://ballardagency-my.sharepoint.com
Source: History.0.dr String found in binary or memory: https://ballardagency-my.sharepoint.com/:u:/p/linda_davidson/EUJ1_psy-lhNg86-55dcNsUB8Ohn7k8q2Vtm1Wl
Source: 000003.log3.0.dr, History.0.dr, Invoice revised 000101 and Proposal.html_Zone.Identifier.2.dr String found in binary or memory: https://ballardagency-my.sharepoint.com/personal/linda_davidson_ballardagency_com/Documents/Invoice%
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.1.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external
Source: Reporting and NEL.1.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/downloads-lorry
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 72c7e216-6d73-499a-9c36-3c23cd7335da.tmp.1.dr, 4c8a4380-5343-41f8-8fc3-60b6cc642ecb.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://firebasestorage.googleapis.com
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: Favicons.0.dr String found in binary or memory: https://gitsoft-container000.azurewebsites.net/favicon623e44eff7.ico
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://play.google.com
Source: 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://r3---sn-5hneknee.gvt1.com
Source: 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: Reporting and NEL.1.dr String found in binary or memory: https://spo.nel.measure.office.net/api/report?tenantId=5f3e6069-fb0f-4412-930b-cb66f850e217&destinat
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, manifest.json0.0.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 236ef2f3-ec28-41f8-ab4f-df480ebb3f97.tmp.1.dr, 596634fa-2fb1-445a-8b42-bf45619ff6e8.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49769 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49769
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: classification engine Classification label: mal60.phis.win@37/222@6/6
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-610A2008-4B0.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\bb9c38bb-6e14-4be8-aa77-ce0dcc831e17.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'https://ballardagency-my.sharepoint.com/:u:/p/linda_davidson/EUJ1_psy-lhNg86-55dcNsUB8Ohn7k8q2Vtm1Wl6wQekUA?download=1'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1544,18194422631878575160,1734107580143613396,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1752 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1544,18194422631878575160,1734107580143613396,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --mojo-platform-channel-handle=4964 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1544,18194422631878575160,1734107580143613396,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1752 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1544,18194422631878575160,1734107580143613396,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --mojo-platform-channel-handle=4964 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\1200_638644549\LICENSE.txt Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs