Windows Analysis Report HSBC_Payment_slip_for Outstanding 001005l.htm

Overview

General Information

Sample Name: HSBC_Payment_slip_for Outstanding 001005l.htm
Analysis ID: 458936
MD5: b61772141ff432e58420e5e499994567
SHA1: 29b5db79051c197028403a38cd3a1bc61f5eec37
SHA256: ed22a74873af2f35b12b50548f25a43e2db46ddbe406a9033b2c86cc05f3cc11
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected HtmlPhish10
Yara detected HtmlPhish14
Yara detected HtmlPhish44
HTML document with suspicious name
HTML document with suspicious title
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
No HTML title found
None HTTPS page querying sensitive user data (password, username or email)
Suspicious form URL found

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: HSBC_Payment_slip_for Outstanding 001005l.htm Virustotal: Detection: 11% Perma Link

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: 21097.0.pages.csv, type: HTML
Yara detected HtmlPhish14
Source: Yara match File source: 21097.0.pages.csv, type: HTML
Yara detected HtmlPhish44
Source: Yara match File source: HSBC_Payment_slip_for Outstanding 001005l.htm, type: SAMPLE
Phishing site detected (based on image similarity)
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm Matcher: Found strong image similarity, brand: Microsoft image: 21097.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
Phishing site detected (based on logo template match)
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm Matcher: Template: microsoft matched
No HTML title found
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: HTML title missing
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: HTML title missing
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: Has password / email / username input fields
Suspicious form URL found
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: Form action: https://mt-autorepair.com//dcon/dny.php
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: Form action: https://mt-autorepair.com//dcon/dny.php
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49735 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox View IP Address: 192.229.221.185 192.229.221.185
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown DNS traffic detected: queries for: raktaxis.co.uk
Source: 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://aadcdn.msftauth.net
Source: manifest.json0.0.dr, 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://accounts.google.com
Source: manifest.json0.0.dr, 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://apis.google.com
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.2.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/downloads-lorry
Source: 5fb122e3-dcc1-45f3-9060-44c74a3ebcc2.tmp.2.dr, 8b82acec-f064-4432-9f97-dd5df07ab2d2.tmp.2.dr, 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://logincdn.msauth.net
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://r3---sn-5hneknee.gvt1.com
Source: 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: manifest.json0.0.dr, 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 10d0a43a-cd97-49a8-b2c8-b89df3a900a4.tmp.2.dr, 04e6ce28-f6ed-4598-8c57-bf90678b63df.tmp.2.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.6:49735 version: TLS 1.2

System Summary:

barindex
HTML document with suspicious name
Source: Name includes: HSBC_Payment_slip_for Outstanding 001005l.htm Initial sample: payment
HTML document with suspicious title
Source: file:///C:/Users/user/Desktop/HSBC_Payment_slip_for%20Outstanding%20001005l.htm Tab title: HSBC_Payment_slip_for Outstanding 001005l.htm
Source: classification engine Classification label: mal88.phis.winHTM@32/222@7/10
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-610A2178-1B4C.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\409faa5b-ba1e-4e0b-9ea3-7916934440d4.tmp Jump to behavior
Source: HSBC_Payment_slip_for Outstanding 001005l.htm Virustotal: Detection: 11%
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\HSBC_Payment_slip_for Outstanding 001005l.htm'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,14998763898602745597,3575006488296636630,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1700 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,14998763898602745597,3575006488296636630,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1700 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs