Windows Analysis Report State Settlement Copy.html

Overview

General Information

Sample Name: State Settlement Copy.html
Analysis ID: 458968
MD5: 3ddfedf04fbd4845a8ff73e736d08add
SHA1: 936084447f9cba083697ec7e392c833476f3406c
SHA256: 111442186d007f4e43de930b5bef6cd92bafe101557890f6ffd2d9c7b685a2d0
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected HtmlPhish10
Yara detected HtmlPhish44
Yara detected obfuscated html page
HTML body contains low number of good links
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
No HTML title found
None HTTPS page querying sensitive user data (password, username or email)
Suspicious form URL found

Classification

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: 13434.0.pages.csv, type: HTML
Yara detected HtmlPhish44
Source: Yara match File source: State Settlement Copy.html, type: SAMPLE
Yara detected obfuscated html page
Source: Yara match File source: State Settlement Copy.html, type: SAMPLE
HTML body contains low number of good links
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: Number of links: 0
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: Number of links: 0
No HTML title found
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: HTML title missing
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: HTML title missing
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: Has password / email / username input fields
Suspicious form URL found
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: Form action: https://mazdel.com/wp-content/off.php
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: Form action: https://mazdel.com/wp-content/off.php
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/State%20Settlement%20Copy.html HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\5784_142391203\LICENSE.txt Jump to behavior
Source: unknown HTTPS traffic detected: 185.151.30.153:443 -> 192.168.2.5:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 70.36.99.230:443 -> 192.168.2.5:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 176.9.17.111:443 -> 192.168.2.5:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.151.30.153:443 -> 192.168.2.5:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 70.36.99.230:443 -> 192.168.2.5:49735 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: clients2.google.com
Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: Reporting and NEL.2.dr String found in binary or memory: https://a.nel.cloudflare.com/report/v3?s=fQUltQsVT%2Bc6VlTjJQLGrl7%2FFRzekZfgWOIaxObRNZyrEGl2%2Fs5hk
Source: manifest.json0.0.dr, ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://accounts.google.com
Source: manifest.json0.0.dr, ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://apis.google.com
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr String found in binary or memory: https://cdn.mosoah.com
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.2.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external
Source: 4e22a8c8-c42a-4fbe-a5b6-2f7e75ea3527.tmp.2.dr, ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, 4b36cb26-fbc3-43ea-8d7a-8dc1df58ddd0.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr String found in binary or memory: https://letsteachtheworld.org
Source: Current Session.0.dr String found in binary or memory: https://mazdel.com/wp-content/off.php
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr String found in binary or memory: https://t4.ftcdn.net
Source: manifest.json0.0.dr, ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: ff9768f9-45ea-456c-93ad-4b7a197e8973.tmp.2.dr, a55005c2-44bb-4dd7-b605-bf9447383684.tmp.2.dr, bb7a29b8-8969-482a-ae5b-87fd5e1b8c7d.tmp.2.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown HTTPS traffic detected: 185.151.30.153:443 -> 192.168.2.5:49719 version: TLS 1.2
Source: unknown HTTPS traffic detected: 70.36.99.230:443 -> 192.168.2.5:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 176.9.17.111:443 -> 192.168.2.5:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 185.151.30.153:443 -> 192.168.2.5:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 70.36.99.230:443 -> 192.168.2.5:49735 version: TLS 1.2
Source: classification engine Classification label: mal64.phis.winHTML@33/224@12/12
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-610A3126-1698.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\dd55306c-a3c9-4de3-a1a9-769cfea0d70f.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\State Settlement Copy.html'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1636,2459575167211995088,13394836041496998709,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1696 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1636,2459575167211995088,13394836041496998709,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1696 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\5784_142391203\LICENSE.txt Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs