Windows Analysis Report ATT05713.HTM

Overview

General Information

Sample Name: ATT05713.HTM
Analysis ID: 458998
MD5: b19832d191db32123216ba2f49053966
SHA1: 956c4392e180687ce329b04e2b3bbe8c02b7b850
SHA256: 5d25ae5bc09aa2ba8541432fb4d6973195d08c349e2fb645994c890f7981c69e
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
HTML document with suspicious title
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
IP address seen in connection with other malware
Invalid 'forgot password' link found
Invalid T&C link found
JA3 SSL client fingerprint seen in connection with other malware
No HTML title found
None HTTPS page querying sensitive user data (password, username or email)

Classification

Phishing:

barindex
Phishing site detected (based on favicon image match)
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== Matcher: Template: microsoft matched with high similarity
Yara detected HtmlPhish10
Source: Yara match File source: 96078.0.pages.csv, type: HTML
Phishing site detected (based on image similarity)
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== Matcher: Found strong image similarity, brand: Microsoft image: 96078.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
Phishing site detected (based on logo template match)
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Number of links: 0
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Number of links: 0
Invalid 'forgot password' link found
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Invalid link: Forgot my password
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Invalid link: Forgot my password
Invalid T&C link found
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Invalid link: Terms of use
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Invalid link: Privacy & cookies
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Invalid link: Terms of use
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Invalid link: Privacy & cookies
No HTML title found
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: HTML title missing
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: HTML title missing
None HTTPS page querying sensitive user data (password, username or email)
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: Has password / email / username input fields
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\4720_1056693286\LICENSE.txt Jump to behavior
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49715 version: TLS 1.2
Source: unknown HTTPS traffic detected: 62.108.32.123:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49733 version: TLS 1.2

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 62.108.32.123 62.108.32.123
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox View IP Address: 104.16.19.94 104.16.19.94
Source: Joe Sandbox View IP Address: 104.16.19.94 104.16.19.94
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: b32309a26951912be7dba376398abc3b
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: Ruleset Data.0.dr String found in binary or memory: www.facebook.com/ajax/ads/ equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: cdnjs.cloudflare.com
Source: Reporting and NEL.1.dr String found in binary or memory: https://a.nel.cloudflare.com/report/v3?s=mMBHgSoZeg83OR1z47hZT6364jKvrJSjQa7QMGrkXig2MVnDFV221Vsrl9L
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr String found in binary or memory: https://aadcdn.msauth.net
Source: manifest.json0.0.dr, 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://accounts.google.com
Source: manifest.json0.0.dr, 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://apis.google.com
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr String found in binary or memory: https://cdnjs.cloudflare.com
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.0.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.0.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.1.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external
Source: Reporting and NEL.1.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/downloads-lorry
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 6c9736cb-4be6-4016-952f-6e634e9b4ccd.tmp.1.dr, 879f4b66-ec9a-44dd-a3a4-db7bba210c62.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://dns.google
Source: manifest.json0.0.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://fonts.gstatic.com;
Source: manifest.json0.0.dr String found in binary or memory: https://hangouts.google.com/
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr String found in binary or memory: https://nadine-julitz.de
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://ogs.google.com
Source: Favicons.0.dr String found in binary or memory: https://p-9kl.link/mx/favicon.ico
Source: manifest.json.0.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://play.google.com
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr String found in binary or memory: https://r3---sn-5hne6nsz.gvt1.com
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.0.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json41.0.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: manifest.json0.0.dr, 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://www.google.com
Source: manifest.json.0.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.google.com;
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.0.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.0.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 7702288f-fe1d-48f6-9e31-9624bac2d46a.tmp.1.dr, 3f229aa2-6e2f-4942-9fa5-b5e8cff381e5.tmp.1.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.0.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49714 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49715 version: TLS 1.2
Source: unknown HTTPS traffic detected: 62.108.32.123:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.94.104.5:443 -> 192.168.2.3:49733 version: TLS 1.2

System Summary:

barindex
HTML document with suspicious title
Source: file:///C:/Users/user/Desktop/ATT05713.HTM#amphZWdlckBidXJuc2lkZWhvc3BpdGFsLmFzbi5hdQ== Tab title: Sign in to your account
Source: classification engine Classification label: mal68.phis.winHTM@36/220@9/9
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-610A5A20-1270.pma Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\b105763a-c3e6-4d98-9111-f5fbc9fe0fa0.tmp Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation 'C:\Users\user\Desktop\ATT05713.HTM'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,15233345370030561450,1733486252652100380,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1704 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,15233345370030561450,1733486252652100380,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1704 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Local\Temp\4720_1056693286\LICENSE.txt Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs