Windows Analysis Report
http://172.104.75.98/owa/

Overview

General Information

Sample URL: http://172.104.75.98/owa/
Analysis ID: 1446883
Infos:

Detection

Outlook Phishing, HTMLPhisher
Score: 92
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

AI detected phishing page
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Phishing site detected (based on favicon image match)
Yara detected HtmlPhish10
AI detected suspicious javascript
Phishing site detected (based on logo match)
Yara detected Outlook Phishing page
HTML body contains low number of good links
HTML body with high number of embedded images detected
HTML title does not match URL
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

AV Detection

barindex
Source: http://172.104.75.98/owa/ Avira URL Cloud: detection malicious, Label: phishing
Source: http://172.104.75.98/owa/auth/15.2.792/themes/resources/segoeui-regular.ttf Avira URL Cloud: Label: phishing
Source: http://172.104.75.98/owa/auth/15.2.792/themes/resources/favicon.ico Avira URL Cloud: Label: phishing

Phishing

barindex
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 LLM: Score: 9 brands: Outlook Reasons: The URL uses an IP address instead of a domain name, which is a common tactic in phishing attacks. The page mimics the Outlook login page, which is a well-known brand, to deceive users into entering their credentials. The legitimate Outlook login page would typically be hosted on a domain like 'outlook.com' or 'office.com', not an IP address. DOM: 0.0.pages.csv
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 Matcher: Template: outlook matched with high similarity
Source: Yara match File source: 0.0.pages.csv, type: HTML
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 LLM: Score: 7 Reasons: The code attempts to create ActiveX objects, which can be a security risk as they can execute arbitrary code on the user's machine. This is particularly concerning for non-IE browsers where ActiveX is not supported. Additionally, the use of document.write can lead to cross-site scripting (XSS) vulnerabilities. DOM: 0.0.pages.csv
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 Matcher: Template: outlook matched
Source: Yara match File source: 0.0.pages.csv, type: HTML
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: Number of links: 0
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: Total embedded image size: 23460
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: Title: Outlook does not match URL
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: Has password / email / username input fields
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: <input type="password" .../> found
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: No <meta name="author".. found
Source: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1 HTTP Parser: No <meta name="copyright".. found
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49718 version: TLS 1.2
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknown TCP traffic detected without corresponding DNS query: 172.104.75.98
Source: unknown TCP traffic detected without corresponding DNS query: 23.1.237.91
Source: global traffic HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global traffic HTTP traffic detected: GET /owa/ HTTP/1.1Host: 172.104.75.98Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /owa/auth/logon.aspx?replaceCurrent=1 HTTP/1.1Host: 172.104.75.98Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /owa/auth/15.2.792/themes/resources/segoeui-regular.ttf HTTP/1.1Host: 172.104.75.98Connection: keep-aliveOrigin: http://172.104.75.98User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Referer: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /owa/auth/15.2.792/themes/resources/favicon.ico HTTP/1.1Host: 172.104.75.98Connection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://172.104.75.98/owa/auth/logon.aspx?replaceCurrent=1Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Cookie: cookieTest=1
Source: global traffic HTTP traffic detected: GET /owa/auth/15.2.792/themes/resources/favicon.ico HTTP/1.1Host: 172.104.75.98Connection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Cookie: cookieTest=1
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: unknown Network traffic detected: HTTP traffic on port 49674 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49675 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49718 version: TLS 1.2
Source: classification engine Classification label: mal92.phis.win@16/8@2/5
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2212,i,17721641698521670201,16647788387140387624,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://172.104.75.98/owa/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2212,i,17721641698521670201,16647788387140387624,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Google Drive.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs