Windows Analysis Report
https://365214tesauppeortbasd132.z26.web.core.windows.net/#

Overview

General Information

Sample URL: https://365214tesauppeortbasd132.z26.web.core.windows.net/#
Analysis ID: 1560653
Infos:

Detection

TechSupportScam
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

AI detected phishing page
Antivirus / Scanner detection for submitted sample
Yara detected TechSupportScam
AI detected landing page (webpage, office document or email)
AI detected suspicious URL

Classification

AV Detection

barindex
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# SlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering

Phishing

barindex
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL '365214tesauppeortbasd132.z26.web.core.windows.net' does not match the legitimate domain for Microsoft., The URL uses a subdomain of 'web.core.windows.net', which is a common hosting service, but the prefix '365214tesauppeortbasd132' is suspicious and does not relate to Microsoft., The URL contains random alphanumeric characters and misspellings, which are common indicators of phishing., The use of a cloud service provider's domain with a suspicious subdomain is a common tactic in phishing attempts. DOM: 0.1.pages.csv
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Score: 8 Reasons: The URL uses a subdomain of 'web.core.windows.net', which is a legitimate Microsoft Azure domain used for hosting static websites., The main domain 'web.core.windows.net' is associated with Microsoft Azure, a cloud service by Microsoft., The subdomain '365214tesauppeortbasd132' is suspicious due to its random characters and does not clearly relate to any known Microsoft service., The presence of random characters in the subdomain is a common tactic used in phishing to confuse users., The brand 'Microsoft' is well-known and typically associated with domains like 'microsoft.com' or 'office.com'., The input fields labeled as 'u, n, k, n, o, w, n' do not provide clear context and could be a tactic to gather sensitive information. DOM: 0.9.pages.csv
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL '365214tesauppeortbasd132.z26.web.core.windows.net' does not match the legitimate domain for Microsoft., The URL uses a subdomain structure under 'web.core.windows.net', which is a common hosting service used by Microsoft Azure, but the subdomain '365214tesauppeortbasd132' is suspicious and does not clearly relate to Microsoft., The subdomain contains random characters and misspellings, which are common indicators of phishing attempts., The presence of '365' in the subdomain could be an attempt to mimic 'Office 365', a Microsoft product, which is a common phishing tactic. DOM: 0.11.pages.csv
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Score: 8 Reasons: The URL uses a subdomain of 'web.core.windows.net', which is a legitimate Microsoft Azure domain used for hosting static websites., The main domain does not match the typical domain associated with Microsoft services, which is 'microsoft.com'., The subdomain '365214tesauppeortbasd132' is suspicious due to its random characters and does not clearly relate to any known Microsoft service., The presence of '365' in the subdomain could be an attempt to mimic 'Office 365', a well-known Microsoft product, which is a common phishing tactic., The brand 'Microsoft' is classified as 'wellknown', and any deviation from its standard domain should be treated with caution. DOM: 0.10.pages.csv
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL '365214tesauppeortbasd132.z26.web.core.windows.net' does not match the legitimate domain for Microsoft., The URL uses a subdomain structure under 'web.core.windows.net', which is a common hosting service used by Microsoft Azure, but the subdomain '365214tesauppeortbasd132' is suspicious and not recognizable as a legitimate Microsoft service., The subdomain contains random characters and misspellings, which are common indicators of phishing attempts., The use of '365' in the subdomain may be attempting to mimic 'Office 365', a Microsoft product, which is a common phishing tactic. DOM: 0.12.pages.csv
Source: Yara match File source: 0.1.pages.csv, type: HTML
Source: Yara match File source: 0.0.pages.csv, type: HTML
Source: Yara match File source: 0.12.pages.csv, type: HTML
Source: Yara match File source: 0.9.pages.csv, type: HTML
Source: Yara match File source: 0.10.pages.csv, type: HTML
Source: Yara match File source: 0.6.pages.csv, type: HTML
Source: Yara match File source: dropped/chromecache_79, type: DROPPED
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.0.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.1.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.3.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.2.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.6.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.7.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.8.pages.csv'
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# Joe Sandbox AI: Page contains button: 'Scan now' Source: '0.9.pages.csv'
Source: Email Joe Sandbox AI: AI detected Brand spoofing attempt in URL: https://365214tesauppeortbasd132.z26.web.core.windows.net
Source: Email Joe Sandbox AI: AI detected Typosquatting in URL: https://365214tesauppeortbasd132.z26.web.core.windows.net
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: https://365214tesauppeortbasd132.z26.web.core.windows.net/# HTTP Parser: No favicon
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\scoped_dir7464_730077795 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\chrome_BITS_7464_977693316 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 23.44.203.73
Source: unknown TCP traffic detected without corresponding DNS query: 23.57.90.141
Source: unknown TCP traffic detected without corresponding DNS query: 146.19.181.36
Source: unknown TCP traffic detected without corresponding DNS query: 146.19.181.36
Source: unknown TCP traffic detected without corresponding DNS query: 146.19.181.36
Source: unknown TCP traffic detected without corresponding DNS query: 146.19.181.36
Source: unknown TCP traffic detected without corresponding DNS query: 142.251.35.163
Source: unknown TCP traffic detected without corresponding DNS query: 142.251.35.163
Source: unknown UDP traffic detected without corresponding DNS query: 239.255.255.250
Source: unknown UDP traffic detected without corresponding DNS query: 239.255.255.250
Source: unknown UDP traffic detected without corresponding DNS query: 239.255.255.250
Source: unknown UDP traffic detected without corresponding DNS query: 239.255.255.250
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /emojione/2.2.7/lib/js/emojione.min.js HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-alivesec-ch-ua: "Chromium";v="128", "Not;A=Brand";v="24", "Google Chrome";v="128"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://365214tesauppeortbasd132.z26.web.core.windows.net/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /emojione/assets/png/1f44b.png?v=2.2.7 HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-alivesec-ch-ua: "Chromium";v="128", "Not;A=Brand";v="24", "Google Chrome";v="128"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /emojione/2.2.7/lib/js/emojione.min.js HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /emojione/assets/png/1f44b.png?v=2.2.7 HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic DNS traffic detected: DNS query: embed.tawk.to
Source: global traffic DNS traffic detected: DNS query: va.tawk.to
Source: global traffic DNS traffic detected: DNS query: vsa20.tawk.to
Source: global traffic DNS traffic detected: DNS query: cdn.jsdelivr.net
Source: global traffic TCP traffic: 192.168.11.20:61825 -> 239.255.255.250:1900
Source: global traffic TCP traffic: 192.168.11.20:61825 -> 239.255.255.250:1900
Source: global traffic TCP traffic: 192.168.11.20:61825 -> 239.255.255.250:1900
Source: global traffic TCP traffic: 192.168.11.20:61825 -> 239.255.255.250:1900
Source: chromecache_96.1.dr String found in binary or memory: http://fontawesome.io
Source: chromecache_96.1.dr String found in binary or memory: http://fontawesome.io/license
Source: chromecache_79.1.dr String found in binary or memory: https://embed.tawk.to/666f8536981b6c56477dfe5c/1i0hq0o9u
Source: chromecache_127.1.dr String found in binary or memory: https://ezgif.com/optimize
Source: chromecache_142.1.dr, chromecache_101.1.dr, chromecache_78.1.dr String found in binary or memory: https://getbootstrap.com/)
Source: chromecache_142.1.dr, chromecache_101.1.dr, chromecache_78.1.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/main/LICENSE)
Source: chromecache_142.1.dr, chromecache_78.1.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49860
Source: unknown Network traffic detected: HTTP traffic on port 49800 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49793 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49803 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49799 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49860 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49772 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49799
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49796
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49772
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49771
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49793
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49792
Source: unknown Network traffic detected: HTTP traffic on port 49747 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49685 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49796 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49802 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49803
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49747
Source: unknown Network traffic detected: HTTP traffic on port 49792 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49802
Source: unknown Network traffic detected: HTTP traffic on port 49771 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49800

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: Yara match File source: 0.1.pages.csv, type: HTML
Source: Yara match File source: 0.0.pages.csv, type: HTML
Source: Yara match File source: 0.12.pages.csv, type: HTML
Source: Yara match File source: 0.9.pages.csv, type: HTML
Source: Yara match File source: 0.10.pages.csv, type: HTML
Source: Yara match File source: 0.6.pages.csv, type: HTML
Source: Yara match File source: dropped/chromecache_79, type: DROPPED
Source: classification engine Classification label: mal72.phis.win@18/146@16/8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\scoped_dir7464_730077795 Jump to behavior
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2212,i,2975576958291642428,16294002062310823096,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2224 /prefetch:3
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://365214tesauppeortbasd132.z26.web.core.windows.net/#"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=4648,i,2975576958291642428,16294002062310823096,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5796 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2212,i,2975576958291642428,16294002062310823096,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2224 /prefetch:3 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --no-subproc-heap-profiling --field-trial-handle=4648,i,2975576958291642428,16294002062310823096,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=5796 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\scoped_dir7464_730077795 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\chrome_BITS_7464_977693316 Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs