Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Transport_doc_09142022.html

Overview

General Information

Sample Name:Transport_doc_09142022.html
Analysis ID:732081
MD5:3bd894f88f3ed09356a800ba958b1373
SHA1:5428b915eddb22bc45de0fea009645d938eebd14
SHA256:dabe7e8a1af3743fc842d4e9094d1bb5ca894904d0520ee30b747384108b20fe
Infos:

Detection

HTMLPhisher
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish10
HTML body contains low number of good links
Suspicious form URL found
None HTTPS page querying sensitive user data (password, username or email)
No HTML title found

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5432 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\mike\Desktop\Transport_doc_09142022.html MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 1416 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1792,i,15787992088156616538,1467008769689291304,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
SourceRuleDescriptionAuthorStrings
Transport_doc_09142022.htmlJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    SourceRuleDescriptionAuthorStrings
    83002.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: Yara matchFile source: Transport_doc_09142022.html, type: SAMPLE
      Source: Yara matchFile source: 83002.0.pages.csv, type: HTML
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: Number of links: 0
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: Number of links: 0
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: Form action: https://nodomediego.xyz/noox/log.php
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: Form action: https://nodomediego.xyz/noox/log.php
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: HTML title missing
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: HTML title missing
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: No <meta name="copyright".. found
      Source: file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlHTTP Parser: No <meta name="copyright".. found
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
      Source: unknownHTTPS traffic detected: 94.130.112.187:443 -> 192.168.2.4:49719 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 94.130.112.187:443 -> 192.168.2.4:49720 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.105.142.196:443 -> 192.168.2.4:49721 version: TLS 1.2
      Source: unknownDNS traffic detected: queries for: accounts.google.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
      Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.227
      Source: unknownHTTPS traffic detected: 94.130.112.187:443 -> 192.168.2.4:49719 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 94.130.112.187:443 -> 192.168.2.4:49720 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.105.142.196:443 -> 192.168.2.4:49721 version: TLS 1.2
      Source: classification engineClassification label: mal48.phis.winHTML@24/0@9/102
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\mike\Desktop\Transport_doc_09142022.html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1792,i,15787992088156616538,1467008769689291304,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1792,i,15787992088156616538,1467008769689291304,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      2
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
      Obfuscated Files or Information
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      moneyissues.ng1%VirustotalBrowse
      edelivery.net0%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      accounts.google.com
      142.250.186.45
      truefalse
        high
        moneyissues.ng
        94.130.112.187
        truefalseunknown
        www.google.com
        142.250.186.164
        truefalse
          high
          clients.l.google.com
          142.250.185.110
          truefalse
            high
            edelivery.net
            34.105.142.196
            truefalseunknown
            clients2.google.com
            unknown
            unknownfalse
              high
              static.businessworld.in
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                file:///C:/Users/mike/Desktop/Transport_doc_09142022.htmlfalse
                  low
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  142.250.186.45
                  accounts.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.185.67
                  unknownUnited States
                  15169GOOGLEUSfalse
                  34.105.142.196
                  edelivery.netUnited States
                  15169GOOGLEUSfalse
                  34.104.35.123
                  unknownUnited States
                  15169GOOGLEUSfalse
                  94.130.112.187
                  moneyissues.ngGermany
                  24940HETZNER-ASDEfalse
                  104.21.68.20
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  142.250.185.110
                  clients.l.google.comUnited States
                  15169GOOGLEUSfalse
                  239.255.255.250
                  unknownReserved
                  unknownunknownfalse
                  142.250.186.164
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.184.227
                  unknownUnited States
                  15169GOOGLEUSfalse
                  IP
                  192.168.2.1
                  127.0.0.1
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:732081
                  Start date and time:2022-10-27 16:27:13 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:Transport_doc_09142022.html
                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                  Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  Analysis Mode:stream
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal48.phis.winHTML@24/0@9/102
                  Cookbook Comments:
                  • Found application associated with file extension: .html
                  • Exclude process from analysis (whitelisted): SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 142.250.185.67, 104.21.68.20, 172.67.185.28, 34.104.35.123
                  • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, login.live.com, slscr.update.microsoft.com, clientservices.googleapis.com, static.businessworld.in.cdn.cloudflare.net
                  • Not all processes where analyzed, report is missing behavior information
                  No created / dropped files found
                  File type:HTML document, Unicode text, UTF-8 text, with very long lines (9940), with CRLF line terminators
                  Entropy (8bit):6.012221668619681
                  TrID:
                  • HyperText Markup Language (13003/1) 100.00%
                  File name:Transport_doc_09142022.html
                  File size:16086
                  MD5:3bd894f88f3ed09356a800ba958b1373
                  SHA1:5428b915eddb22bc45de0fea009645d938eebd14
                  SHA256:dabe7e8a1af3743fc842d4e9094d1bb5ca894904d0520ee30b747384108b20fe
                  SHA512:5d6daa0c0e58c61c024fe0760ec75ce495505c55f192bffda38407201a59f96bde41248901150f85692e80af915463105bd7bdc0639acd47c16c01e7b7195b62
                  SSDEEP:384:FBkP1feSKcDWneHH5nBsHOGm2NhLKSvF8XKXhleiq:FSNAcA6XCBljdAaHq
                  TLSH:3D727EB542832A015737036167A92F2BFE3000A76B47295C3DDD52A96FF58D5C4A6F8C
                  File Content Preview:..<!DOCTYPE html>..<html>..<head>..<title>DHL</title>..<link rel="icon" href="https://moneyissues.ng/wp-content/uploads/2017/10/DHL-LOGO.jpg" type="image/gif" sizes="16x16">..<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scal
                  Icon Hash:78d0a8cccc88c460