Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://nmwer.rweolof.com/#t

Overview

General Information

Sample URL:http://nmwer.rweolof.com/#t
Analysis ID:1437714
Infos:
Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

No high impact signatures.

Classification

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis
  • System is w10x64
  • chrome.exe (PID: 5848 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 4248 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 --field-trial-handle=2380,i,1169977937942231870,7947352755105201144,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6520 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://nmwer.rweolof.com/#t" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: nmwer.rweolof.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: classification engineClassification label: unknown0.win@19/0@12/3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 --field-trial-handle=2380,i,1169977937942231870,7947352755105201144,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://nmwer.rweolof.com/#t"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 --field-trial-handle=2380,i,1169977937942231870,7947352755105201144,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://nmwer.rweolof.com/#t0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    google.com
    142.251.40.110
    truefalse
      high
      www.google.com
      142.250.72.100
      truefalse
        high
        fp2e7a.wpc.phicdn.net
        192.229.211.108
        truefalse
          unknown
          nmwer.rweolof.com
          unknown
          unknownfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            142.250.72.100
            www.google.comUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.4
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1437714
            Start date and time:2024-05-07 20:34:42 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 5s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:browseurl.jbs
            Sample URL:http://nmwer.rweolof.com/#t
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:UNKNOWN
            Classification:unknown0.win@19/0@12/3
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • URL browsing timeout or error
            • URL not reachable
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 142.251.41.3, 142.250.65.206, 172.253.63.84, 34.104.35.123, 69.192.108.161, 52.165.165.26, 199.232.210.172, 52.165.164.15, 192.229.211.108
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, ocsp.edge.digicert.com, sls.update.microsoft.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: http://nmwer.rweolof.com/#t
            No simulations
            No context
            No context
            No context
            No context
            No context
            No created / dropped files found
            No static file info
            TimestampSource PortDest PortSource IPDest IP
            May 7, 2024 20:35:32.045252085 CEST49675443192.168.2.4173.222.162.32
            May 7, 2024 20:35:41.655276060 CEST49675443192.168.2.4173.222.162.32
            May 7, 2024 20:35:43.474266052 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.474308014 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.474365950 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.474977970 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.474987984 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.659204006 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.659744978 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.659770966 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.660649061 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.660706997 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.663616896 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.663667917 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.715508938 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:43.715532064 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:43.762376070 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:53.663135052 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:53.663234949 CEST44349737142.250.72.100192.168.2.4
            May 7, 2024 20:35:53.665642977 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:53.938718081 CEST49737443192.168.2.4142.250.72.100
            May 7, 2024 20:35:53.938759089 CEST44349737142.250.72.100192.168.2.4
            TimestampSource PortDest PortSource IPDest IP
            May 7, 2024 20:35:39.785060883 CEST53505671.1.1.1192.168.2.4
            May 7, 2024 20:35:39.793711901 CEST53493241.1.1.1192.168.2.4
            May 7, 2024 20:35:40.405126095 CEST53521301.1.1.1192.168.2.4
            May 7, 2024 20:35:40.976109982 CEST5884553192.168.2.41.1.1.1
            May 7, 2024 20:35:40.977706909 CEST5323853192.168.2.41.1.1.1
            May 7, 2024 20:35:41.312757015 CEST53532381.1.1.1192.168.2.4
            May 7, 2024 20:35:41.432998896 CEST53588451.1.1.1192.168.2.4
            May 7, 2024 20:35:41.433928013 CEST5591553192.168.2.41.1.1.1
            May 7, 2024 20:35:41.803852081 CEST53559151.1.1.1192.168.2.4
            May 7, 2024 20:35:41.831280947 CEST6285953192.168.2.48.8.8.8
            May 7, 2024 20:35:41.831556082 CEST5808853192.168.2.41.1.1.1
            May 7, 2024 20:35:41.916268110 CEST53580881.1.1.1192.168.2.4
            May 7, 2024 20:35:41.924232006 CEST53628598.8.8.8192.168.2.4
            May 7, 2024 20:35:42.873092890 CEST6119653192.168.2.41.1.1.1
            May 7, 2024 20:35:42.873859882 CEST5558253192.168.2.41.1.1.1
            May 7, 2024 20:35:43.314009905 CEST53611961.1.1.1192.168.2.4
            May 7, 2024 20:35:43.314613104 CEST53555821.1.1.1192.168.2.4
            May 7, 2024 20:35:43.383972883 CEST5032953192.168.2.41.1.1.1
            May 7, 2024 20:35:43.387628078 CEST5310153192.168.2.41.1.1.1
            May 7, 2024 20:35:43.469259024 CEST53503291.1.1.1192.168.2.4
            May 7, 2024 20:35:43.472630024 CEST53531011.1.1.1192.168.2.4
            May 7, 2024 20:35:48.388015985 CEST5222653192.168.2.41.1.1.1
            May 7, 2024 20:35:48.388782024 CEST5447153192.168.2.41.1.1.1
            May 7, 2024 20:35:48.473692894 CEST53544711.1.1.1192.168.2.4
            May 7, 2024 20:35:48.720880985 CEST53522261.1.1.1192.168.2.4
            May 7, 2024 20:35:48.721940041 CEST5787753192.168.2.41.1.1.1
            May 7, 2024 20:35:49.160398006 CEST53578771.1.1.1192.168.2.4
            May 7, 2024 20:35:54.864299059 CEST138138192.168.2.4192.168.2.255
            May 7, 2024 20:35:57.791325092 CEST53543471.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            May 7, 2024 20:35:40.976109982 CEST192.168.2.41.1.1.10x5356Standard query (0)nmwer.rweolof.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:40.977706909 CEST192.168.2.41.1.1.10x8966Standard query (0)nmwer.rweolof.com65IN (0x0001)false
            May 7, 2024 20:35:41.433928013 CEST192.168.2.41.1.1.10xee12Standard query (0)nmwer.rweolof.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:41.831280947 CEST192.168.2.48.8.8.80x5a4bStandard query (0)google.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:41.831556082 CEST192.168.2.41.1.1.10x4fdbStandard query (0)google.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:42.873092890 CEST192.168.2.41.1.1.10xeaecStandard query (0)nmwer.rweolof.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:42.873859882 CEST192.168.2.41.1.1.10xc5ebStandard query (0)nmwer.rweolof.com65IN (0x0001)false
            May 7, 2024 20:35:43.383972883 CEST192.168.2.41.1.1.10x3887Standard query (0)www.google.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:43.387628078 CEST192.168.2.41.1.1.10xb6e3Standard query (0)www.google.com65IN (0x0001)false
            May 7, 2024 20:35:48.388015985 CEST192.168.2.41.1.1.10xe3f7Standard query (0)nmwer.rweolof.comA (IP address)IN (0x0001)false
            May 7, 2024 20:35:48.388782024 CEST192.168.2.41.1.1.10xdb1fStandard query (0)nmwer.rweolof.com65IN (0x0001)false
            May 7, 2024 20:35:48.721940041 CEST192.168.2.41.1.1.10x362aStandard query (0)nmwer.rweolof.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            May 7, 2024 20:35:41.312757015 CEST1.1.1.1192.168.2.40x8966Name error (3)nmwer.rweolof.comnonenone65IN (0x0001)false
            May 7, 2024 20:35:41.432998896 CEST1.1.1.1192.168.2.40x5356Name error (3)nmwer.rweolof.comnonenoneA (IP address)IN (0x0001)false
            May 7, 2024 20:35:41.803852081 CEST1.1.1.1192.168.2.40xee12Name error (3)nmwer.rweolof.comnonenoneA (IP address)IN (0x0001)false
            May 7, 2024 20:35:41.916268110 CEST1.1.1.1192.168.2.40x4fdbNo error (0)google.com142.251.40.110A (IP address)IN (0x0001)false
            May 7, 2024 20:35:41.924232006 CEST8.8.8.8192.168.2.40x5a4bNo error (0)google.com142.250.65.238A (IP address)IN (0x0001)false
            May 7, 2024 20:35:43.314009905 CEST1.1.1.1192.168.2.40xeaecName error (3)nmwer.rweolof.comnonenoneA (IP address)IN (0x0001)false
            May 7, 2024 20:35:43.314613104 CEST1.1.1.1192.168.2.40xc5ebName error (3)nmwer.rweolof.comnonenone65IN (0x0001)false
            May 7, 2024 20:35:43.469259024 CEST1.1.1.1192.168.2.40x3887No error (0)www.google.com142.250.72.100A (IP address)IN (0x0001)false
            May 7, 2024 20:35:43.472630024 CEST1.1.1.1192.168.2.40xb6e3No error (0)www.google.com65IN (0x0001)false
            May 7, 2024 20:35:48.473692894 CEST1.1.1.1192.168.2.40xdb1fName error (3)nmwer.rweolof.comnonenone65IN (0x0001)false
            May 7, 2024 20:35:48.720880985 CEST1.1.1.1192.168.2.40xe3f7Name error (3)nmwer.rweolof.comnonenoneA (IP address)IN (0x0001)false
            May 7, 2024 20:35:49.160398006 CEST1.1.1.1192.168.2.40x362aName error (3)nmwer.rweolof.comnonenoneA (IP address)IN (0x0001)false
            May 7, 2024 20:35:55.414376020 CEST1.1.1.1192.168.2.40x5a51No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
            May 7, 2024 20:35:55.414376020 CEST1.1.1.1192.168.2.40x5a51No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
            May 7, 2024 20:35:56.308162928 CEST1.1.1.1192.168.2.40xad58No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            May 7, 2024 20:35:56.308162928 CEST1.1.1.1192.168.2.40xad58No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:20:35:35
            Start date:07/05/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:2
            Start time:20:35:37
            Start date:07/05/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 --field-trial-handle=2380,i,1169977937942231870,7947352755105201144,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:3
            Start time:20:35:39
            Start date:07/05/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://nmwer.rweolof.com/#t"
            Imagebase:0x7ff76e190000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            No disassembly