Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E

Overview

General Information

Sample URL:https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Analysis ID:1302550

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

URL contains potential PII (phishing indication)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5388 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 3168 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1744,i,16281208972045632004,16322955645774891720,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3ESample URL: PII: %3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3EHTTP Parser: No favicon
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Source: unknownDNS traffic detected: queries for: accounts.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: classification engineClassification label: clean0.win@24/4@9/115
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1744,i,16281208972045632004,16322955645774891720,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1744,i,16281208972045632004,16322955645774891720,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.250.181.237
truefalse
    high
    smartlead-be-alb-1825251389.ap-southeast-2.elb.amazonaws.com
    52.65.200.231
    truefalse
      high
      www.google.com
      142.250.185.132
      truefalse
        high
        clients.l.google.com
        142.250.185.174
        truefalse
          high
          clients2.google.com
          unknown
          unknownfalse
            high
            open.sleadtrack.com
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3Efalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.250.181.237
                accounts.google.comUnited States
                15169GOOGLEUSfalse
                142.250.186.68
                unknownUnited States
                15169GOOGLEUSfalse
                34.104.35.123
                unknownUnited States
                15169GOOGLEUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                142.250.185.174
                clients.l.google.comUnited States
                15169GOOGLEUSfalse
                52.65.200.231
                smartlead-be-alb-1825251389.ap-southeast-2.elb.amazonaws.comUnited States
                16509AMAZON-02USfalse
                142.250.186.132
                unknownUnited States
                15169GOOGLEUSfalse
                172.217.18.3
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.184.227
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.1
                Joe Sandbox Version:38.0.0 Beryl
                Analysis ID:1302550
                Start date and time:2023-09-04 06:03:57 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
                Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean0.win@24/4@9/115
                • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 142.250.184.227, 34.104.35.123
                • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, slscr.update.microsoft.com, clientservices.googleapis.com
                • Not all processes where analyzed, report is missing behavior information
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:HTML document, ASCII text, with CRLF line terminators
                Category:downloaded
                Size (bytes):534
                Entropy (8bit):4.6940603465853235
                Encrypted:false
                SSDEEP:
                MD5:8D1D051E58C7E7FCB6DA50F32355E121
                SHA1:E84DADFEB1F88DBB5E9856BED73CB7D2DAE68697
                SHA-256:013D6BB198A9ECD19E2B74F7B8994FE802CB49DE27B46F731D827B344D4B9DB9
                SHA-512:7C23E13B1296D001FA13703F3136AA33633E83E45CCDCFAD76098ADA5B4DA2F1FBF6AE93CA69E87F8B8F81D0ED19D75E8A9EA376322BF2CCACF9BF5E947823F9
                Malicious:false
                Reputation:low
                URL:https://open.sleadtrack.com/unsubscribe?messageId=%3Csw-9c7a065c-f20d-484f-83b3-156d8f575c9a@givetothekids.co%3E
                Preview:<html>..<head><title>504 Gateway Time-out</title></head>..<body>..<center><h1>504 Gateway Time-out</h1></center>..</body>..</html>.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->..
                No static file info