Windows
Analysis Report
https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 5532 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// fleek.ipfs .io/ipfs/b afybeico4d eolizdi7yl u3rvt4xjjw 464fjmbivl m5ohmu66wd pgt7mbme/? _x_tr_sl=a uto&_x_tr_ tl=en&_x_t r_hl=en-US &_x_tr_pto =wapp/#lte st@test.co m MD5: 7BC7B4AEDC055BB02BCB52710132E9E1) chrome.exe (PID: 5368 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2044 --fi eld-trial- handle=179 6,i,174417 1006262594 6195,73686 9192058617 4420,13107 2 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationTarge tPredictio n /prefetc h:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
- cleanup
- • AV Detection
- • Phishing
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | HTTP Parser: |
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: | ||
Source: | Sample URL: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Directory created: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: |
Source: | Window detected: |
Source: | Directory created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 2 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing | ||
13% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
jsdelivr.map.fastly.net | 151.101.65.229 | true | false | unknown | |
stackpath.bootstrapcdn.com | 104.18.11.207 | true | false | high | |
formsubmit.co | 104.21.1.51 | true | false | unknown | |
a.nel.cloudflare.com | 35.190.80.1 | true | false | high | |
accounts.google.com | 142.250.80.109 | true | false | high | |
code.jquery.com | 151.101.130.137 | true | false | high | |
cdnjs.cloudflare.com | 104.17.25.14 | true | false | high | |
ipinfo.io | 34.117.59.81 | true | false | high | |
maxcdn.bootstrapcdn.com | 104.18.10.207 | true | false | high | |
www.google.com | 142.251.41.4 | true | false | high | |
clients.l.google.com | 142.251.40.238 | true | false | high | |
fleek.ipfs.io | 209.94.90.1 | true | false | high | |
clients2.google.com | unknown | unknown | false | high | |
cdn.jsdelivr.net | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
9.9.9.9 | unknown | United States | 19281 | QUAD9-AS-1US | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
104.18.10.207 | maxcdn.bootstrapcdn.com | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.65.195 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.176.202 | unknown | United States | 15169 | GOOGLEUS | false | |
34.117.59.81 | ipinfo.io | United States | 139070 | GOOGLE-AS-APGoogleAsiaPacificPteLtdSG | false | |
142.251.40.238 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
151.101.65.229 | jsdelivr.map.fastly.net | United States | 54113 | FASTLYUS | false | |
142.251.40.234 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.130.137 | code.jquery.com | United States | 54113 | FASTLYUS | false | |
142.250.81.227 | unknown | United States | 15169 | GOOGLEUS | false | |
104.18.11.207 | stackpath.bootstrapcdn.com | United States | 13335 | CLOUDFLARENETUS | false | |
104.21.1.51 | formsubmit.co | United States | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.72.100 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.109 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false | |
209.94.90.1 | fleek.ipfs.io | United States | 40680 | PROTOCOLUS | false | |
104.17.25.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.1 |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1312086 |
Start date and time: | 2023-09-21 09:33:06 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com |
Analysis system description: | Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip) |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@21/29@14/198 |
- Exclude process from analysis
(whitelisted): WMIADAP.exe, SI HClient.exe - Excluded IPs from analysis (wh
itelisted): 142.250.65.195, 34 .104.35.123, 142.250.176.202, 142.251.40.234, 142.251.35.170 , 142.251.40.138, 142.251.40.1 06, 142.250.65.234, 142.250.65 .170, 142.251.40.170, 142.250. 80.74, 142.251.41.10, 142.251. 32.106, 142.250.80.106, 142.25 0.65.202, 142.251.40.202, 142. 250.80.42, 142.250.81.234 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, content-autofill.googlea pis.com, slscr.update.microsof t.com, ajax.googleapis.com, ct ldl.windowsupdate.com, clients ervices.googleapis.com - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 69597 |
Entropy (8bit): | 5.369216080582935 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5F48FC77CAC90C4778FA24EC9C57F37D |
SHA1: | 9E89D1515BC4C371B86F4CB1002FD8E377C1829F |
SHA-256: | 9365920887B11B33A3DC4BA28A0F93951F200341263E3B9CEFD384798E4BE398 |
SHA-512: | CAB8C4AFA1D8E3A8B7856EE29AE92566D44CEEAD70C8D533F2C98A976D77D0E1D314719B5C6A473789D8C6B21EBB4B89A6B0EC2E1C9C618FB1437EBC77D3A269 |
Malicious: | false |
Reputation: | low |
URL: | https://code.jquery.com/jquery-3.2.1.slim.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 51039 |
Entropy (8bit): | 5.247253437401007 |
Encrypted: | false |
SSDEEP: | |
MD5: | 67176C242E1BDC20603C878DEE836DF3 |
SHA1: | 27A71B00383D61EF3C489326B3564D698FC1227C |
SHA-256: | 56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4 |
SHA-512: | 9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A |
Malicious: | false |
Reputation: | low |
URL: | https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 163873 |
Entropy (8bit): | 5.058104233525069 |
Encrypted: | false |
SSDEEP: | |
MD5: | 94994C66FEC8C3468B269DC0CC242151 |
SHA1: | EC16BD19BF4AE9BC2E2336AC409A503BBBDAACAD |
SHA-256: | 62F74B1CF824A89F03554C638E719594C309B4D8A627A758928C0516FA7890AB |
SHA-512: | 190194D1F30C8B6DFCB80F9AFDB75625FA5418A52405D81F15D8019BBD92510E817B25A3A18FEDA27D2D1231FE3921FD88FE037E1FBB1CCD08F5FE5E4742FFE3 |
Malicious: | false |
Reputation: | low |
URL: | https://cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/bootstrap.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 19188 |
Entropy (8bit): | 5.212814407014048 |
Encrypted: | false |
SSDEEP: | |
MD5: | 70D3FDA195602FE8B75E0097EED74DDE |
SHA1: | C3B977AA4B8DFB69D651E07015031D385DED964B |
SHA-256: | A52F7AA54D7BCAAFA056EE0A050262DFC5694AE28DEE8B4CAC3429AF37FF0D66 |
SHA-512: | 51AFFB5A8CFD2F93B473007F6987B19A0A1A0FB970DDD59EF45BD77A355D82ABBBD60468837A09823496411E797F05B1F962AE93C725ED4C00D514BA40269D14 |
Malicious: | false |
Reputation: | low |
URL: | https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 630 |
Entropy (8bit): | 4.627016413245974 |
Encrypted: | false |
SSDEEP: | |
MD5: | 478D0A8868FD5CEC3C781F788E9A3353 |
SHA1: | D1FA9CBBE30C23D416C46A0566F963CA29704036 |
SHA-256: | 1ACE16EC43923C0D93BBF2802C56E49C4E2EDAFCE856E5617A6200C1F261A8AF |
SHA-512: | 25D2B0F7418C970E0A347C2A40A8CBE9D0E6E40467BA249DF1DF9FB8BA5A0E46B2F6CC22F68E748C4F0B0D04BF5014D9A7CF2DE228997A6522DB1DDA36283673 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 48944 |
Entropy (8bit): | 5.272507874206726 |
Encrypted: | false |
SSDEEP: | |
MD5: | 14D449EB8876FA55E1EF3C2CC52B0C17 |
SHA1: | A9545831803B1359CFEED47E3B4D6BAE68E40E99 |
SHA-256: | E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B |
SHA-512: | 00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22 |
Malicious: | false |
Reputation: | low |
URL: | https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 82748 |
Entropy (8bit): | 5.218878950957974 |
Encrypted: | false |
SSDEEP: | |
MD5: | 25487FA06214D8FEDD7E23AD4078A7EA |
SHA1: | 40CBE3EFFC7BB48235FD71A51186941ACFCAA900 |
SHA-256: | 21663D285B27123FABF0F96FD82548D62016A342B1349D5457DDFBDAB4D78DB7 |
SHA-512: | 013733A2C176F46FE76E845EF243690D45FE323E705DCCB914C3CA7018D56949F6F4B7B47F8FD1AB3E155D2F74D9D1BC06D9BA33D05655F5732795236C741030 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 258469 |
Entropy (8bit): | 5.927548604465963 |
Encrypted: | false |
SSDEEP: | |
MD5: | 53CFAA40910AD20CA7E33428BAF97E7B |
SHA1: | 246CC3B6F09AFD071DA66B87A465C5E8C1BE206B |
SHA-256: | 2616C1A901E748EF116BEE1C45E5F5828211B7A9777875BF63A04FEF9B63DB13 |
SHA-512: | E582CDA4C4E85FA4B4FE823686E736766D36CF2D7150A09EC282C805F38185699F800ACF770D96A3D731043AAE41F345CD48F072E4C5EFE5BA7FB5260DCF7DA2 |
Malicious: | false |
Reputation: | low |
URL: | https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 267 |
Entropy (8bit): | 4.839331819067872 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6C27E057C77C10B0E53557F407849895 |
SHA1: | 344D826B5061C9C634BC412C93E2EE16469C29BD |
SHA-256: | AB333797BD266123FCF7A572EDEA2E747660134B577001424DE7696DAA089C26 |
SHA-512: | 0F48F7E0E11BD1AE2A0CCA6C8F2F51949B4AA5DBD666307DA612A9240062D8F12AC3EFFB03C293F44FA6C106BF01773FE7C458D5B87D2039F2F583B07073E260 |
Malicious: | false |
Reputation: | low |
URL: | https://ipinfo.io/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 85578 |
Entropy (8bit): | 5.366055229017455 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2F6B11A7E914718E0290410E85366FE9 |
SHA1: | 69BB69E25CA7D5EF0935317584E6153F3FD9A88C |
SHA-256: | 05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E |
SHA-512: | 0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB |
Malicious: | false |
Reputation: | low |
URL: | https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 28 |
Entropy (8bit): | 4.378783493486175 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4C42AB4890733A2B01B1B3269C4855E7 |
SHA1: | 5B68BFE664DCBC629042EA45C23954EEF1A9F698 |
SHA-256: | F69E8FC1414A82F108CFA0725E5211AF1865A9CEA342A5F01E6B2B5ABE47E010 |
SHA-512: | 0631C6EFD555699CB2273107FE5AF565FEC2234344E2D412C23E4EE43C6D721CB2B058764622E44FD544D840FF64D7C866565E280127C701CAAB0A48C35D4F5C |
Malicious: | false |
Reputation: | low |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA0LjAuNTExMi4xMDISFwm5_dfrX1BiFhIFDYOoWz0SBQ3OQUx6?alt=proto |
Preview: |