Windows
Analysis Report
https://secure.adnxs.com/clktrb?id=704169&redir=http://dyuzpm.724acı/kcilingir.co
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 5516 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// secure.adn xs.com/clk trb?id=704 169&redir= http://dyu zpm.724aci /kcilingir .co MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 5260 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1800 --fi eld-trial- handle=198 8,i,504239 0722574793 339,127111 2108119680 1290,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 11 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 172.217.14.110 | true | false | high | |
accounts.google.com | 142.250.176.13 | true | false | high | |
www.google.com | 142.250.189.4 | true | false | high | |
clients.l.google.com | 142.250.189.14 | true | false | high | |
ib.anycast.adnxs.com | 104.254.151.69 | true | false | high | |
clients1.google.com | unknown | unknown | false | high | |
clients2.google.com | unknown | unknown | false | high | |
dyuzpm.xn--724ac-r4a | unknown | unknown | false | unknown | |
secure.adnxs.com | unknown | unknown | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
8.8.8.8 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.189.4 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.217.131 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.217.142 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.250.176.13 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
104.254.151.69 | ib.anycast.adnxs.com | United States | 29990 | ASN-APPNEXUS | false | |
142.250.68.99 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.189.14 | clients.l.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.5 |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1323603 |
Start date and time: | 2023-10-11 12:17:59 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://secure.adnxs.com/clktrb?id=704169&redir=http://dyuzpm.724acı/kcilingir.co |
Analysis system description: | Windows 10 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@20/6@27/120 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 142.250.217.131, 3 4.104.35.123, 209.197.3.8 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, slscr.update.microsoft.c om, ctldl.windowsupdate.com, c lientservices.googleapis.com, fe3cr.delivery.mp.microsoft.co m - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9704779360458247 |
Encrypted: | false |
SSDEEP: | |
MD5: | 49923A0C795BF700577BDC2B50293F4F |
SHA1: | 4257DBF5BA24BAE7848316A22DDB1CE8E1A0F622 |
SHA-256: | E68C6D9C2E018759F260837646A72AE1584ECE2B830AC64162D106C4207DB865 |
SHA-512: | 07630ABF883C150EC110066FB2FD2DFD39E1A12E8FCC60E29C5C90B3C10D5F4683FD0BEFB9522D0C96DF551FBD73518563F1E1771A3A339FD38520B549AE9D74 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9908278437482427 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2D1ED4BE6468208E66CC1AAA08E004B9 |
SHA1: | B26A1AD8066EBEAAA1F08D382773AD2ED516949A |
SHA-256: | 357796042215E79131E11F51C398FDCCF61AA78AAF3DCB0480DD5426A7B6EA93 |
SHA-512: | E5F680B3A539AC5A67EE54A306E09841D7221F903202CF2F48D702B8D1B34D13F6549F9CAEF8ABE5FA81A46BA9B7DEE49320A0049ADBFBBB74F00689ABEAF030 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.002030137075224 |
Encrypted: | false |
SSDEEP: | |
MD5: | 376097A5C27480DB3F11C28C215C796A |
SHA1: | B45A98AFED2FC2FF6967ED2964CB10659A125185 |
SHA-256: | 95F7041F9C69E23757CA8A714F36A4F8D5C14831E88781878623F0F7DFB4DED7 |
SHA-512: | 271EFE0F9CCC3E36D4F6398B1D2AE9404B052F01A1944201F0ACC86D00B48EEA1B4E88FD5F2BE187F8A1F07B3C7F155394E6B0FB23A34DE4F43EE8632989CF46 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.989217860965607 |
Encrypted: | false |
SSDEEP: | |
MD5: | 50079DAC821E6E8AFC5AD42C54C3AE1F |
SHA1: | 214D9D3FE3FC8B5F940AD8919673E37FFF2481F2 |
SHA-256: | 32EA1F6EC8EF6784A338A087FACDF776241DCD258D2A89EC1414271C65DFBC2C |
SHA-512: | 49EBE1833C8B86C5256A1E2C3F57ED89EC6E989494DC336AC406F0ADFFE506E39276EE8DE0151456424698693619078895C00F569C80D11F9294AD5908AE28B7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9783380610675843 |
Encrypted: | false |
SSDEEP: | |
MD5: | 05D456481F2F922525BF482D6FC44317 |
SHA1: | D9102F1285B80AD0FBE3054FADE59BA3BB648711 |
SHA-256: | DBA0DAE3C47BE4EA9B619502DBFFFF0A7B4B4B12583101185053E40D234473C3 |
SHA-512: | 4937D681404D24C1C6CFA26A4B06ECCEFE362037D92704DEAC3801B5B96818D1506C31077DD9C29C8335045BD8D8647AA10CA57EFD89CED1D72BDD28746596DC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9884958476469934 |
Encrypted: | false |
SSDEEP: | |
MD5: | E193880172C620D7E422981701F850CE |
SHA1: | F061A58680331E15DE556F0C2FDD079B7D1A3AAA |
SHA-256: | FC11B594921030C43550BFA9AD470E9886237B7371F9C9867BB2E5EF63FB1ED0 |
SHA-512: | C0B9A2A062A41B0E3D1DEC80F88DDE41260F55DB6AC795679D366887285E187AC15D08B1D45F8C4BDB50AFBA8BC811284B60689D6093060DA4F386AE2D6F7207 |
Malicious: | false |
Reputation: | low |
Preview: |