Windows
Analysis Report
https://go.microsoft.com/fwlink/?linkid=2101353
Overview
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 7044 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?linki d=2101353 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 4204 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2228 --fi eld-trial- handle=208 0,i,111970 9709112478 3396,13453 1892083571 36148,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | HTTPS traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
part-0013.t-0009.t-msedge.net | 13.107.213.41 | true | false |
| unknown |
accounts.google.com | 142.251.16.84 | true | false | high | |
sni1gl.wpc.alphacdn.net | 152.195.19.97 | true | false |
| unknown |
cs1227.wpc.alphacdn.net | 192.229.211.199 | true | false |
| unknown |
www.google.com | 142.251.167.147 | true | false | high | |
part-0012.t-0009.t-msedge.net | 13.107.246.40 | true | false |
| unknown |
clients.l.google.com | 172.253.115.113 | true | false | high | |
clients2.google.com | unknown | unknown | false | high | |
www.microsoft365.com | unknown | unknown | false | high | |
logincdn.msftauth.net | unknown | unknown | false |
| unknown |
login.microsoftonline.com | unknown | unknown | false | high | |
acctcdn.msftauth.net | unknown | unknown | false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
13.107.6.156 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
13.107.246.40 | part-0012.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.251.167.147 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.253.63.95 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.111.94 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.253.115.113 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
13.107.213.41 | part-0013.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
13.107.213.40 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.251.16.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
23.199.50.77 | unknown | United States | 20940 | AKAMAI-ASN1EU | false | |
20.190.151.132 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
20.190.190.196 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1335358 |
Start date and time: | 2023-11-01 09:53:47 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://go.microsoft.com/fwlink/?linkid=2101353 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@14/6@14/45 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 23.199.50.77, 142. 251.111.94, 13.107.6.156, 34.1 04.35.123, 20.190.151.132, 20. 190.151.7, 20.190.151.68, 20.1 90.151.6, 20.190.151.133, 20.1 90.151.67, 20.190.151.70, 20.1 90.151.134, 20.190.190.196, 20 .190.190.132, 40.126.62.130, 2 0.190.190.195, 20.190.190.193, 20.190.190.194, 40.126.62.131 , 40.126.62.132, 172.253.63.95 , 172.253.62.95, 172.253.115.9 5, 142.251.111.95, 142.251.167 .95, 172.253.122.95, 142.251.1 63.95, 142.251.16.95, 192.229. 211.108, 209.197.3.8 - Excluded domains from analysis
(whitelisted): logincdn.msaut h.net, lgincdnmsftuswe2.azuree dge.net, slscr.update.microsof t.com, clientservices.googleap is.com, home-office365-com.b-0 004.b-msedge.net, ak.privateli nk.msidentity.com, acctcdn.msa uth.net, acctcdn.trafficmanage r.net, e11290.dspg.akamaiedge. net, go.microsoft.com, ocsp.di gicert.com, login.live.com, lo gin.mso.msidentity.com, acctcd nvzeuno.azureedge.net, acctcdn vzeuno.ec.azureedge.net, www.t m.ak.prd.aadg.trafficmanager.n et, prdv4a.aadg.msidentity.com , acctcdnmsftuswe2.azureedge.n et, content-autofill.googleapi s.com, acctcdnmsftuswe2.afd.az ureedge.net, b-0004.b-msedge.n et, www.tm.v4.a.prd.aadg.traff icmanager.net, lgincdnvzeuno.e c.azureedge.net, ctldl.windows update.com, login.msa.msidenti ty.com, firstparty-azurefd-pro d.trafficmanager.net, fe3cr.de livery.mp.microsoft.com, lginc dnvzeuno.azureedge.net, ipv6.l ogin.live.com, edgedl.me.gvt1. com, lgincdn.trafficmanager.ne t, go.microsoft.com.edgekey.ne t, lgincdnmsftuswe2.afd.azuree dge.net, www.tm.lg.prod.aadmsa .tra - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.977703304352819 |
Encrypted: | false |
SSDEEP: | |
MD5: | 30CE2DE63D5D9708D3653F9240783BA0 |
SHA1: | 9DAE9F42E6B528AC353F8610B5E63157E34780EB |
SHA-256: | 8FA6040558AD8603BF362E2DF636CC8C7E58A908578593196AD70F20AD2FDFF8 |
SHA-512: | 039512A5E746EE51FB01ED48925B3F38282F1368D11A03803E205B6CA0D7CCC47726476C0ADC641FD3B31733999387AEEF48FD606A7AE152B43D00828DACB35C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9940615730556197 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6B6671E35FF989C060666937B32EDD22 |
SHA1: | FE64A86FAEA4346AABDC9A092CFA78DCE02FA975 |
SHA-256: | 1E341C18C2100BD226637F94A9CD7C854F79093041AAE85378BBD9964E429FA4 |
SHA-512: | B42BE5FE9BEC91DC029E4CFC10C5F0098E0798EE27F3C1833875DE5331B7ABCFE0F575463B693A5BD8BF6242B936E5CDEB68E35B34E91726FF38FDEA0A243672 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.002949222149294 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2B53A54CA4DBB09A7E4E9C22E95F73FF |
SHA1: | 98C32711F6D56674DCF9A99242D8B72F04ED97A6 |
SHA-256: | 3C9F5B769D874D67009E4B248E70CB7C18E4A7D7369200C65CB54B2211363B2B |
SHA-512: | 991BC04C0D56F34FA6762F9BB465BFFEDB6846C6D71B1B0E4869D566CBD63E433375CCA61519E800D367E911135864315879C077F84C4EE5D8EF929E6B67E2D4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9931861164161195 |
Encrypted: | false |
SSDEEP: | |
MD5: | 36F184C445F79120C99F5C501533A006 |
SHA1: | EE51EC1D00854B831256465CE90FCBB789C04C66 |
SHA-256: | 70C70DCC9C694F478EF52188C9E428901403F67AEB0A2578B49C946439FFB2D4 |
SHA-512: | BE2DAF465960956F1E5B9E8B8C7DFAB3623845C547D54383C290E70AB61A43533D0492780737BD0BE324BFB18BDD6DEEF07AD5CF435FB0AEB69466CD02CDC78C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.981082018647801 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF12D27F33B521A221059B8C816BA036 |
SHA1: | BD9EBCA79D6AE9C798D6CB4EEDAF5BC71B6FB2B8 |
SHA-256: | ED5A1D0494A013B333968B4A866FAB0BC1ABC109667C0C8700CC7DF3B1B3006A |
SHA-512: | B1B5592E26724AF16A8A7A149BE2FC9F6320B2EADD53E1880CF021EECC0854F33BE479528BA2FC027C567483C1A6BCCF3806D26373D601FB053C4CD1C5489DB4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9868179624866285 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9F1B0287B65D1D17408BB46EBA53606C |
SHA1: | EE7951E601E48B66666D88F397AC884A2F7F78A8 |
SHA-256: | E3D15E32FC3CE0D511A14587FA22BD1852B8D2661CC618DF5A44C0EAD1D44FF0 |
SHA-512: | 20C7C1B21C9F5C5A5F494B8CC5384068DF9EE245CC67BFC59DC2F86C43A765E8E8C758D3B6EC983CBFB0218076EC439D7795CD43B54969E9E24DC560A873824E |
Malicious: | false |
Reputation: | low |
Preview: |