Windows
Analysis Report
https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx
Overview
General Information
Detection
Score: | 2 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 4960 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// trinitycen termri.ram softpacs.c om/powerre ader/Login .aspx MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) chrome.exe (PID: 6404 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2232 --fi eld-trial- handle=200 8,i,107587 0573560942 8747,53836 1179374135 8857,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: |
Source: | File created: |
Source: | Window detected: |
Source: | Directory created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 13 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.251.16.84 | true | false | high | |
www.google.com | 142.251.167.106 | true | false | high | |
clients.l.google.com | 142.251.163.113 | true | false | high | |
clients1.google.com | unknown | unknown | false | high | |
clients2.google.com | unknown | unknown | false | high | |
trinitycentermri.ramsoftpacs.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.167.94 | unknown | United States | 15169 | GOOGLEUS | false | |
52.247.199.7 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.111.95 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.16.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.111.94 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.163.113 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.167.106 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.253.63.113 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.4 |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1336780 |
Start date and time: | 2023-11-03 16:28:48 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean2.win@14/13@12/117 |
- Exclude process from analysis
(whitelisted): dllhost.exe, SI HClient.exe - Excluded IPs from analysis (wh
itelisted): 142.251.111.94, 52 .247.199.7, 34.104.35.123, 142 .251.111.95, 142.251.163.95, 1 42.250.31.95, 172.253.62.95, 1 72.253.63.95, 172.253.115.95, 142.251.167.95, 142.251.16.95, 172.253.122.95 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, content-autofill.googlea pis.com, clientservices.google apis.com, vm-wus2-tc.westus2.c loudapp.azure.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//trinitycentermri.ramsoftpacs .com/powerreader/Login.aspx
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.987793416899419 |
Encrypted: | false |
SSDEEP: | |
MD5: | F9E72DBCE364E43AB87934A6996271E6 |
SHA1: | F35409F403D9FD32B2E130D4A90720EA8067281D |
SHA-256: | 1514F25E7DD776C0D42B886E817362BE1AD9AB73F70B5F7D551FBF550E602F9F |
SHA-512: | 4191B8FF9095E909DA0E8F7B140F23FD09FA1EB29A7404DA125BD7699E6C6003479192C6972BD592F65AFE32F4C0D7A8F2DC5F47B598E792D3AFB0375E6FADB8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.00234472181907 |
Encrypted: | false |
SSDEEP: | |
MD5: | 578D8DD0B9A65DE800AF5A5D5ECCC3C9 |
SHA1: | ECB9A5995BCA3646D91560840A55AC88FC907C44 |
SHA-256: | D6551CD77CBBDAD83242663B5F1FA01CB52056DDDDF4970B8F98D60A1DFECEC8 |
SHA-512: | B5C7F69BAF9C5D7C3AACA9A1B753FCAE56B5B0751B1CFA0F30ADAB77E76896133541972A4204923EE4CCB5CE09B377DA7910CED2F103B274B758F6B166B01ECA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.011477740108181 |
Encrypted: | false |
SSDEEP: | |
MD5: | CA4495255B083E09EE41D478582D0E14 |
SHA1: | 36ADD6C408C5CF703243B9299115CBD12EAD8D93 |
SHA-256: | 4F3DB7584CA02B07E46B6CF114E0F66B5C9D51173E477747C9428471F831972B |
SHA-512: | 471CDAC07D68F6192F9E28B7FF29787A2C78708C0E4C48935E10C2F1574A5499448DB1573E93B571D49B06BF0B9694D2B1E1F5AB38952BD8C35A399B0F90E9CE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.001360555256156 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5925DD114C8A32B5E79307F0059408E3 |
SHA1: | 0E576F1B4EB91F6618768C9CD30669A5DB2E5833 |
SHA-256: | C2CF0D7F8BE5B0D7B99AD3D19420CFD43D2DA754AA1C721CA515021469C574EE |
SHA-512: | A20CAD966C4B31B0EC1D5737632F5C815756CF3E4FAFD7EB9274846E4D142E9152ABECEADD12DDAFDF55BD60658F1F9768CD3430D1FE05D052ED5592D19477CE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.992629912599831 |
Encrypted: | false |
SSDEEP: | |
MD5: | D7B3BD38808C54889A31A982E276FE26 |
SHA1: | D547955C84FA046EC2879CA83012482335075346 |
SHA-256: | 2BFA7ED234D80FBC3CD1520EF12DEA10CA4624DC5F8B96D1AEAD9D71430A1F2E |
SHA-512: | 3F74D87AE6F447E0C312202F28127A89E8D0685704B3D30E18EE72B7BC8FB9392B8974EB2DA9F62D47C237645F6BC86E0E338FBB7BFEB14E0C8EEE942BFC92A0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 4.003510113992286 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4CA72C1F3892E1E2534C3C2244B49E60 |
SHA1: | 64BC4F193CE85F7B3AB3EBF584A6C795BB5CCF29 |
SHA-256: | 3C982692434BBF396880A42E80EFC0BEFCEF0B3E477050FAA0CE0E31C838310D |
SHA-512: | 4731CF4BB2F4B4497F90382A6A4D224700182F7D7061B8552AA958636D5C2B17A90D809C4BF5A6D049B37A6E7AF4CFA62FF98EEC201DE92D2714B41FD000B6A9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 64 |
Entropy (8bit): | 4.958918898701708 |
Encrypted: | false |
SSDEEP: | |
MD5: | F06036CFC59F5EB66A1C99889CCCCEB9 |
SHA1: | 8242C9556D50C44C6E433CEAD259BE0886E9FFDB |
SHA-256: | 33DF26F9146A66B0B7140905EBAE008D052302EC2BFC7E163D69912AD7821104 |
SHA-512: | A521FFFC5304D90B63F0C009328FF71683B0AA3C45616131D255F35A7D47260B8DBFE195EA95E0CB1E3E35B3C9668030442D9D6D9CBD3D708D3DB51604048A63 |
Malicious: | false |
Reputation: | low |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSJQnnjHGag4N18xIFDT_LuO8SBQ2RYZVOEgUNOpa9ShIFDXQHbuk=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2238 |
Entropy (8bit): | 5.205305174949124 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5172D95FBC3B777E57BABE3C8220DA6E |
SHA1: | 7BDF6AE418915187BCF3AEF05C5560038CA56A84 |
SHA-256: | CFE6124C7586081E88DA8DDBF24852B44105ECE8BD358FFFDCA0EDDA64FAECBF |
SHA-512: | 2597B4EB5EE3098071C3D1851647B017B04B99F9DA49D9B168DC341C2A805540F2C060D57B0D75DC221AE5A68CD8758F0328982020F450387E3001C55138EEF0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 45184 |
Entropy (8bit): | 6.702692811783243 |
Encrypted: | false |
SSDEEP: | |
MD5: | 60FB6FD17AEDB1CE90156C2F714851C3 |
SHA1: | 71DA04DA7634CD0DA2700A6B24F2ECF8A2A7DE81 |
SHA-256: | D60ADAC573EB17F8D766FA704BCBAA91270144375B685109576CD0B1908F7A95 |
SHA-512: | E3282C991A523E0050D375F3D3E679DE37DA54BC47B9C215BF481922023548B1CABCE8A536C3266ACFA95F790334C41C41D9429C678C204CD4917DF8B7AC504C |
Malicious: | false |
Reputation: | low |
URL: | https://trinitycentermri.ramsoftpacs.com/powerreader/fonts/lato/Lato-Reg-webfont.ttf |
Preview: |