Windows
Analysis Report
https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx?Menu=3&ResetUID=1.2.124.113540.1.4.419428346.22460.1699024691.366
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 2596 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// trinitycen termri.ram softpacs.c om/powerre ader/Login .aspx?Menu =3&ResetUI D=1.2.124. 113540.1.4 .419428346 .22460.169 9024691.36 6 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6640 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2212 --fi eld-trial- handle=182 8,i,405271 4605704241 835,708627 4154750273 52,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction /pre fetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 11 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 172.253.115.84 | true | false | high | |
www.google.com | 172.253.122.105 | true | false | high | |
clients.l.google.com | 172.253.115.139 | true | false | high | |
clients1.google.com | unknown | unknown | false | high | |
clients2.google.com | unknown | unknown | false | high | |
trinitycentermri.ramsoftpacs.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.167.94 | unknown | United States | 15169 | GOOGLEUS | false | |
172.253.115.139 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
52.247.199.7 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
172.253.122.105 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.253.63.95 | unknown | United States | 15169 | GOOGLEUS | false | |
172.253.63.138 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.163.94 | unknown | United States | 15169 | GOOGLEUS | false | |
172.253.115.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1336783 |
Start date and time: | 2023-11-03 16:32:39 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://trinitycentermri.ramsoftpacs.com/powerreader/Login.aspx?Menu=3&ResetUID=1.2.124.113540.1.4.419428346.22460.1699024691.366 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@14/19@12/114 |
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, c onhost.exe - Excluded IPs from analysis (wh
itelisted): 142.251.163.94, 52 .247.199.7, 34.104.35.123, 172 .253.63.95, 142.251.167.95, 17 2.253.115.95, 142.251.111.95, 142.251.16.95, 172.253.122.95, 142.251.163.95, 172.253.62.95 - Excluded domains from analysis
(whitelisted): clientservices .googleapis.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//trinitycentermri.ramsoftpacs .com/powerreader/Login.aspx?Me nu=3&ResetUID=1.2.124.1135 40.1.4.419428346.22460.1699024 691.366
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.982872004976501 |
Encrypted: | false |
SSDEEP: | |
MD5: | 755366DD4CE70D278C83F4339598A359 |
SHA1: | 91D9690BB73C155F9B53A36BCA1C1146C3A4D973 |
SHA-256: | 8D5ED927AAA65372FD8FEB21447FC501F47F2307B1795E74C60CE7BD90FC3669 |
SHA-512: | 1423053259B009A8A3099EFFB42104B0C1F9573D42350BF21C257A9FBD1DFF6FE799DB960BF7A0BDB8842597A03E40EA7E8D26F71DA5B95A1F492F91913D0D56 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.995070895528522 |
Encrypted: | false |
SSDEEP: | |
MD5: | C686E7624DA7B505492520F8F1171625 |
SHA1: | BBD92656ED81252944BB727F6F2A3FAF8ED13490 |
SHA-256: | 27845BBCF0656F6A3EB683C377D743E04D891018C3C6382D76161D19C7F53069 |
SHA-512: | 39B0D555BF8DDF56A97B6EFC17BE5190A036AFC7C907556C4C1F40F848CEE4AF873FF499A969242672EE45E604173DFC850E82319D9C5FDE4EC035D28471B850 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.006062483914743 |
Encrypted: | false |
SSDEEP: | |
MD5: | CF44731415F28E45B20D81894405A0F2 |
SHA1: | 68FC7DAA98D6A2051EE1B76FA3C5802ADC1805F5 |
SHA-256: | 2BD624CC036C5676FD002E1F4D0F760A195B8C0954D26F3C3EE946D16711A00A |
SHA-512: | 73DC6178E8761A60F32CCD90A15DAEA4AC852AF9254C2264B0F5AA856E66658DB7BF7890F4856B2E6E179F2C7F350471611B16DB7F7C7B33716E4376C92C00F3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.99896107071237 |
Encrypted: | false |
SSDEEP: | |
MD5: | 78C63FED1E79CBB2875E81C5B1B486A9 |
SHA1: | DFEE48E8C5400DA5C24779647D322047EF2838A5 |
SHA-256: | E72BB7FF5F20221B69D3F4F62B6EAF6993B8BDF017E11386C8E456E00CE5F485 |
SHA-512: | 3B37983D5CE5BCBF6AA42080BD08BF59A6F0B1CD73B0134DA1852FCF628AD89A4C573F4724D73662AE4656D28C55EB4794D0A67FB5105209EF6BB8AF0B65E5F1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9849732104745406 |
Encrypted: | false |
SSDEEP: | |
MD5: | 32F74C7FBFD425B9FD17C7A12626BF6E |
SHA1: | A94AF2227D9AE07D9546DF1575080B99EBE87564 |
SHA-256: | 4434657A5A555DE5F382DC689CE72B84165E8E805B31EB824EC330AC70773D88 |
SHA-512: | 962D1D9149E229B968DDBF60661FC560F32CA49CCFD408E1A033B203950513B2B4528550F75D90B6CA538DD9333E7226EFB894B8B129A337F6F5CDF7542209EF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.994295375126319 |
Encrypted: | false |
SSDEEP: | |
MD5: | A171B1CD0CC695F5681E010ECEB186D9 |
SHA1: | 8935E42217BD2DC94CF13E30D52599FD99A7C3BB |
SHA-256: | A8D45A01680EF8DB47521523FCFAACFC1FBCA8E24CACDB860045FAA44E9F3257 |
SHA-512: | C277054B2DC0D3F27BEB3250F93E39D530DD3FCB54ED53E20BB118B40355B8FA43721E4FD3632BA0D1F87E5F8D29002F797BDEDA62E4F8A7EADD94B7555D8A00 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 12204 |
Entropy (8bit): | 5.292285061183377 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4DA9A35F1D4AAAA06127140E05E2C393 |
SHA1: | A52C4A6D40A297D85EF842DA601345FA5C40EBDE |
SHA-256: | AF60BD3A5540BB84FC4027E67DB11F149E4849066700C7F1652B8722439B9103 |
SHA-512: | F69029F867C283217FB25C8AC6DE6F8B7C670C6D0AD0ACF8F1C1CB30F857D01A72A2B65AEA2A3AF7ED5E38A5534A442910C944FA134EF806BFC78925DA898E55 |
Malicious: | false |
Reputation: | low |
URL: | https://trinitycentermri.ramsoftpacs.com/powerreader/ChangePassword.aspx |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23063 |
Entropy (8bit): | 4.7535440881548165 |
Encrypted: | false |
SSDEEP: | |
MD5: | 90EA7274F19755002360945D54C2A0D7 |
SHA1: | 647B5D8BF7D119A2C97895363A07A0C6EB8CD284 |
SHA-256: | 40732E9DCFA704CF615E4691BB07AECFD1CC5E063220A46E4A7FF6560C77F5DB |
SHA-512: | 7474667800FF52A0031029CC338F81E1586F237EB07A49183008C8EC44A8F67B37E5E896573F089A50283DF96A1C8F185E53D667741331B647894532669E2C07 |
Malicious: | false |
Reputation: | low |
URL: | https://trinitycentermri.ramsoftpacs.com/PowerReader/WebResource.axd?d=pynGkmcFUV13He1Qd6_TZHj3NZV-bv_bDvR6mu1kLsz94nB5M7NDha7x5y49O9CGZpXoAm2ZJdhMFkTUTzPsPA2&t=638285885964787378 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2238 |
Entropy (8bit): | 5.205305174949124 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5172D95FBC3B777E57BABE3C8220DA6E |
SHA1: | 7BDF6AE418915187BCF3AEF05C5560038CA56A84 |
SHA-256: | CFE6124C7586081E88DA8DDBF24852B44105ECE8BD358FFFDCA0EDDA64FAECBF |
SHA-512: | 2597B4EB5EE3098071C3D1851647B017B04B99F9DA49D9B168DC341C2A805540F2C060D57B0D75DC221AE5A68CD8758F0328982020F450387E3001C55138EEF0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 45184 |
Entropy (8bit): | 6.702692811783243 |
Encrypted: | false |
SSDEEP: | |
MD5: | 60FB6FD17AEDB1CE90156C2F714851C3 |
SHA1: | 71DA04DA7634CD0DA2700A6B24F2ECF8A2A7DE81 |
SHA-256: | D60ADAC573EB17F8D766FA704BCBAA91270144375B685109576CD0B1908F7A95 |
SHA-512: | E3282C991A523E0050D375F3D3E679DE37DA54BC47B9C215BF481922023548B1CABCE8A536C3266ACFA95F790334C41C41D9429C678C204CD4917DF8B7AC504C |
Malicious: | false |
Reputation: | low |
URL: | https://trinitycentermri.ramsoftpacs.com/powerreader/fonts/lato/Lato-Reg-webfont.ttf |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 40 |
Entropy (8bit): | 4.462814895472355 |
Encrypted: | false |
SSDEEP: | |
MD5: | 02A9906D09AEAD4CB563F56BAE348C83 |
SHA1: | 3F2CC231564AF61ABCE54F8B889349C5B5067426 |
SHA-256: | DF04D4E4CEFD8EFBC2D9A4892DE34203F46D9227A95B9E2857A49199DA3B8617 |
SHA-512: | 1BBAC4C0AF1283A0B86C327166EC872147DAA431C24C0C78677C94E09223427A2600B21835F66AFE926CE78DD13B1A4AD90203F164E810B81CB46AA65CE88DBF |
Malicious: | false |
Reputation: | low |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwmwFiVwJ-s87RIFDR2F-h4SBQ1RhI1D?alt=proto |
Preview: |