Windows
Analysis Report
http://midgard.antifa.se
Overview
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6084 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://m idgard.ant ifa.se/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 5552 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2080 --fi eld-trial- handle=199 6,i,311929 4269847868 779,622163 2383226048 611,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 11 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 2 Non-Application Layer Protocol | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 3 Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 1 Ingress Tool Transfer | Data Destruction | Virtual Private Server | Employee Names |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 172.217.2.205 | true | false | high | |
www.google.com | 172.217.2.196 | true | false | high | |
antifa.se | 135.181.131.152 | true | false |
| unknown |
clients.l.google.com | 192.178.50.46 | true | false | high | |
clients1.google.com | unknown | unknown | false | high | |
midgard.antifa.se | unknown | unknown | false |
| unknown |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
135.181.131.152 | antifa.se | Germany | 24940 | HETZNER-ASDE | false | |
142.250.64.131 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.64.142 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
192.178.50.46 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
192.178.50.35 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.2.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.217.2.205 | accounts.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.16 |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1356061 |
Start date and time: | 2023-12-08 10:02:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://midgard.antifa.se |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@15/27@12/110 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 142.250.64.131, 34 .104.35.123, 192.229.211.108 - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, edgedl.me.gvt1.com, slscr .update.microsoft.com, clients ervices.googleapis.com, fe3cr. delivery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.984518153978166 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5DC4224D84273FC02EB38852882B1CC2 |
SHA1: | 7F04367B9589C61A9A5C34D5E5EA9E0F1F022CF8 |
SHA-256: | C6879DA1B9BAA6D4F57909526760F7249FBFE8D628F1A1E1AE49B342183C8264 |
SHA-512: | 175119690BFEA47DEEF493A33B4015FF2DF468A081D347E05C221FAD7DF5EE9B4D68C3B7AD5B5770047CEDD297A3CDE6A25836F2FE98566DEB638C930C3F498A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.999489208725035 |
Encrypted: | false |
SSDEEP: | |
MD5: | 52EC32870884703EFC364CE19A398C52 |
SHA1: | D37ED727F1FC358008EE5E8B1291E34E4D09B443 |
SHA-256: | C1B23ABAC014760F30F18C0010334C155DCDF057EEE02479CA707BDD75CE5C99 |
SHA-512: | 776DE6FF7034C9E7A47610285FED14237559B898574956FC2A1AD19A9BE738FC1594220CBA4FD66E20BC433A20A62DDFAA97D078B866E2133C76CEE5423E528D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.006364491717296 |
Encrypted: | false |
SSDEEP: | |
MD5: | 47EF71BC1921FFA87EE29A7098383325 |
SHA1: | 51D19049E58EFD025FE38130E38257843053F72E |
SHA-256: | EE7FFC50BA5984DDD96D332AE599B95F3E09A4F3258D92C7F556EC8FE32B33AD |
SHA-512: | 437813CA7F5C059F8D213A171329134EF2E33F550C3B8E8E6AC408531D922BD6C09EF9F7AFD5D3817C789E2D2AC4AA78B75ED2278AF81BB70B2C02CF4DE36518 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9971071255552624 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1CF608FDC494CDD3CA030F03C279528B |
SHA1: | E55CB5343C57C0A1BEA88B3DB2FDF5D41533FB6A |
SHA-256: | 2528A0A92B451144A7835B59B4E2404661797A01C9F04ECD1098CD57E9AC7ABC |
SHA-512: | 2CB2588383C2E6030DF17AD21DB2B3CA80D76500C86A44DF4F478BDD53323FE85FD7C645C2E444BE3824F4ECFFBDC46CD23EB7143B870FF166C1C1FEF72B8F06 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9877036573999125 |
Encrypted: | false |
SSDEEP: | |
MD5: | A586963F3B55BCC9BAAC5E596C50F915 |
SHA1: | F05FE664A367468732A7D91CCE96FFB763A8BB8E |
SHA-256: | B3AB62E5D14A2966EFFBFD1A495D986A5A06F26F938C5857CE767ABF32EF004E |
SHA-512: | 18E306442F386CF9F3B58FDD320F23A23BD4CD7E0CE81702747505E487EE2E6788AEBC346921DD718A9E7C403A8018D380B6DCA1697267E47942E0A9324428ED |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9966734924762375 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6BF4B6BB2716E862CD235C9D025BA5F2 |
SHA1: | B2C63682A5B1F9AC87148EF6F9C1DE6DBF879A5F |
SHA-256: | A24072BE238D0F874CD33806B69676A3EF60DC94F4354461EA5E297A7C172C97 |
SHA-512: | 1076677D740D1E435A5FD5A39602BFFF44A552F85AD1F59F0DAEED79021CC74C46ADD1E4822304FEDACE03DE2CCB21B3165582B7CAE09CE0A9920FED935166D9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 146060 |
Entropy (8bit): | 7.9980589482070545 |
Encrypted: | true |
SSDEEP: | |
MD5: | B782B01AFC9646C7259701B07E2A71D0 |
SHA1: | B86A6F0BF3FB4777160165DFE37CA4E99B90216E |
SHA-256: | AA8042A77500CFE4A4893E2B7EDBD54DDED92768E40418FA0665BEC8AAE9AE18 |
SHA-512: | 5F727D90952C324DFB9447C4EF702166844E456C614934BC266BE072ED8CA681F8246CBC98B653FA45C6579BDAD24DFAAD04EBE8300F34774ED137254D208FE3 |
Malicious: | false |
Reputation: | low |
URL: | https://midgard.antifa.se/wp-content/themes/twentytwentyfour/assets/fonts/cardo/cardo_normal_400.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 50401 |
Entropy (8bit): | 5.194359797884941 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2444A3A8622C15D1CE36A62EBCD0798F |
SHA1: | 86A196A3D5D6C9DECCC5FFF471DED674A426A449 |
SHA-256: | 9D9ED76ABE49E4AD83F88631E5954DF142D1D737F6D52868E84BF8CB6023BFEA |
SHA-512: | B6186146709B89025E90E48A034B430381BC30696EB3FD5F585F297A702DAF5DAEB4117646831CA25C507E3D403B6AF0630E909E53736642EBA5643103820FAF |
Malicious: | false |
Reputation: | low |
URL: | https://midgard.antifa.se/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3586 |
Entropy (8bit): | 5.013802080340281 |
Encrypted: | false |
SSDEEP: | |
MD5: | F13A5E9C3B948C72A8F92878F5D8CFC9 |
SHA1: | F8B8BB1CCD7736793B5A26330F5E791903D20089 |
SHA-256: | ECFC357AD95E64230925CFE8FC310394FE5C1B4385EB08354B8FEC69AF0D6966 |
SHA-512: | 1F3B3508ABBD5FDA04BADDAFC5E26F527945597F85DFC571B1C1F7535F61FAFDB712AC22F4C00EECA64E8CD1FD048A24AB6B5244405AF36FD13EC433C77F90DA |
Malicious: | false |
Reputation: | low |
URL: | https://midgard.antifa.se/wp-includes/blocks/navigation/view.min.js?ver=e3d6f3216904b5b42831 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 18692 |
Entropy (8bit): | 4.754375391922092 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4CC444663C1E69CB8AC7B909E7192BCA |
SHA1: | D00DDC5B9526193FA99BC3995A6D05F995452EA1 |
SHA-256: | 4F79A89D16A5F717110FE080C0BF90B7E05FF95A4C4983F64D33110BF5F9C230 |
SHA-512: | AE37D08D11AA4337650CBEC0D0F1205A5505CB3E82373873E82CBA093019521CD2B93CFE2DBE4840CE098717287E1F732E9330C90063B122F1C6358664F1B8EE |
Malicious: | false |
Reputation: | low |
URL: | https://midgard.antifa.se/wp-includes/js/wp-emoji-release.min.js?ver=6.4.2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16534 |
Entropy (8bit): | 4.710387177481971 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2AE7FD3571E46CC052E105900FC6CF08 |
SHA1: | F9C40CA81ED324DF5B822B508F0AAF5AC067FD20 |
SHA-256: | 38B1136CF93F9CB1DC433FD40347FED72EBCE9522A55393F95FEAE15A8268233 |
SHA-512: | 9C99A883D3DEE3E0DAE96933A273E823A53000F9D9B7D74DF4A649533A6F81306615C192945249E24DC7451EFD5B0FBFF2D865710016AB9F78F675ACB4C89895 |
Malicious: | false |
Reputation: | low |
URL: | https://midgard.antifa.se/wp-includes/blocks/navigation/style.min.css?ver=6.4.2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 326628 |
Entropy (8bit): | 7.999033732376951 |
Encrypted: | true |
SSDEEP: | |
MD5: | 9C9CFF93A0D5A209225C1BAE18D80A9D |
SHA1: | 40546DBFD5C467C3257D8F3A4AD8AF0D9995AEB6 |
SHA-256: | E931823FFD0B6CFD1624E3A7C1C49861ED3420297862E727F07E04C8BE1CC89B |
SHA-512: | 6D60EBA8B9AE8B8B85AC93D4DA1F3ECAC3D8472E9821F9A580EDE27ED778B5AA590A5083CCB960602CC2B9D345FA17ED67355CAC4A1D07427B1B4330A63ABFF1 |
Malicious: | false |
Reputation: | low |
URL: | "https://midgard.antifa.se/wp-content/themes/twentytwentyfour/assets/fonts/inter/Inter-VariableFont_slnt,wght.woff2" |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 32281 |
Entropy (8bit): | 5.26513249539309 |
Encrypted: | false |
SSDEEP: | |
MD5: | 39756A31C539260197A02334DFCD0B15 |
SHA1: | DB436B9522831AAF15E60A0B8D39B74FD7B555C9 |
SHA-256: | 8DEBF919F9D44BA37FA60607809C029F16307D1B27D5472ECCB2234563D713BC |
SHA-512: | 0583785DD3722A7AF497F0854971FDA72B79939DBBD6D01387CC93BC259C1D3EE6BA3676291EDD7CD6862F45F060390950DEF16FEF272F26875D37ABCD7EAEEB |
Malicious: | false |
Reputation: | low |
URL: | https://midgard.antifa.se/wp-includes/js/dist/interactivity.min.js?ver=6.4.2 |
Preview: |