Windows
Analysis Report
https://na4.docusign.net/Signing/EmailStart.aspx?a=e153d125-348d-4398-93d0-d388e99cdb[…]c0-9bf3-0b67ae75d690&er=47a03996-21c7-4596-8047-e2b65b567d69
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6104 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// na4.docusi gn.net/Sig ning/Email Start.aspx ?a=e153d12 5-348d-439 8-93d0-d38 8e99cdb%5B %5Dc0-9bf 3-0b67ae75 d690&er=47 a03996-21c 7-4596-804 7-e2b65b56 7d69 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6196 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2036 --fi eld-trial- handle=197 6,i,656412 0544259838 645,174674 7665857061 1108,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 11 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 142.250.217.237 | true | false | high | |
www.google.com | 142.250.189.132 | true | false | high | |
api.mixpanel.com | 107.178.240.159 | true | false | high | |
clients.l.google.com | 142.250.217.174 | true | false | high | |
clients1.google.com | unknown | unknown | false | high | |
clients2.google.com | unknown | unknown | false | high | |
na4.docusign.net | unknown | unknown | false | high | |
docucdn-a.akamaihd.net | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.178.50.78 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
192.178.50.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.189.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
23.219.155.162 | unknown | United States | 28032 | INTERNEXAPERUSAPE | false | |
142.250.217.237 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.217.174 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
107.178.240.159 | api.mixpanel.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
162.248.184.187 | unknown | United States | 62856 | DOCUS-6-PRODUS | false | |
162.248.184.188 | unknown | United States | 62856 | DOCUS-6-PRODUS | false | |
104.86.191.142 | unknown | United States | 20940 | AKAMAI-ASN1EU | false | |
172.217.3.67 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.30 |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1363995 |
Start date and time: | 2023-12-18 16:22:47 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://na4.docusign.net/Signing/EmailStart.aspx?a=e153d125-348d-4398-93d0-d388e99cdb[…]c0-9bf3-0b67ae75d690&er=47a03996-21c7-4596-8047-e2b65b567d69 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@14/25@20/149 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 192.178.50.35, 162 .248.184.188, 34.104.35.123, 1 62.248.184.187, 23.219.155.162 , 23.219.155.145, 104.86.191.1 42, 104.86.191.149 - Excluded domains from analysis
(whitelisted): a1737.b.akamai .net, na4-se.docusign.net.akad ns.net, edgedl.me.gvt1.com, sl scr.update.microsoft.com, clie ntservices.googleapis.com, na4 .docusign.net.akadns.net, docu cdn-a.akamaihd.net.edgesuite.n et - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9874932277452415 |
Encrypted: | false |
SSDEEP: | |
MD5: | F2882A074D65DDF25D523F79D5BE759B |
SHA1: | D51AF4BA67040102F67DFCF1F5D901B24255F99C |
SHA-256: | 405AA26E36BE49213345D94241303E18C63E22C0F61E5FE635DF2D75CAFE1733 |
SHA-512: | 72D93939AF1BCFB8335A30B0BE943D87A30D249030C3747E4EC0CCB51A4A32372A6708BA4D5DEC6B89993CEA8EA39B429439031BE7A48EA753A6A07E5D2E9DCD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.002228892816835 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1EBFCC561AC4C6A95C18989F3832E088 |
SHA1: | 97277BFE6139300AC7313BD5823AF18F1BF25DDC |
SHA-256: | A6812B1292FD38BEF002084748AEFDA6719C75D24B8A918672C1C04E77953AC6 |
SHA-512: | 2E5C01C728A8CA00DCFD22B052BBEB31C8B5481361B4D958B7BD9641C0569266F59ADDBB9864E27B8CBDC47EFE6B84B2AF3824A5C23E0AD3FBB7C90D594FDFA7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.009363099501448 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3A2EE96B6BAA1DEC96B51126B10443A4 |
SHA1: | 72BEFF92C66251C0AD383B1168D5CD2D7D213733 |
SHA-256: | A7047F80DC3CE8C71B4B32427A72D43E46A47A0F6ABAF3ED49D4676E864B61B9 |
SHA-512: | 53102608F4BE08804807F025A8905126856898F24291D745EAA109205EF71CA04D52F555A5931474BF32D8256C5333673A14824212BEA63F9374A9E846231ED1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.999597757181396 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8867A11B651BB58BBE89131764276DEA |
SHA1: | 1A8E79F296DB5D32E74299C2C366EB77EB2AC2ED |
SHA-256: | 121105E16EFDC5D88E04B118E6BBF5597089D0339481E05FAD7398EEB15F63BD |
SHA-512: | 11987C51013EC257B75B41CC3C98C66F93E137C1C132F0C3C09C7C74CA8ADB888F34D6891F8ABD3E8C50FF462E4D42C2FEDD4BF53AC748D41C432F39A557A445 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9907731511189573 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2A9B6F8FA4368BBB56B774B4AECB8916 |
SHA1: | 1E8A9D67BF1C0EA42CA9814351802197585D0D6C |
SHA-256: | A73441F515DAE70F08F7D933691F4250969C9042F22DB2D2AEA810A8A6A1F2EA |
SHA-512: | F4AFDF6E1C63E6FC39857FC71C648018DF2393DA88662944DD990095C0924B02C057CA6E2978AF2C4719C0166C37E4B0E5F674451418BFC636B1EDD3ADF41751 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9992883308816873 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8A971CB8B3AC7E34347AFB184E96CC2A |
SHA1: | AD20DCB1253472FF3E93C755E032F46235B1326A |
SHA-256: | 737CCFDB8E07F7926DD1EA9D3A72636BFDE0371DFC9018E45D562A3912724079 |
SHA-512: | 51C2B63DEB5826AC2B830C6D235406B072F46DD195C395C1B630C4CE664BEF9F71AB3210642FA2F2F55CAF31748CD1389DDD3B20294AF4AF6C1C675F7060D929 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 119869 |
Entropy (8bit): | 4.18401975910281 |
Encrypted: | false |
SSDEEP: | |
MD5: | ECE7A224F69AB2205D90900589AE1D05 |
SHA1: | 3D861B816A5DA892C8A88D5755A5537C036239DE |
SHA-256: | FFA8C6A4CE199BFD9E32B05E0E4DECE330C6A577FB3A0E8518291619C658C486 |
SHA-512: | EEF4BDD54AF95BE42224FFE605BB627293DAEA0C58A50B328ACC8B56040C81FDCB5EC8406F56856FC617A552E4D6DD28BB892467666889D27F03EE8BFCD16D7B |
Malicious: | false |
Reputation: | low |
URL: | https://docucdn-a.akamaihd.net/v/static/mixpanel-2-2-1b.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 97185 |
Entropy (8bit): | 5.374276891254097 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2B6294333DB8EEB65BC7717144357D23 |
SHA1: | 74EF185A3CBA75AF7F4E1B3DCAF1B32B0DB5C1AF |
SHA-256: | 4946FCF019E50CF850A0344E45B3A8F93D5EAD5E1DADE33695025EF732913AF1 |
SHA-512: | BF4197F2ECA58ED25DFDD82D518FB0A6F900695318DC5A47E2039273C3BDA02B1D73249D5EA7D047BFBDA3A692606B430C836912E043F87751FDD900576BEC9C |
Malicious: | false |
Reputation: | low |
URL: | https://na4.docusign.net/Signing/client_scripts/jQuery/jquery-1.12.3.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4739 |
Entropy (8bit): | 4.736490039075709 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4B86605C4B80FA75342703878E7DFF13 |
SHA1: | 6EF59F904C58E88B3E143BA3DA464AFE63FDC188 |
SHA-256: | 2F186CDFA13B6CA51F69D44BAC8A7D5B69E1D5409A68D21F5768A87C6DFDB3A1 |
SHA-512: | B493241426AB5A1B75D1455720E84AB27A2B7E176FDF782ECB14B26004F5553FD306DCAE14C17CE788891FDBCAE9A32A5E22CB187C6BCE66486B89A0E5028AD9 |
Malicious: | false |
Reputation: | low |
URL: | https://na4.docusign.net/Signing/StyleSheets/Framework.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2961 |
Entropy (8bit): | 7.876188909726169 |
Encrypted: | false |
SSDEEP: | |
MD5: | C863DB426897325CB4805B2C20F51F30 |
SHA1: | A426FE43F0CE1A489CE091CC27768CDCC2991210 |
SHA-256: | 2A5179B8851C8E3DFC77D7DCB33B3963AFA037608336D6AE412ACAA38AD59D22 |
SHA-512: | 90DA76303CDE0B81F183709D94DC96B5C3EA7B7766948AF5B81E1EBE4B887012FC611F6A0CFC50873E80AF7B73077F7CB8BD5F254A4F4848C632A68733522A68 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4010 |
Entropy (8bit): | 7.9163177616282265 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2B83C7B55DD89651CCBF62A5153D1984 |
SHA1: | E6664BC6D6AC06AAC70ABBE21CBD83ADB776441A |
SHA-256: | EDD5EB91A05EF65653A6E9C4DDB60482EE93AD2994C1925CD2B7A310E7BDCC73 |
SHA-512: | 23B4A4389AEFAA88CB5D5404E15655B2A52ED4AB9FF258458B8E830886C106826F66448A67C2AFD69B15811A2C9D4E33A9507ECFBADB6DF90A1C5B2A0A97B836 |
Malicious: | false |
Reputation: | low |
URL: | https://na4.docusign.net/Signing/Images/logo_docusign_new_white.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7405 |
Entropy (8bit): | 2.037697524051661 |
Encrypted: | false |
SSDEEP: | |
MD5: | 888E04D5D5FF290D47BF73787F1E0BFC |
SHA1: | C8EDC4B60BB909C025B908F4ADBEEA557581687C |
SHA-256: | 387483B8C9FB9F677E0D72D066945675540FE417E6E6C70BAA9C013CB8FC88CD |
SHA-512: | 0662402C7EBC3D670D40EC55E5DC25C4360E54743517B783151F088A23FDCBE70803B4ED43BCE87D5B50908AC52AF4DEEDE6311445086E5CCFF98E2A82C0CB7A |
Malicious: | false |
Reputation: | low |
URL: | https://docucdn-a.akamaihd.net/olive/images/2.15.0/favicons/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1245 |
Entropy (8bit): | 5.462849750105637 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5343C1A8B203C162A3BF3870D9F50FD4 |
SHA1: | 04B5B886C20D88B57EEA6D8FF882624A4AC1E51D |
SHA-256: | DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F |
SHA-512: | E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949 |
Malicious: | false |
Reputation: | low |
URL: | https://na4.docusign.net/Signing/SigningApp/23.11.54/css/font-faces.css?cs=a28e17903 |
Preview: |