Windows
Analysis Report
https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6064 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// eu.spgo.io /u/WiQY7cF _IPkDQevv_ xmhDQ~~/AA BUrAA~/RgR nny8fPFcFc 3BjZXVCCmW 8H6q8ZRFPP 1lSGWFuZHJ lYS5uYW5pb m9AYmVhbnR lY2guaXRYB AAAAAA~ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 7004 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2152 --fi eld-trial- handle=210 8,i,534540 5506885187 482,277172 8057929650 148,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
eu.spgo.io | 54.229.201.248 | true | false |
| unknown |
accounts.google.com | 172.217.215.84 | true | false | high | |
www.google.com | 74.125.138.103 | true | false | high | |
clients.l.google.com | 74.125.138.101 | true | false | high | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
74.125.138.103 | www.google.com | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
54.229.201.248 | eu.spgo.io | United States | 16509 | AMAZON-02US | false | |
74.125.138.94 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.215.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
74.125.138.101 | clients.l.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 39.0.0 Ruby |
Analysis ID: | 1386643 |
Start date and time: | 2024-02-05 09:55:59 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@13/7@8/21 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 74.125.138.94, 34. 104.35.123 - Excluded domains from analysis
(whitelisted): edgedl.me.gvt1 .com, clientservices.googleapi s.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found .
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.981238020151332 |
Encrypted: | false |
SSDEEP: | |
MD5: | 10C4C4DC6A9739FA015A6ABAA0744E43 |
SHA1: | 197E7C1BDB71464A999CBB905A3AB746FA2BA2EB |
SHA-256: | 4DC20CA74C947E839846948E6C6E05156ED11C96509837396E3110649FFFA960 |
SHA-512: | CD487B59A5D311744ADD5F170C94EC4373F4F5E54934CB22E0726F3B7F540DB0B1F1EC24EF44C0C30A5208B86992E06C45E4FF1B5F0150C011C576ECEA7197C4 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.996791504194917 |
Encrypted: | false |
SSDEEP: | |
MD5: | 79D9E2ACE2B567B27021FBCA1D0CB804 |
SHA1: | B88E1723E7FAE63414F409F702E50DC792277DC8 |
SHA-256: | 17611FFC899E9941D64029AE130721C466665BA50CBA225089D7EA1806B8EB2E |
SHA-512: | 3AD1F475D15BD3E96A8ED2A02686246B81CC663F6879157A3C63B206A5A79B7C58CF79F76A0EE1F5693506D70BA991C7D2D78E4C912F997F023367D506FFF139 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.00746903939571 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1EF00E0F1C20BA1DB9B9209E9899D23E |
SHA1: | E8B8B1A27E9D03549C98B5068828D522A40D0BF0 |
SHA-256: | DF909E21645602B8B57CC1C5CE338A0C7F80746F3E152179D4A34648B02D6CC0 |
SHA-512: | EF1205C5C82851CA427AF9319D0D21024E78D3F13B941A367B8E12852ED3C5C5466864A5D2E0B44957D6BEC6B2CF600119868819D5750E2CD939D8B4497CFB55 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9961914999790977 |
Encrypted: | false |
SSDEEP: | |
MD5: | ADDDB98E0BE0B300181DE05D108646AB |
SHA1: | 0565F0C82A59913BDB5A95DF384AD55B1C858457 |
SHA-256: | 522E749DEBC5FE47F54E4E8FBB5EDC829C1C226F6B3B5E77CC9710F68044E4FA |
SHA-512: | B1AEA9F549F6F0A83A6F647EAAFEF1A6ADAADAA3F79B3AAB6259FA835AB98CA2696D8A315A2A321BF2245079E97DE1C66AC6B349F16156DE2369E46672C6ED8A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9833178652569567 |
Encrypted: | false |
SSDEEP: | |
MD5: | 83B55B3FB4579EC25CCF33B5CB583D3B |
SHA1: | 1BD25AA79E249A63F3EF38D459E18C5ACC6E7D6E |
SHA-256: | 3D837877AF1B81F7E8894273E58C3CA00AD126540230799C62495BD1C0564DD5 |
SHA-512: | EBCAC8EF7924BF2460A439676AB160A65C1A0CD194466381025EEAD9C6FEFB78A56E43FE43A03D98DE42E52EA6297D2341A5BDFB5DDFC02D6FBD1DDE90B06939 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9947637077562956 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2693A1165FE40F6A462E3EBD4B5F6141 |
SHA1: | BD5FE067AD6EB46F8B063EFBE9759266BEF47483 |
SHA-256: | 3347BE0F890EC3846BC6AFC6A71A3B9E8EC601D43FD109B5A88257C6F38B7D14 |
SHA-512: | 999596915B0E4C0EE0C7D2CF40E3F1F7E1227E8ECD03308502D92B10A5022749DD4ACD128AF41AB73CDD830DA934F3E68789EC26E65E72F7DECEFBCF2B3D4DC7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 255 |
Entropy (8bit): | 5.613600749563545 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5078FE40E91A9D0B340930E5A29FCF5C |
SHA1: | 57EE20F7F6A605ED80DFC6BBDA597B85F2EC78F0 |
SHA-256: | 95799D51E795A01AF744DD650054737A8253378DC7B19476CADD3893EC30A010 |
SHA-512: | E282252AB4DA18037906EDF745A790EEC120EBF4923348FCD8039D92948C0B589FB3DE543827FCF878A0C0AA8BD217B873D052CAD9E8AA722D3DFBA18832557A |
Malicious: | false |
Reputation: | unknown |
URL: | https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~ |
Preview: |