Windows
Analysis Report
https://backstretch32.blogspot.bg/
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 4680 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// backstretc h32.blogsp ot.bg/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 5988 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2232 --fi eld-trial- handle=205 2,i,751961 4215886151 368,131973 3502552058 6275,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
plus.l.google.com | 142.251.40.174 | true | false | high | |
blogspot.l.googleusercontent.com | 142.250.72.97 | true | false | high | |
photos-ugc.l.googleusercontent.com | 142.250.80.65 | true | false | high | |
www.google.com | 142.250.80.4 | true | false | high | |
blogger.l.google.com | 142.251.40.201 | true | false | high | |
googlehosted.l.googleusercontent.com | 142.250.176.193 | true | false | high | |
1.bp.blogspot.com | unknown | unknown | false | high | |
4.bp.blogspot.com | unknown | unknown | false | high | |
backstretch32.blogspot.com | unknown | unknown | false | high | |
blogger.googleusercontent.com | unknown | unknown | false | high | |
backstretch32.blogspot.bg | unknown | unknown | false | unknown | |
3.bp.blogspot.com | unknown | unknown | false | high | |
apis.google.com | unknown | unknown | false | high | |
2.bp.blogspot.com | unknown | unknown | false | high | |
www.blogger.com | unknown | unknown | false | high | |
resources.blogblog.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.35.161 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.176.201 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.65.161 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.176.206 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.201 | blogger.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.80.65 | photos-ugc.l.googleusercontent.com | United States | 15169 | GOOGLEUS | false | |
142.251.40.225 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.67 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.3 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.193 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.32.97 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.174 | plus.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.80.4 | www.google.com | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.250.65.193 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.97 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.81.225 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.167.84 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.40.97 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.72.97 | blogspot.l.googleusercontent.com | United States | 15169 | GOOGLEUS | false | |
142.250.176.194 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.176.193 | googlehosted.l.googleusercontent.com | United States | 15169 | GOOGLEUS | false | |
142.250.65.201 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.16 |
192.168.2.30 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1407688 |
Start date and time: | 2024-03-12 17:24:21 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://backstretch32.blogspot.bg/ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@15/6@38/289 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.80.3, 142. 251.167.84, 142.250.176.206, 3 4.104.35.123 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, ed gedl.me.gvt1.com, clientservic es.googleapis.com, clients.l.g oogle.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//backstretch32.blogspot.bg/
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.985869256585779 |
Encrypted: | false |
SSDEEP: | |
MD5: | 62AC89D4CFBCA6C717D78E81EF1E1749 |
SHA1: | EA61FC687482A46E0A114E735892344CC43CD61D |
SHA-256: | 09CB8C38DED38E62AEE2A2544CC2EA57835CE7857B16C046A341C85909EC44B5 |
SHA-512: | 79F2952AE1D28BFA2A229E0E99E513684AF2A036B52AD4916242ACAE5DA4A702535A57CFE6D2416CEE4A5EA5D82F3BFC91F5EED1D0A1DBE5F026ED86B3530C1A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.0000859472653705 |
Encrypted: | false |
SSDEEP: | |
MD5: | C58EE7BF0301350AEF1D975BD0E39024 |
SHA1: | 8DCF8EE8229C72DCD2C68F6A4B0C7D7111637F7E |
SHA-256: | 3E36871A6B3BC6936BB917629BF72145CC29771B1F779E972CB7646448D9D1CF |
SHA-512: | 497CA9582D2D5937FD6FA0237FBAB9B6BDD2F31005CABA3C3FCE1B85091DCD9D0AFCD60D97CD52A35356C52ED1C126FBF64D46179044413A94CDFAD80CABA091 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.0078060153207415 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8FD98142095525E4966B269786250E3C |
SHA1: | E7DC8BA59AE148A4957DB97825067438E91B8B7A |
SHA-256: | AC3489F69246611F374A6C3EE5135EC18C069E84AF2E0F4BCE658A9986623C19 |
SHA-512: | 3362C5C735D747C1095F6AAAB766206C38BFC7053B3A9D7A9DE6FBC5C73BCD6550564795E5D143367582D9736C15A42A069CCB5DCB5B0CA2661FBF21124D24B8 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.99874304800881 |
Encrypted: | false |
SSDEEP: | |
MD5: | AF1459B620AA4BD79E6FEEBDD818E0D8 |
SHA1: | 4DCDAAD2D9E3BCD75ED4EEFD2982763AC2B9B359 |
SHA-256: | BFEA6FB2BE0805B1178A0420FD484E43D4EFE3E2E66C4268975AD9A96716A91A |
SHA-512: | 3A428C4E5AB6CF6FFD31B337C6AFC85B3CD4DEE2AF81976CCB3B79FDDFE4DEBC460953AF77C39C3DE81EB3CC18EE9456D225B430D7C7B504FD73BB212D506CE7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9838731727008514 |
Encrypted: | false |
SSDEEP: | |
MD5: | A9CA854AE70813441199ECF911EC8145 |
SHA1: | 05AE5FEA46A33795E606331FB81C098100AD2797 |
SHA-256: | 3C6C25E4325D291F2681DA8829EDBBAF791B0F466BE45AE15D2D57FB2172B522 |
SHA-512: | F3FF11B5691BD4CBC05430B1EDC7328BDF30E85B0682B9B12B77C5645BF8923BD0E864C60CF549E076F1973112B8A53C1C96904CC5F34F510F99AA88D41A4D74 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9980521218798613 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4076F8F164C35A8A0A455984909CB0A1 |
SHA1: | A8F6EED0FEC49EBD71994729CCB440D94D9AB807 |
SHA-256: | 0C0A7235B018502F2062E5ED512FDCB2FF1EFFA7B280D2C9099CC60CA03D3341 |
SHA-512: | 886FDF24B0BB2224A984F5F562E89E0B6C018093A8B6EDE4D294B59B241EC6C3E8F6991F59FBC7E05837878105CEABCE1C6BF9ED9C0AE8BCAF4D99442251ADB2 |
Malicious: | false |
Reputation: | unknown |
Preview: |