Windows
Analysis Report
https://email-signature-image.com/signature.gif?u=3205231&e=521076447&v=2ab449c9dc9f3228f473b3e96aae090f541800541ae2ec51a09902054c73d9c4
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 4360 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// email-sign ature-imag e.com/sign ature.gif? u=3205231& e=52107644 7&v=2ab449 c9dc9f3228 f473b3e96a ae090f5418 00541ae2ec 51a0990205 4c73d9c4 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 2084 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2200 --fi eld-trial- handle=195 2,i,127382 5536475176 9428,10942 1934040864 26959,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
2% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.251.41.4 | true | false | high | |
email-signature-image.com | 104.21.35.46 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.41.14 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
104.21.35.46 | email-signature-image.com | United States | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.80.3 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.110 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.32.99 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.41.4 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.253.115.84 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1408824 |
Start date and time: | 2024-03-14 09:13:29 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://email-signature-image.com/signature.gif?u=3205231&e=521076447&v=2ab449c9dc9f3228f473b3e96aae090f541800541ae2ec51a09902054c73d9c4 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@14/6@6/86 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.80.3, 142. 251.41.14, 172.253.115.84, 34. 104.35.123 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, ed gedl.me.gvt1.com, clientservic es.googleapis.com, clients.l.g oogle.com - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9819920933383663 |
Encrypted: | false |
SSDEEP: | |
MD5: | 12781D6E266B9DB5AC3081AC0A4DEC43 |
SHA1: | DF64A12EE48EB664722F80B42354945AF35D808A |
SHA-256: | 8AF3D797ADD7961890C11A070358A86A9A4AD88FC73873C646D43819ED1015E1 |
SHA-512: | 00552C5ABF0B18F0F90B7CFDBF9DFC837C0164CAFFB25B5727119A34595489B5781EA62F194D658BB44866EE63C2F94B39916FD521F05C0A4FB2225DB903EC9D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.000096448438451 |
Encrypted: | false |
SSDEEP: | |
MD5: | D92BB88FC46F5035F44BB7570245A747 |
SHA1: | B23FBABF1B18FA33EC2D72137D93452D029DD191 |
SHA-256: | 180E9A39D686AD64EDD38B46EF8E42D45E9BCA4E77D1C193D6A992550B6F5E56 |
SHA-512: | 59C9E14F5631BE7B43C4AA41168B45876778D71231A1D9904C19F17E913D4DEF148393FA6E1C17E943999ED49AEF04FAC3BF33D15F5676BC0C889EA00B68DAD3 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.0080212277555685 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1B5B390A8B3F95F0B5AC296272A2147D |
SHA1: | 22325E43623E91EC01784C071D43688450A8BB35 |
SHA-256: | C222D6663D9D109EAACC0AB31CD768A9EBEA3DEF8455A8E212705A9ACF468C2C |
SHA-512: | 3B3E7FFAF8CF44F01BA8B44E359F3E125F481CECE3E5F95BDA0F931822E76887AAF42D552CD605341442A091695B8B629EA342098E8CDF040EF9259537415D13 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9991060896620505 |
Encrypted: | false |
SSDEEP: | |
MD5: | AE3BD4AEA3A3D729F16B60713AF939EA |
SHA1: | AF192537A734B9B464FD3D7BC38B638C913A22BD |
SHA-256: | DF12A407E109059331E0AA18DFFF724E81C22C6D44F653DD864F75AC8AE19C9B |
SHA-512: | 67F3F90C7CAD1BA39893D356F235331C1EA852B8A599C143C563C2CF01B145558D88F0AB78E847D3CD4FE815846FC5C9EADDF13C109E5A7FFEA9B582879FA205 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.985145040077358 |
Encrypted: | false |
SSDEEP: | |
MD5: | E698A5FDF06A52B282EC8C432619000B |
SHA1: | 81E7971EC27DCF169272D18D4C090996092E72D5 |
SHA-256: | F87E1BBE8182FB4FEC166C1F4083D11B6E5F7C358A7D32DC05BB9D704A994A3E |
SHA-512: | 4B39FC6CBE4271A31EA2230D77F0E4BBCC71AEF6B5A0B7671AB644987E267672FCFFB373F5B7866B01439B95E6BC33680F154A9B242D36417FA8D0955A73A414 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9947153996070397 |
Encrypted: | false |
SSDEEP: | |
MD5: | E0B69143105B25A9F69BCE46F2F9C114 |
SHA1: | AA0F2624B9F1EA25D4924E538CCECF9D5CE90466 |
SHA-256: | 97482D7A33B225325E5EAA6ED4C6B0DB8CD69CF7E25A94B1999190BD64073379 |
SHA-512: | 073BA564CCC126502C98F674D83689796A6D03F300D6952A5E5A283F0B65D33D26D509CFAE32931AC8CA80CC93FEBF724719DB735FAC96D754E95D7E9D2404E7 |
Malicious: | false |
Reputation: | unknown |
Preview: |