Windows
Analysis Report
https://messaginganalytics.athena.io/?event={
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 532 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// messaginga nalytics.a thena.io/? event=%7B MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 608 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2156 --fi eld-trial- handle=195 6,i,106640 2699541607 8785,61856 3108736578 7602,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dgbjnmgvw682k.cloudfront.net | 18.173.132.97 | true | false | high | |
www.google.com | 142.251.40.196 | true | false | high | |
messaginganalytics.athena.io | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.72.106 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.250.80.110 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.111.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.206 | unknown | United States | 15169 | GOOGLEUS | false | |
18.173.132.97 | dgbjnmgvw682k.cloudfront.net | United States | 3 | MIT-GATEWAYSUS | false | |
18.173.132.12 | unknown | United States | 3 | MIT-GATEWAYSUS | false | |
142.251.40.131 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.81.234 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.40.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.40.163 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1411118 |
Start date and time: | 2024-03-18 16:12:59 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://messaginganalytics.athena.io/?event={ |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@14/10@6/107 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.251.40.163, 14 2.251.40.206, 142.251.111.84, 142.250.72.106, 34.104.35.123 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, ed gedl.me.gvt1.com, ajax.googlea pis.com, clientservices.google apis.com, clients.l.google.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//messaginganalytics.athena.io /?event=%7B
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9806190416430844 |
Encrypted: | false |
SSDEEP: | |
MD5: | 251BC299F7BDFAE3DD30BD02A4942B98 |
SHA1: | ACC75A5271138B4B60F5D7F158FADF659EB6800C |
SHA-256: | 68744CB0B900337396FBFADAB8D6AF24A2048F811967EBBBD689BDC0B8402A21 |
SHA-512: | C82DD65324EF8C65E1D266CC9E19625425F1D6803486FD34FCC7274B864831F1085A506CC3C3BD08D87E5D802A6576682EE9430749C52B4E47A0618EA6C8B0A6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.997051005830913 |
Encrypted: | false |
SSDEEP: | |
MD5: | 34BE01FE5C52CDA474C99148251A349F |
SHA1: | 930338D08FAE97499C2630844BFC56F5B7F3CDF1 |
SHA-256: | FF700C603BC7A042D88113FE1D3DC27CA18F1D6329F22C7FA416C02DC55B45A3 |
SHA-512: | D1ED06F78F6F8F628137FB127F1A09E2B030844E84DD00A3A834A1D2345B48086455C74762C432321ED57740B3506BF942BE96ECAE3D1B792A0022D58E26D903 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.006085703494468 |
Encrypted: | false |
SSDEEP: | |
MD5: | 26A00B36AAEBE3330762FC8FCBB7BE9B |
SHA1: | B2BEE74193FC052E4BADE1BE404EAFD9C71DBA22 |
SHA-256: | 4218DC4312137D60962A53D05CF9F30F67DA37AF5D85F7BBFCDD389034F3592B |
SHA-512: | DFA0AFAA098ED40B37AA342B5EEFECDFF6B6FB76A243FBB18CE40128843EAD049C743A75AF3C9C40CCDB867215BAFD1A6EC35F7E9D3F923E28110CF3E2E8128F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9941953291233068 |
Encrypted: | false |
SSDEEP: | |
MD5: | A220B20DE78BCC9C4EB79B9D9C423C2E |
SHA1: | ED16EA0AC7F90B47BD557DDA21A11E3D2D596B94 |
SHA-256: | E43BAC2F9766C73B210464EAE215861900B88AF109B1F467590CBCB2F6132274 |
SHA-512: | 57D862278A9EABF2DAAF857B054931E975CC13D58FA731A1DA9C22B6B00153131BC3005D2D871F3A6444B1545A79A3214CD95C755A80D9183A9316E1E6963B81 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.983266468579969 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1F4EA30A58145D8B8D1A55EAA3BFD96F |
SHA1: | 91D2D6276BFC2811922A37A86C0CFEB312354D43 |
SHA-256: | 140C71FF7E891155C5A1A5B13A2CB9740BA329862507261546F9FFF334BF4E4F |
SHA-512: | 0620357BE5A321FC30EB57C102D481B4A1FBA9026B0D00FEE283147F16BCB8B229649C335E8ABE39A93810B4D73517F53CF4271A5E05B1D81887C3DEFC4EC0E2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9934394864322442 |
Encrypted: | false |
SSDEEP: | |
MD5: | BE555288156F3C05760A3A7EC04A3831 |
SHA1: | F7194E24D7B9C6011E75A75ED5A2E53BEFB8346E |
SHA-256: | 80B57446AE100541834FAD78890808F392CD31942549282D83D18541B8367232 |
SHA-512: | 797F4616665BC02C9DD567DF0A17AC39DC0B87447C82D50FB52E96145849A6D4EC827AF4E27092247614F746CBF4D4C2951D1ABE71F13307A575138AC542F9AE |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 11050 |
Entropy (8bit): | 4.061455415256545 |
Encrypted: | false |
SSDEEP: | |
MD5: | A80D5DB4E1A6A8E2FE4B35D77B11A24F |
SHA1: | 33C6E9FFB9B8BC6612527920183EBB8BA4C86B1E |
SHA-256: | 5A725080DC2C1F70228812DFB5900B479C9F48C3035C8A162C3C2097C8530200 |
SHA-512: | 0CA827EA92260AF65073E8CD636980DC18E7F260930E3B1DE93311B897283946F497463D3088C8D4893EA191C73A183FC0D78A6098EC40400E71A719799DE99D |
Malicious: | false |
Reputation: | unknown |
URL: | https://messaginganalytics.athena.io/?event=%7B |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 243 |
Entropy (8bit): | 5.596753319322909 |
Encrypted: | false |
SSDEEP: | |
MD5: | BE28CA7CAA8C89137D1B9FA6468AED34 |
SHA1: | AED4AA3CEA405D343BD2D65C886CE33F6B9F1778 |
SHA-256: | B6123B753EA7574A6B92617F42CA71B99EA102605939891A9775CDD15006295B |
SHA-512: | 31043CD8CF1846FB13817195C0C76D0ECD957B83EB2FED02444520950964A7960EE6B2610FC9FBEB7DC505D4090A800B31755BF5201CAC533771D36301CD24FC |
Malicious: | false |
Reputation: | unknown |
URL: | https://messaginganalytics.athena.io/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 87462 |
Entropy (8bit): | 5.262148110388299 |
Encrypted: | false |
SSDEEP: | |
MD5: | E6C2415C0ACE414E5153670314CE99A9 |
SHA1: | 5A9EEAC34D86E92E5660E0F4F87204F1ED0C8FF6 |
SHA-256: | D8F9AFBF492E4C139E9D2BCB9BA6EF7C14921EB509FB703BC7A3F911B774EFF8 |
SHA-512: | DE027062931EDD07B01842EFF24FC15FDBDCAA1AF245DCD133155FABA9E0C965F0A34DC6144CE3B149BC43B4597073C792CB6DABBFC6168C63095523923BCF77 |
Malicious: | false |
Reputation: | unknown |
URL: | https://ajax.googleapis.com/ajax/libs/jquery/3.7.0/jquery.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 290 |
Entropy (8bit): | 4.838716450197847 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3760123EB544596B440E81D25F475D0C |
SHA1: | 5B57AB7236CFDB8C07D21B6229FFEBB796505BE5 |
SHA-256: | EBFD6B8E4700FECB72073341B06391B433981056B4451F79B84D474F7611323C |
SHA-512: | 3E839CDAF54EABD151FB49F02B1A8D6284991991AFECB27474DD58874117A8D7294CC44AF69DCBC6EA1617612E9678426C7DA403631BDFC5E2506D817633BA39 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=https%3A%2F%2Fmessaginganalytics.athena.io&oit=3&cp=36&pgcl=4&gs_rn=42&psi=nrh7TQOlcPX1hOkV&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw |
Preview: |