Windows
Analysis Report
https://ipfs.chainsafe.io/ipfs/QmfSZkTUdaSHcErWKheUYAJywNJbhh2u9mWU2vTcW5Td3Z
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 4796 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// ipfs.chain safe.io/ip fs/QmfSZkT UdaSHcErWK heUYAJywNJ bhh2u9mWU2 vTcW5Td3Z MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) chrome.exe (PID: 5672 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2180 --fi eld-trial- handle=199 2,i,801577 5179048611 312,183727 9332809479 2440,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
- • AV Detection
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.251.40.164 | true | false | high | |
storage-prod-alb-759597771.us-east-2.elb.amazonaws.com | 18.119.59.15 | true | false | high | |
ipfs.chainsafe.io | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.40.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.80.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.142 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
18.119.59.15 | storage-prod-alb-759597771.us-east-2.elb.amazonaws.com | United States | 3 | MIT-GATEWAYSUS | false | |
142.250.176.206 | unknown | United States | 15169 | GOOGLEUS | false | |
172.253.122.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.99 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1413361 |
Start date and time: | 2024-03-21 17:13:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://ipfs.chainsafe.io/ipfs/QmfSZkTUdaSHcErWKheUYAJywNJbhh2u9mWU2vTcW5Td3Z |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@14/7@4/94 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 142.250.80.35, 172 .253.122.84, 142.251.40.142, 3 4.104.35.123 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, ed gedl.me.gvt1.com, clientservic es.googleapis.com, clients.l.g oogle.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//ipfs.chainsafe.io/ipfs/QmfSZ kTUdaSHcErWKheUYAJywNJbhh2u9mW U2vTcW5Td3Z
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9973968162654354 |
Encrypted: | false |
SSDEEP: | |
MD5: | BDCDAA7D3F8E2FA0CDEDBCEC6094C7E0 |
SHA1: | 675A3C355156BE5DA52A1587E94EFE6602FE822C |
SHA-256: | F656C1B0EF286FB40A9A6008C1CC2F74D1DF35E5C4087C29C509FD62B8435AF1 |
SHA-512: | 3DCDD1B30DEDF2207EFEEB6C3DD19860907D062D4ACBE64DC34F94333774D7AE5D033A8AA402FA4A5D9A6C91E475F14638E2E4D4151C2DFC69C8DB0A984C89D5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.013789568604932 |
Encrypted: | false |
SSDEEP: | |
MD5: | E734571335730092C797D89CD2F90297 |
SHA1: | 2BA2AD7AE472797C1E60EF289099F26BF7381A1A |
SHA-256: | 571FB07DBCF4E284660496E6CBFE176DD471F973A863382D0AEB309FA33AAA7C |
SHA-512: | 60D34615A649321CD36235310D68AD807FD0A2B0F89F7325CE4D8E7422F384E3E34CB0FCF7DFEB1E4C95B83E3624882A34747A4757F220474D06F067060D0C7E |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.01980590465386 |
Encrypted: | false |
SSDEEP: | |
MD5: | EDFA685704647766AF1BDE2310EC476F |
SHA1: | BBE25CC5CCECDD99E6B22831A3C1B7B3F3B5D12E |
SHA-256: | 8143175FC09DC1403B1D9FBAEE6B3292B5F002C8755B12529815B3FFB56FB7D9 |
SHA-512: | C8416FC60403587CFA8CDA696FBFCAA83B18BD1A47703F8139187D95501C49CA54144E0B860FDA7F17281C17F6FC42C5AF1471575C0B000406293A5C679C7118 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.010923496239093 |
Encrypted: | false |
SSDEEP: | |
MD5: | 585CEBE511897D9CBEC1F8F905B429EA |
SHA1: | 59C5894FF346BA17B83E18DB2DBFDF6FC057EB6B |
SHA-256: | 34087966AD176779BC95B78A81DC2E184C8889215C609EEA4EB8B1335A0E0510 |
SHA-512: | 7CDDFA3B10992346D2F01BC0B33A6B8FFC99CB74F19A9BAA87D1AEEC0CFF0D9CD3EF1F08ED42754C794BB36D8ED07C103E66D4B9E9B082C516E3BBF142494AA9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.001215377246729 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4C7A401E23920646DC82F7E0F232A50B |
SHA1: | 712ABD09E4646CDABB75F88692DF32280575DE7F |
SHA-256: | 0DA25FE4E6A3EAA852B20868B3ABED9F7CB94035A846B927442F7D92C702A028 |
SHA-512: | B6D9153BE866BA8AF0CBB8297741EAC40E1DF3F74264E2EC1CE5F75A7E8742142C82C6D7FD997E2664B6AC3980643BF0879FDAD4ED4CB8797C0C5D56168E4F2C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 4.008301583381192 |
Encrypted: | false |
SSDEEP: | |
MD5: | E86296E048BA2D90C9CE8152A71CB86C |
SHA1: | EE0B4B228207315E12F7D6609C47875E42AF32D1 |
SHA-256: | 3DDB35A58319DD7A0B532802E81BDD7B1EDBD3C23AE2A1585F485F1510638A1D |
SHA-512: | B112769DE4FBDE75173173EA214ADFF6EEB642688D9428169BD98ECB3F5CFC19CB3182DD759F35767B6F1F7BEB8804AA22CEB707087E8E11D44F603EE1416843 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 94 |
Entropy (8bit): | 4.270942122680947 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0020092042C5AE0DC61338256132634A |
SHA1: | 499B228645ED337BA17DA94862A379B3EF6483D1 |
SHA-256: | 131ED4C84DEE1A6994D93C1575B45F34379505D54BF6F0631FF55C11D66F91FB |
SHA-512: | 40AD03314772F314F35355C97645B44F7E5AC4D1F15FBA93D95356893C110BE3286DEEF9A1EDB1D2CDAA508A16BF25041F79302EC50A75C5970C8F4952E76274 |
Malicious: | false |
Reputation: | unknown |
URL: | https://ipfs.chainsafe.io/ipfs/QmfSZkTUdaSHcErWKheUYAJywNJbhh2u9mWU2vTcW5Td3Z |
Preview: |