Windows
Analysis Report
https://url2.mailanyone.net/scanner?m=1s6xmo-0003Y4-3b&d=4|mail%2F90%2F1715714400%2F1s6xmo-0003Y4-3b|in2l|57e1b682|17902772|12174482|6643BACE34CB3EF2B348DC8F5426E62D&o=%2Fphtu%3A%2Fsts%3Flchmt%2Fc.amDFuW9TxZERGSFUk1bdVSmkwz9PZTc1vdjzzYX1Mn2lfhlJJb56ybmlVNVQPlEZSC2TZbZm3WmWT0dRPVVlkxTRIPV
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 7060 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// url2.maila nyone.net/ scanner?m= 1s6xmo-000 3Y4-3b&d=4 %7Cmail%2F 90%2F17157 14400%2F1s 6xmo-0003Y 4-3b%7Cin2 l%7C57e1b6 82%7C17902 772%7C1217 4482%7C664 3BACE34CB3 EF2B348DC8 F5426E62D& o=%2Fphtu% 3A%2Fsts%3 Flchmt%2Fc .amDFuW9Tx ZERGSFUk1b dVSmkwz9PZ Tc1vdjzzYX 1Mn2lfhlJJ b56ybmlVNV QPlEZSC2TZ bZm3WmWT0d RPVVlkxTRI PVy1MzFjAN AMTVVO3VRA SFzwMDTTEN kNjDAyy0MA MIw1NDTTMO AMmTA3umcF NAv9ZDE0de MTFG9WXSSZ Zt%3D9Yl0Q %3DNEPEN12 a5BM3%25D5 %25li&s=Z1 ppcoNKY2-x cMb4YAg2Ku -8pJE MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6292 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2192 --fi eld-trial- handle=194 8,i,176208 4009805620 2275,15998 4666068044 98558,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.186.100 | true | false |
| unknown |
url2.mailanyone.net | unknown | unknown | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.184.195 | unknown | United States | 15169 | GOOGLEUS | false | |
64.233.166.84 | unknown | United States | 15169 | GOOGLEUS | false | |
34.104.35.123 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
104.18.10.14 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.163 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.185.238 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1443581 |
Start date and time: | 2024-05-18 02:36:55 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://url2.mailanyone.net/scanner?m=1s6xmo-0003Y4-3b&d=4|mail%2F90%2F1715714400%2F1s6xmo-0003Y4-3b|in2l|57e1b682|17902772|12174482|6643BACE34CB3EF2B348DC8F5426E62D&o=%2Fphtu%3A%2Fsts%3Flchmt%2Fc.amDFuW9TxZERGSFUk1bdVSmkwz9PZTc1vdjzzYX1Mn2lfhlJJb56ybmlVNVQPlEZSC2TZbZm3WmWT0dRPVVlkxTRIPVy1MzFjANAMTVVO3VRASFzwMDTTENkNjDAyy0MAMIw1NDTTMOAMmTA3umcFNAv9ZDE0deMTFG9WXSSZZt%3D9Yl0Q%3DNEPEN12a5BM3%D5%li&s=Z1ppcoNKY2-xcMb4YAg2Ku-8pJE |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@19/10@6/109 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.184.195, 1 04.18.10.14, 104.18.11.14, 142 .250.186.174, 64.233.166.84, 3 4.104.35.123, 93.184.221.240 - Excluded domains from analysis
(whitelisted): url2.mailanyon e.net.cdn.cloudflare.net, clie nts2.google.com, accounts.goog le.com, edgedl.me.gvt1.com, ct ldl.windowsupdate.com, clients ervices.googleapis.com, client s.l.google.com - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9879503203794857 |
Encrypted: | false |
SSDEEP: | |
MD5: | 97EFE0965DEB565155E8A476BDC3E517 |
SHA1: | 59A43F976F2F80FF7CE6DBC8E21AB43CEC02805C |
SHA-256: | 024B312D710F7D9C91014D3D5B6BE78877A7710558C61C22772CB5B0A4B9DBB0 |
SHA-512: | C10CB7886310B5682B1076E6A6AFEFA5E6E28159149B5227AF7E89799E3F82521DC0466617CFEA006337C27E0DDC17136ED0DE1B8591E375872901809DA58224 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.00413193518805 |
Encrypted: | false |
SSDEEP: | |
MD5: | DD7D165A2AFC168C480C077973500894 |
SHA1: | 6A366782EA3962C69484505857823906E832F651 |
SHA-256: | 9DD0B95664C3E75FA709F20B477956ED93C2406EEF71A5D5F45052A926EC5A7E |
SHA-512: | 8A4822EAABD466BFBD7B80626A2B3EFCAFD190B3F5372C7AA67827E75C4DD1224115B5DDE8905B2F64C6D3284732FC409430529A0825F096E9E0E14007B5A523 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.0102171328944385 |
Encrypted: | false |
SSDEEP: | |
MD5: | 566434773A13659C3893281B20E3AF3C |
SHA1: | 245C0E3AA5363BEBD33616524435EDA3792C454E |
SHA-256: | 7F6C9A8C75D31E0C075E12EAB0CEE7E45A47BCF38F234D4DD08ADA2689A5DDC7 |
SHA-512: | 6A34CDDF7DB3DEF1E8227EFDF82DB90113F2B3DDA4D50541D7B25677FC41B2C1476BF467C11710226EE6F7D602ED85E721B53EDA13CB84B52C7DD7D7D434B47C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.001080265588953 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7A4208F2DC300F696921B84A5163759D |
SHA1: | 885FED276C9274316E765995D4494CA61ADA94E5 |
SHA-256: | 000BED425C7CA0BDB0C3F368F806BE3061E9E737A302A0E33CD72F84FE043117 |
SHA-512: | 8FF2370BD07EAEAC317322CBCB9D701D88677C1C510C7F33B3944FB7D27A94BB96F9C475D6F290DAAD8BB8A53A4D15C1D573D628B0EA5BA515DD2620F8C5716F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9905353917096966 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4CA2D4FA02C1DF54194A6EF7C5957D4A |
SHA1: | 36B1266DCF06B2B0C9FCB2D2582F55B46A4EE2F1 |
SHA-256: | 82B480B90B6511B89C9511FBB8FD195D331C932B15A9AD354FBFE05020F17D5A |
SHA-512: | CEC95DC266FB83DE7BD8D80916EA6FA18A55BB1C8A92DC0BF4AB22E510B6D155B8764AE938B7C9F45703B405EE358F6F2149339BAAC7210C5087BC3503EE8BCD |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.000990230182953 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8CBD25946FC95B0F29FC6AF00E856368 |
SHA1: | 49EC7243D16925A006F11C62B9E06ED7B70DC50B |
SHA-256: | 04FD1FA61C21B220C158C40BCF518F97ACA658DFB8AB02CA19F62AACEDDE38FA |
SHA-512: | B8DD72AADE389D3802280668A2C564C97ACBF9FEE390EA0BD689630009387774D80A09208B187222116E26561E80D75E7B63433DF9834F79CB8CA96072D8E7C5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15406 |
Entropy (8bit): | 2.932954551863506 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9D62DCC244C0F3D88367A943BA4D4FED |
SHA1: | 5FC5EC953D4344422EB686B9FC61EA31CAED360E |
SHA-256: | FDDF75D3376BB911DB3189AA149F508317799B10611438B23D688B89DB208DA7 |
SHA-512: | 78CD9A7A2CDAFCC378A3CB1215325BE78D54A4459D5C4C7271DE617A272AAD10A951BD7F2EFE15EBF4E70A059420D988AC093C481AF02C788D864AA9E316DF22 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3999 |
Entropy (8bit): | 5.384768440412467 |
Encrypted: | false |
SSDEEP: | |
MD5: | CAB6057F3FB0BD14FDB154C9636F2ACD |
SHA1: | DEE42B01B6C0C8C4244309249BED3DAC8A875CAF |
SHA-256: | 48CC5FBCA021072CF7BE4F476DDF522623AA9ABF483623E1722A92F074644324 |
SHA-512: | 7363C7604577AB5FFFE08D60BCD92852FB9724B8B95A08D8CD910859EC17EE7C57ADFB7AA39B54344CA89C830E0EDD94776DA47D924AA389C48FEF5C6C7D814E |
Malicious: | false |
Reputation: | unknown |
URL: | https://url2.mailanyone.net/scanner?m=1s6xmo-0003Y4-3b&d=4%7Cmail%2F90%2F1715714400%2F1s6xmo-0003Y4-3b%7Cin2l%7C57e1b682%7C17902772%7C12174482%7C6643BACE34CB3EF2B348DC8F5426E62D&o=%2Fphtu%3A%2Fsts%3Flchmt%2Fc.amDFuW9TxZERGSFUk1bdVSmkwz9PZTc1vdjzzYX1Mn2lfhlJJb56ybmlVNVQPlEZSC2TZbZm3WmWT0dRPVVlkxTRIPVy1MzFjANAMTVVO3VRASFzwMDTTENkNjDAyy0MAMIw1NDTTMOAMmTA3umcFNAv9ZDE0deMTFG9WXSSZZt%3D9Yl0Q%3DNEPEN12a5BM3%25D5%25li&s=Z1ppcoNKY2-xcMb4YAg2Ku-8pJE |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 89423 |
Entropy (8bit): | 5.054632846981616 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5ED8A5EC7C2F3373DAB40F406BE4E1E6 |
SHA1: | B28BAF01ED6D1017AACF302343E6C0C675D8127D |
SHA-256: | E3526F688F0037EB9818B78E5096B7ED43AEC8D0A9A1CBEA6C7FEA39D812291D |
SHA-512: | E6278C8F3961C16FBF963B4293C22FA504258112BFA3DF108B04BD5366E758515E268D5766493A684708854B6E02F0948D983C29E536FBC54E757D8649C4C27B |
Malicious: | false |
Reputation: | unknown |
URL: | https://url2.mailanyone.net/static/css/main.2768b4bf.chunk.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5010 |
Entropy (8bit): | 5.3247438309708635 |
Encrypted: | false |
SSDEEP: | |
MD5: | 49864A8E125D378BCB2C452E5F949AB9 |
SHA1: | 16813CF45B19A19293AE85ECC3D7E6E18F95E75C |
SHA-256: | 0ED4CE10806A4CFFBC0A283BEF8AD076EDF2D070A3F72979F825595790966EEE |
SHA-512: | B375DFE76BDB7DC954CC68A451EE7AA166709A0735970DCFAA2B60EEEA3C7C83C1040288D96318131716A3B573DF2D1BD1A0803115784BD6E428F7EF2C97975A |
Malicious: | false |
Reputation: | unknown |
URL: | https://url2.mailanyone.net/static/js/main.fbcc4ef1.chunk.js |
Preview: |