Windows
Analysis Report
http://c:/windows/softwaredistribution/download/3e2b148015fb60065dcd70bc2f8d8129/bd52f2e281f320e74d3d930143b60c3a7cde8097
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 7112 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://c /windows/s oftwaredis tribution/ download/3 e2b148015f b60065dcd7 0bc2f8d812 9/bd52f2e2 81f320e74d 3d930143b6 0c3a7cde80 97 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6152 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2168 --fi eld-trial- handle=193 6,i,111319 4313953785 6672,57452 6172612867 5408,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 142.250.186.46 | true | false | unknown | |
www.google.com | 216.58.206.68 | true | false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
8.8.8.8 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
74.125.133.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.131 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.238 | unknown | United States | 15169 | GOOGLEUS | false | |
216.58.206.68 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1445196 |
Start date and time: | 2024-05-21 17:58:23 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://c:/windows/softwaredistribution/download/3e2b148015fb60065dcd70bc2f8d8129/bd52f2e281f320e74d3d930143b60c3a7cde8097 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@17/6@4/46 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.186.131, 1 42.250.185.238, 74.125.133.84, 34.104.35.123 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, ed gedl.me.gvt1.com, clientservic es.googleapis.com, clients.l.g oogle.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: http:/
/c:/windows/softwaredistributi on/download/3e2b148015fb60065d cd70bc2f8d8129/bd52f2e281f320e 74d3d930143b60c3a7cde8097
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9946479928420926 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4512BD5E4CD6468BA15C85A0F66DB1D2 |
SHA1: | 779387D89C026C60842497D02F943149B7517FF9 |
SHA-256: | 4B753AE629EA0039AA79BAA6EBC133FF60DE1DE0A8688993AA25EBA545F32AC3 |
SHA-512: | 9C700B0634CF1955D47CDD2B6F782435D3FFD5B00CC75B0EEE5D0135F31BCB49837A95FAC17A2AFBBC2761FDED68B6210AE41FBEBF0222713D3358BE53D0226B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.010533314314742 |
Encrypted: | false |
SSDEEP: | |
MD5: | D9D517EE8C00DD3D9BBECC096761F10E |
SHA1: | 4BCFE86253B3FA342B3B50C03196C3335769704B |
SHA-256: | BC1D6D92DB8D36E70BC436C8CC4FF1C9DE7E2B5646B4E6B9DEF494B853564AE2 |
SHA-512: | 0699485D1E06101A97E2E8E98D201784334309665F93583E1CA113D320FCDEBCC21D10B479499048A2B9CF6A7F73F91B80867EC0E43083A01515B3288F4E3ACB |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.014170070355997 |
Encrypted: | false |
SSDEEP: | |
MD5: | 716DA912FAB6C407BD9400B04874306D |
SHA1: | DA9101C0086F23784DB484713AC506CF721A4FCD |
SHA-256: | EAEF8FD530886F23896F5482658C5D496F521FEEF6B3248E554D0A9729687573 |
SHA-512: | A6783A80873B32127F70B5CBD3D9491E4EE081A13944A4B9EFBCECFC342FDCE2D9C01EBABD6C178291E06D9B1D7F096EDFA71BDF61D178226CF016D5512349F5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.010678133916762 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6E38471BE1E1DD85AD4CF30853D10D98 |
SHA1: | 0796B05D3B9962E6405B0E3EE3A46C0D09D4086F |
SHA-256: | F2BB4A0A3E9141587A8D81B5242C126FFBF74790B98B79E41642D319D84B0679 |
SHA-512: | E1D8100A9DD657A1D8D595D4B9D5F17E8E85CD64265257D47EB6728859B5002B51E98DB1122C955FEB9A2CC5B6626EB454F292D689A6C165EBC36CB483478B9B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.99905122905049 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0AC48863EA03E240F9EEEB8C3E399513 |
SHA1: | 1A24001C6713FAA3C80E13015E87EE9FAE07C2FA |
SHA-256: | 895428E157B094A1BBA11F85C347E5FA2767217EA798239FF97ED6677848957D |
SHA-512: | DA65741D0A72E4DA041314680883559947E4DC48DD279F49B1E2A163F21303257C28902010162D1FFE624CF4A265DFAEC02928BF79CEDE82BA5FB4057100AAC6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.008195580682386 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F1E968A57DD817A75F3766A7F9A97F1 |
SHA1: | 640B4356778FB28340F6CBD18466BF8B9FC7195B |
SHA-256: | A5180852FEC9D588C1697EDAC933348C62EF30FD2FB102B2231655DFED895CF4 |
SHA-512: | C6A10DA7608E86DA57C7D2187629C36F2DFAD6848B844DCCFBDC84C8C32D4C413B8C1181300C81294ACF275C0EFEF4357A3F0A3E2E02E759C73C0AAFCC6BC497 |
Malicious: | false |
Reputation: | unknown |
Preview: |