Windows
Analysis Report
Budget_Statement.htm
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 6724 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t C:\Users \user\Desk top\Budget _Statement .htm MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6952 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2184 --fi eld-trial- handle=198 0,i,157787 4578403581 7334,12930 6392159043 47703,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security | ||
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security | ||
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Click to jump to signature section
Phishing |
---|
Source: | LLM: | ||
Source: | LLM: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Matcher: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Initial sample: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | Directory created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Stealing of Sensitive Information |
---|
Source: | HTTP Parser: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 3 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
a.nel.cloudflare.com | 35.190.80.1 | true | false | unknown | |
cs203.wac.edgecastcdn.net | 68.232.35.237 | true | false | unknown | |
d2vgu95hoyrpkh.cloudfront.net | 13.227.219.11 | true | false | unknown | |
cs837.wac.edgecastcdn.net | 192.229.133.221 | true | false | unknown | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown | |
sni1gl.wpc.omegacdn.net | 152.199.21.175 | true | false | unknown | |
fiveradio-newbam.com | 104.21.84.200 | true | false | unknown | |
www.google.com | 142.250.186.132 | true | false | unknown | |
s-part-0032.t-0009.t-msedge.net | 13.107.246.60 | true | false | unknown | |
ih1.redbubble.net | unknown | unknown | false | unknown | |
aadcdn.msftauth.net | unknown | unknown | false | unknown | |
www.w3schools.com | unknown | unknown | false | unknown | |
cdn.socket.io | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.184.195 | unknown | United States | 15169 | GOOGLEUS | false | |
68.232.35.237 | cs203.wac.edgecastcdn.net | United States | 15133 | EDGECASTUS | false | |
142.250.185.67 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
13.107.246.45 | s-part-0017.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
192.229.133.221 | cs837.wac.edgecastcdn.net | United States | 15133 | EDGECASTUS | false | |
13.107.246.60 | s-part-0032.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
216.58.206.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.181.238 | unknown | United States | 15169 | GOOGLEUS | false | |
2.21.20.6 | unknown | European Union | 20940 | AKAMAI-ASN1EU | false | |
172.67.196.150 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
13.227.219.11 | d2vgu95hoyrpkh.cloudfront.net | United States | 16509 | AMAZON-02US | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.142 | unknown | United States | 15169 | GOOGLEUS | false | |
104.21.84.200 | fiveradio-newbam.com | United States | 13335 | CLOUDFLARENETUS | false | |
152.199.21.175 | sni1gl.wpc.omegacdn.net | United States | 15133 | EDGECASTUS | false | |
64.233.184.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1460298 |
Start date and time: | 2024-06-20 19:11:46 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | Budget_Statement.htm |
Detection: | MAL |
Classification: | mal76.phis.winHTM@14/18@20/218 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 216.58.206.35, 142.250.181.238, 64.233.184.84, 34.104.35.123, 2.21.20.6, 2.21.20.29, 142.250.186.35, 142.250.184.195
- Excluded domains from analysis (whitelisted): san-ion.secure4.scene7.com.edgekey.net, logincdn.msauth.net, fs.microsoft.com, lgincdnmsftuswe2.azureedge.net, accounts.google.com, aadcdnoriginwus2.azureedge.net, clientservices.googleapis.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.net, clients2.google.com, edgedl.me.gvt1.com, cdn-dynmedia-1.microsoft.com, aadcdnoriginwus2.afd.azureedge.net, e81481.dsca.akamaiedge.net, lgincdnmsftuswe2.afd.azureedge.net, clients.l.google.com, www.gstatic.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: Budget_Statement.htm
Input | Output |
---|---|
URL: file:///C:/Users/user/Desktop/Budget_Statement.htm Model: gpt-4o | ```json{ "phishing_score": 9, "brands": "SharePoint", "phishing": true, "suspicious_domain": true, "has_loginform": true, "has_captcha": false, "setechniques": true, "has_suspicious_link": true, "legitmate_domain": "sharepoint.com", "reasons": "The URL 'file:///C:/Users/user/Desktop/Budget_Statement.htm' is a local file path, not a legitimate web domain. This is highly suspicious as legitimate SharePoint pages would be hosted on a domain like 'sharepoint.com'. The page requests users to verify their identity by entering professional email credentials, which is a common phishing technique to steal login information. The presence of a login form asking for credentials and the use of social engineering techniques to prompt users to enter sensitive information further indicate that this is a phishing site. Additionally, the page includes a suspicious link to a 'Shared file', which could potentially lead to malicious content."} |
URL: file:///C:/Users/user/Desktop/Budget_Statement.htm Model: gpt-4o | ```json{ "phishing_score": 9, "brands": "Microsoft", "phishing": true, "suspicious_domain": true, "has_loginform": true, "has_captcha": false, "setechniques": true, "has_suspicious_link": true, "legitmate_domain": "microsoft.com", "reasons": "The URL 'file:///C:/Users/user/Desktop/Budget_Statement.htm' is a local file path, which is highly suspicious for a legitimate website. The page mimics a Microsoft SharePoint login page, which is a common target for phishing attacks. The presence of a login form asking for email credentials is another red flag, especially since it claims to verify identity for a shared file. The page also uses social engineering techniques by urging the user to verify their identity to access a document. Additionally, the legitimate domain for Microsoft SharePoint would be something like 'sharepoint.com' or 'microsoft.com', not a local file path. Therefore, this site is highly likely to be a phishing site."} |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9925352298416894 |
Encrypted: | false |
SSDEEP: | |
MD5: | 24A8536918325216C26D084D8C86A9A2 |
SHA1: | 919CDFBC9F11000B79BE22B0B8AD54181F0D2387 |
SHA-256: | 27E98682E6B649305DD9E2F33CC5D50AE7294EBF27D2B0960C1DE86E12A9A74D |
SHA-512: | 9F91D4A2D2A3868D30919B56BF4ECFDB8C2586355AC5B26D83D313ED814577B34FABDFB8DBDDC09765DD485402C08373CCB2D02BE7CEE5E77C2770C1612AC63F |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.009007775775005 |
Encrypted: | false |
SSDEEP: | |
MD5: | B9B8F676A91794263BC7AE7BA3171402 |
SHA1: | 9573A4896637D6CE33D1AD69F30BE0B31385A639 |
SHA-256: | BE076E60DE241AFBDFB69DD34105D20797B293743AB33F5B250653DDE5B04193 |
SHA-512: | 8341690CBDACDDF33D9B1823AF022954C44B4E804BD7CE06422829E98106417E6D2A7F5F98AF0BFD61F63F6E83073DCDEB5603D35DB62A1B5D1800B717567021 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.015946184670139 |
Encrypted: | false |
SSDEEP: | |
MD5: | C825AE8288EFEA523170761B64BA8AD2 |
SHA1: | D41DC5BEF8DB56DC49B2673DFE91B2993CB5CC52 |
SHA-256: | 0C3AC83B662C6C30B52909B7CC093B0899AD8AA762A05E4562095713D9E38777 |
SHA-512: | A1A9F68872D1000DD516150BF00CD86D07E1E6EDF9B9F215580115ABF4553246E4D057803E907EA5D8A87EA43B6D21625538DEE2955C78930752F6CAA275FE4C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.00625224065284 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1347FFB7F71DB94C79851F3643084F08 |
SHA1: | 4A554B5B5E7A291553E659E7A06C2D2F211DE7D7 |
SHA-256: | D1923A6D94B2EF27E43578309BAFBEA2DA5B02B12A04D46403459D904742AED2 |
SHA-512: | 16DB788150FC55029CC5D54B4E16CEBA4A2F3512DB558FE89237775AF45795234560EDC744D0931FE343442BC0C6ACBA966D86A79560C237A662D48F92D4661F |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.993696147799033 |
Encrypted: | false |
SSDEEP: | |
MD5: | 167881708CDA0EF15E4BA46665E7B239 |
SHA1: | 900AC1192A51B29F302A11FEE977197D7F5AA43E |
SHA-256: | 0F4CF60FEA59F3131C8C31ABD858C76EF5D845BFAD1577DE9C4884671504D365 |
SHA-512: | 1F4E3A9B6DA2F79DC6483F500AA52253AB4EC87F875886E0FDC025444F07CF7AD01F0ADAED6FDED002E52A9289D7B2C857F7F7DAB948ACBE2F532F18BCCC35BA |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.008238143199276 |
Encrypted: | false |
SSDEEP: | |
MD5: | F71AFAE1AFFCD37574207822689545BF |
SHA1: | 01D34434B5FF5A1C1C74D898A98648DA92DA33C4 |
SHA-256: | 367BC3998D7610E71EBEA785417EBEA21E9E07B4606D4B24E65176B4F006273D |
SHA-512: | CFEB4197BC767820321334985B3B6BC01F8E2D2BB156F1D0E081C8516763942B0F61E895B5B30D87C7328A03AEFF11F195B99E460255E163B8BB52F619D21F27 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2407 |
Entropy (8bit): | 7.900400471609788 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9D372E951D45A26EDE2DC8B417AAE4F8 |
SHA1: | 84F97A777B6C33E2947E6D0BD2BFCFFEC601785A |
SHA-256: | 4E9C9141705E9A4D83514CEE332148E1E92126376D049DAED9079252FA9F9212 |
SHA-512: | 78F5AA71EA44FF18BA081288F13AD118DB0E1B9C8D4D321ED40DCAB29277BD171BBB25BA7514566BBD4E25EA416C066019077FAA43E6ED781A29ADB683D218E2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 121405 |
Entropy (8bit): | 4.434905513533929 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4580C107A86C85FF4865AEE3B6206980 |
SHA1: | 6E23CE4B73E53B1D86304B8560E954308D957358 |
SHA-256: | 0118D27E818774350CFCB53CA69BF30B89BD41A4B1E78FF4B25931E6E7574470 |
SHA-512: | 8D3AD904CE857BE110E8F926A2EB31D8477F139E03E6AC3DE39FEBE3F5052555BEA4FE9DB9C2C5B096E66C090DB65A7AE0485E9163E6B604A1ACE58F8BF9326A |
Malicious: | false |
Reputation: | unknown |
URL: | https://fiveradio-newbam.com/jssp.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1435 |
Entropy (8bit): | 7.8613342322590265 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9F368BC4580FED907775F31C6B26D6CF |
SHA1: | E393A40B3E337F43057EEE3DE189F197AB056451 |
SHA-256: | 7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36 |
SHA-512: | 0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0 |
Malicious: | false |
Reputation: | unknown |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1636 |
Entropy (8bit): | 4.214613323368661 |
Encrypted: | false |
SSDEEP: | |
MD5: | F7AB697E65B83CE9870A4736085DEEEC |
SHA1: | 5FF40BFF26B523FBBEAA5228A2AAC63E44AFAA90 |
SHA-256: | CBB3706E65B35A43BDCFEBD23B5479DC0542CA7E23197869B683D12B524472FE |
SHA-512: | 158874143CE65485348813431BB585227772F315234E08158A329DF98319AA5F1DB21DEF2AD7CAA5C25AD11660E7D4E05158CFA1198913A33B1B91676C4CA402 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9489 |
Entropy (8bit): | 7.832401214573246 |
Encrypted: | false |
SSDEEP: | |
MD5: | F80D441859CEB9AAEC300FC0D41FCA85 |
SHA1: | 596C6691761E264E04745EDD4810AF343CDEF3ED |
SHA-256: | 48273EC7955DE6B58E1CCBE7525DEA9AD4CA5373F61EDE3042D4722D0DB7BE92 |
SHA-512: | BBE0FC430BE0458B8DE1E435C91CBD4B0188B7EB19C37EA3566FD3D35B32EA64C4C6CBB4A70157A17D9FDBBA3BB248CA9D5BA1A129220DD5EA4AE58E13CAF83C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1246 |
Entropy (8bit): | 7.808846010085192 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0B0D324D8294AB9E1C36EFACB6276980 |
SHA1: | B7599E4CDD88F31A4A56C610D3E86223D95BAAE0 |
SHA-256: | 0FE6AA8A56A4B66BA0B2D23C8AF6F1F94A894E5525C5E193C7FD70EF05A7E5E6 |
SHA-512: | C08A4BBDB1F2ACB74FAD8B2B51CD0E3343D38959153A62FD5E98B4591548E92344131C9ABFC742B3E51FCAE5D8FE8C98032B9EB5D2039690598B0E825093436B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23427 |
Entropy (8bit): | 5.112735417225198 |
Encrypted: | false |
SSDEEP: | |
MD5: | BA0537E9574725096AF97C27D7E54F76 |
SHA1: | BD46B47D74D344F435B5805114559D45979762D5 |
SHA-256: | 4A7611BC677873A0F87FE21727BC3A2A43F57A5DED3B10CE33A0F371A2E6030F |
SHA-512: | FC43F1A6B95E1CE005A8EFCDB0D38DF8CC12189BEAC18099FD97C278D254D5DA4C24556BD06515D9D6CA495DDB630A052AEFC0BB73D6ED15DEBC0FB1E8E208E7 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.w3schools.com/w3css/4/w3.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2228 |
Entropy (8bit): | 7.82817506159911 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF9941290C50CD3866E2BA6B793F010D |
SHA1: | 4736508C795667DCEA21F8D864233031223B7832 |
SHA-256: | 1B9EFB22C938500971AAC2B2130A475FA23684DD69E43103894968DF83145B8A |
SHA-512: | A0C69C70117C5713CAF8B12F3B6E8BBB9CDAF72768E5DB9DB5831A3C37541B87613C6B020DD2F9B8760064A8C7337F175E7234BFE776EEE5E3588DC5662419D9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41 |
Entropy (8bit): | 4.180365114215879 |
Encrypted: | false |
SSDEEP: | |
MD5: | 64E1C1EB9F4CAF0CF0E7484D7AFCEDB9 |
SHA1: | 69E40D8C48A866A84046FD8BD17AF47FF02B79A4 |
SHA-256: | 8ACAC48BC106C4EAE580C08071597F9DAFAB96D959DEFF65BEC44514DA907B1D |
SHA-512: | F109767D57E85127D18B1AD2030A48C0EAD69F79A15C4008712407B1F62691654B74C9D6E225FFDC4A922847EABB928DC7520A656C7081B585124CF678B54E59 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 276 |
Entropy (8bit): | 7.316609873335077 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4E3510919D29D18EEB6E3E8B2687D2F5 |
SHA1: | 31522A9EC576A462C3F1FFA65C010D4EB77E9A85 |
SHA-256: | 1707BE1284617ACC0A66A14448207214D55C3DA4AAF25854E137E138E089257E |
SHA-512: | DFAD29E3CF9E51D1749961B47382A5151B1F3C98DEABF2B63742EB6B7F7743EE9B605D646A730CF3E087D4F07E43107C8A01FF5F68020C7BF933EBA370175682 |
Malicious: | false |
Reputation: | unknown |
URL: | https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 199 |
Entropy (8bit): | 6.766983163126765 |
Encrypted: | false |
SSDEEP: | |
MD5: | 21B761F2B1FD37F587D7222023B09276 |
SHA1: | F7A416C8907424F9A9644753E3A93D4D63AE640E |
SHA-256: | 72D4161C18A46D85C5566273567F791976431EFEF49510A0E3DD76FEC92D9393 |
SHA-512: | 77745F60804D421B34DE26F8A216CEE27C440E469FD786A642757CCEDBC4875D5196431897D80137BD3E20B01104BA76DEC7D8E75771D8A9B5F14B66F2A9B7C0 |
Malicious: | false |
Reputation: | unknown |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_sms_12b7d768ba76f2e782cc74e328171091.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 45806 |
Entropy (8bit): | 5.207605835316031 |
Encrypted: | false |
SSDEEP: | |
MD5: | 80F5B8C6A9EEAC15DE93E5A112036A06 |
SHA1: | F7174635137D37581B11937FC90E9CB325077BCE |
SHA-256: | 0401DE33701F1CAD16ECF952899D23990B6437D0A5B7335524EDF6BDFB932542 |
SHA-512: | B976A5F02202439D94C6817D037C813FA1945C6BB93762284D97FF61718C5B833402F372562034663A467FDBAA46990DE24CB1E356392340E64D034E4BA1B4E4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdn.socket.io/4.6.0/socket.io.min.js |
Preview: |
File type: | |
Entropy (8bit): | 5.082385036708021 |
TrID: |
|
File name: | Budget_Statement.htm |
File size: | 14'299 bytes |
MD5: | 7dd1feea1a6afa708810f8bee8a70723 |
SHA1: | 6d35dc6467437f1c11f9b185cbbe7bbfe33b7234 |
SHA256: | 8f465b2911f4d8989223c62ca0f1fd490aa391c17d58cf52030e58f20bc25031 |
SHA512: | a228fb83a71ef1b80c88e86f76bf4c64276de335b3dea53f9744691ec7f68030dfba623c8a9ceb9c9b69a0aa89bfc870edcbbcec424afe5c0d03bdd77b6a217e |
SSDEEP: | 384:EkXrQK9/JaMtvEib2UT/Yz19TZWTIiIuY4nBlAV0R5RqcHPd4Cu2DIMLb:ZrQK9/JaMtvEi6+/Yz19TZWHY4nBlAVG |
TLSH: | B552114429C1784493BBBB65BA5BA4E8FB6601A353C01413786C7C906FFDD1CE8C2E78 |
File Content Preview: | <!DOCTYPE html>..<html point="aHR0cHM6Ly9maXZlcmFkaW8tbmV3YmFtLmNvbQ==" id="html" sti="VlZORlVqSXlNRFV5TURJMFZVNUpVVlZGTURrek16QTFNakkxTmpJd01qUXlNREkwTURVeU1qTXpNRGsxTmc9PQ==" vic="[EMail]" lang="en">....<head>....</head>....<body id="allbody">.. |
Icon Hash: | 173149cccc490307 |