Edit tour

Windows Analysis Report
http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm

Overview

General Information

Sample URL:http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm
Analysis ID:1461780

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 7068 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1876 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1952,i,556562540619716955,10505612655687459295,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: http://stats.infocfe.cfe.frLLM: Score: 7 brands: CFE Reasons: The URL 'http://stats.infocfe.cfe.fr' is suspicious because it uses a subdomain 'stats.infocfe' which is not commonly associated with the legitimate domain 'cfe.fr'. The page contains social engineering techniques, such as urging the user to click on a link to 'CONSULTEZ LE GUIDE SPECIAL CARTE VITALE' and providing instructions to log in to 'MON COMPTE CFE'. These elements are typical of phishing attempts. The legitimate domain for CFE is 'cfe.fr', and the use of an unfamiliar subdomain increases the risk. Additionally, the page does not have a login form or captcha, which are often present on legitimate sites for security purposes. DOM: 0.0.pages.csv
Source: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmHTTP Parser: No favicon
Source: https://www.cfe.fr/documents/310024/480581/Guide_special_creationcarteVitale.pdf/bbc7cbd0-64ec-dc13-87d6-eae08cb0477d?t=1623763485726&utm_campaign=envoicartevitale&utm_source=adherent&utm_medium=mailHTTP Parser: No favicon
Source: file:///C:/Users/user/Downloads/downloaded.pdfHTTP Parser: No favicon
Source: file:///C:/Users/user/Downloads/downloaded.pdfHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.130
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.130
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.130
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Mon, 24 Jun 2024 15:18:14 GMTContent-Type: text/html; charset=utf-8Content-Length: 4720Connection: keep-aliveCache-Control: privateContent-Encoding: gzipVary: Accept-EncodingAccess-Control-Allow-Origin: *Data Raw: 1f 8b 08 00 00 00 00 00 04 00 ed bd 07 60 1c 49 96 25 26 2f 6d ca 7b 7f 4a f5 4a d7 e0 74 a1 08 80 60 13 24 d8 90 40 10 ec c1 88 cd e6 92 ec 1d 69 47 23 29 ab 2a 81 ca 65 56 65 5d 66 16 40 cc ed 9d bc f7 de 7b ef bd f7 de 7b ef bd f7 ba 3b 9d 4e 27 f7 df ff 3f 5c 66 64 01 6c f6 ce 4a da c9 9e 21 80 aa c8 1f 3f 7e 7c 1f 3f 22 1e ff ae 4f bf 3c 79 f3 fb bc 3c 4d bf fd e6 8b e7 e9 cb af 9e 3c 3f 3b 49 3f da be 7b f7 bb f7 4e ee de 7d fa e6 69 fa 7b f3 37 bb e3 9d f4 4d 9d 2d 9b a2 2d aa 65 56 de bd 7b fa e2 a3 df 38 49 3f 9a b7 ed ea d1 dd bb 57 57 57 e3 ab 7b e3 aa be b8 fb e6 d5 dd 77 f3 76 51 ee e2 75 fd 75 bb f5 de 1d cf da d9 47 47 bf 71 f2 18 5f a5 ef 16 e5 b2 f9 2c 02 67 f7 e1 c3 87 f2 ba 34 ce b3 19 fd 4c 1f b7 45 5b e6 47 a7 8b ac 28 8b e5 c5 ef 3f cd ea 36 ff fd 2f 8b 36 2b f3 57 79 99 2d a7 f9 2c 5f 55 ed 6a 5e b5 d5 ef bf b7 b3 b7 ff f8 ae bc 82 97 17 79 9b a5 e8 6b 3b ff 45 eb e2 f2 b3 8f 4e aa 65 9b 2f db ed 37 d7 ab fc a3 74 2a 7f 7d f6 51 9b bf 6b ef a2 ef c3 74 3a cf ea 26 6f 3f fb ea cd b3 ed 83 8f d2 bb 71 38 bf f7 f6 57 c7 db 27 d5 62 95 b5 c5 a4 f4 41 9d 9d 7e 96 cf 2e e8 93 81 37 4f 8e 4f be 7d ba 7d f2 e5 8b 37 af be 7c ee bd f7 e2 cb 6d fe 6a f0 c5 d3 df fb e5 d9 ab d3 d7 de 2b 3b d2 f6 c7 6c f3 65 b6 c8 3f fb e8 b2 c8 af 56 55 dd 7a 2d af 8a 59 3b ff 6c 96 5f 16 d3 7c 9b ff 18 a5 c5 92 26 28 2b b7 9b 29 91 f2 33 9a 71 0f 5a d3 5e 0b 05 c7 af 68 1e be 68 2e 9e 54 b3 eb f4 17 d3 07 fc f2 a3 74 77 67 e7 77 3f a4 3f 7f c9 6f 9c d0 bf e3 d3 77 6d 5e d3 5c 9f 94 59 d3 0c b6 fb b1 4e bb 6f a1 e5 8f fd 18 cd 6b be 3d cf 8b 8b 79 4b 2f ec ed fc ee e9 ef 5a 2c 30 80 6c d9 d2 bb 3f c6 ef a6 2b 34 4e 17 59 7d 51 2c b7 db 6a f5 28 dd a1 2f cd 07 93 aa 6d ab 85 7c f6 63 3f 36 ad ca aa 7e 94 fe f8 0e 9e 5d fa 08 fd ff d8 8f d1 d0 7e 0c 93 3c 4a 27 3a 9c 1f fb b1 73 22 d1 f6 79 b6 28 ca eb 47 e9 4f e6 f5 2c 5b 66 a3 e3 9a 08 33 fa 76 5e 5e e6 6d 31 cd 46 0d 71 f3 76 93 d7 c5 39 c1 fa b1 1f 93 3e a5 b3 74 95 cd 66 c4 98 f2 97 c2 6b 8a 1f e4 18 ca ea 1d 7f 16 0e 70 bc bf 77 70 ff c1 ee fe 3d fe ce a0 fa e0 d3 83 7b 0f 1f f2 47 db 57 f9 e4 6d d1 6e 83 29 19 d4 76 36 fb e9 75 83 77 85 9a a0 08 c6 d2 66 c4 7a 32 8c 49 55 cf f2 7a bb 59 65 53 87 8c 34 4b 33 34 49 19 da 2c 9f 56 35 b1 6c 45 d8 2f ab 65 8e 56 06 85 62 39 a7 11 82 e2 4c 2d fa df 98 10 7f fb d5 92 00 d3 2f da 51 0f cc da 7c 4f 2f a2 47 7a bd 58 5c a0 31 51 19 48 09 32 0a 33 65 9c c7 f4 ef b6 30 67 be ae b9 ad 21 4f b6 6e 2b 34 57 b2 ca 4c ef de 67 4a da 0f 6b 69 bb 13 7e 6a 78 a0 db ba cc cf 5d 63 42 03 ff a5 bf e7 22 9f 15 59 da 4c eb 3c 5f a6 d9 72 96 6e 2d b2 77 22 1b 8f d2 4f ef 53 f3 3b 82 58 c0 30 e9 8d 93 93 fa 1c 40 1f 85 cc ec cb 45 e7 9b 61 ae 12 a4 85 74 69 5b a7 ed 8c 51 f1 49 d6 81 e5 bd 00 5a 73 f3 e1 9e 37
Source: global trafficHTTP traffic detected: GET /m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /o/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/o.jpg HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmAccept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /clients/73720bba57a9459aa4fa782d8152663a/d3dda32d0e7c470eab4089ddd179cc67/0d0f529e9ace454c8ca01806617f275c.jpg HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmAccept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /o/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/o.jpg HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmAccept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /l/72638357/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm HTTP/1.1Host: stats.infocfe.cfe.frConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmAccept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: stats.infocfe.cfe.fr
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: www.cfe.fr
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@23/8@10/106
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1952,i,556562540619716955,10505612655687459295,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1952,i,556562540619716955,10505612655687459295,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://stats.infocfe.cfe.fr/clients/73720bba57a9459aa4fa782d8152663a/d3dda32d0e7c470eab4089ddd179cc67/0d0f529e9ace454c8ca01806617f275c.jpg0%Avira URL Cloudsafe
http://stats.infocfe.cfe.fr/o/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/o.jpg0%Avira URL Cloudsafe
http://stats.infocfe.cfe.fr/favicon.ico0%Avira URL Cloudsafe
file:///C:/Users/user/Downloads/downloaded.pdf0%Avira URL Cloudsafe
http://stats.infocfe.cfe.fr/l/72638357/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.cfe.fr
212.81.102.18
truefalse
    unknown
    stats.wewmanager.com
    185.174.54.25
    truefalse
      unknown
      www.google.com
      142.250.186.132
      truefalse
        unknown
        stats.infocfe.cfe.fr
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://stats.infocfe.cfe.fr/l/72638357/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmtrue
          • Avira URL Cloud: safe
          unknown
          file:///C:/Users/user/Downloads/downloaded.pdffalse
          • Avira URL Cloud: safe
          unknown
          http://stats.infocfe.cfe.fr/o/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/o.jpgtrue
          • Avira URL Cloud: safe
          unknown
          https://www.cfe.fr/documents/310024/480581/Guide_special_creationcarteVitale.pdf/bbc7cbd0-64ec-dc13-87d6-eae08cb0477d?t=1623763485726&utm_campaign=envoicartevitale&utm_source=adherent&utm_medium=mailfalse
            unknown
            http://stats.infocfe.cfe.fr/clients/73720bba57a9459aa4fa782d8152663a/d3dda32d0e7c470eab4089ddd179cc67/0d0f529e9ace454c8ca01806617f275c.jpgtrue
            • Avira URL Cloud: safe
            unknown
            http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htmtrue
              unknown
              http://stats.infocfe.cfe.fr/favicon.icotrue
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              142.250.185.78
              unknownUnited States
              15169GOOGLEUSfalse
              212.81.102.18
              www.cfe.frUnited Kingdom
              3257GTT-BACKBONEGTTDEfalse
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              142.250.74.206
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.186.163
              unknownUnited States
              15169GOOGLEUSfalse
              185.174.54.25
              stats.wewmanager.comFrance
              61217DOLIST-ASFRfalse
              142.250.186.132
              www.google.comUnited States
              15169GOOGLEUSfalse
              74.125.71.84
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.184.227
              unknownUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.16
              192.168.2.4
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1461780
              Start date and time:2024-06-24 17:17:41 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Sample URL:http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:14
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal48.phis.win@23/8@10/106
              • Exclude process from analysis (whitelisted): svchost.exe
              • Excluded IPs from analysis (whitelisted): 142.250.186.163, 142.250.185.78, 74.125.71.84, 34.104.35.123
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm
              InputOutput
              URL: http://stats.infocfe.cfe.fr/m/HIoZvQaF4bS05jNZfVV28WzubYZIcoMeJzVcOqHAUVZVt9bNZ8vGOcDL_2bZ_2b8dMNV/i.htm Model: Perplexity: mixtral-8x7b-instruct
              {"loginform": true,"urgency": true,"captcha": false,"reasons": ["The webpage contains a login form which requests sensitive information such as an identifer (social security number) and password.","The text creates a sense of urgency by stating that the user is eligible for the service and has not completed the necessary steps to obtain their card, and by prompting the user to check their personal space."]}
              Title: Emailing_carte_vitaleRelancedepotphoto_2024 OCR: SERVICE CARTE VITALE Bonjour, Flicitations, vous tes lipible notre service carte Vitale ! Vous avez recu un mail vous invitant dposer sur votre espace personnel une photo et une pice d'identit afin de pouvoir procder la creation de votre carte. ce jour, nous constatons que vous n'avez pas effectu les dmarches ncessaires pour obtenir votre carte Vitale et nous souhaitons vous accompagner au mieux dans l'utilisation de ce service. Vous n'avez pas recu de communication concernant votre carte Vitale ? Rendez-vous dans votre espace personnel et dposez les pieces dans la rubrique x Mes remboursements 1. Aller sur la page www.cfe.fr, cliquer sur "MON COMPTE CFE" Renseipner votre identifiant (il slagit du numro de Scurit Sociale sur 13 caractres, soit les 13 premiers chiffres sauf la clef) Renseipner votre mot de passe. Si vous ne vous rappelez plus du mot de passe, vous pouvez excuter la procdure de mot de passe oubli. Vous recevrez un mail valable 24h pour rinitialiser votre mot de passe. Vous avez des doutes sur la procdure et les avantages de la carte Vitale ? CONSULTEZ LE GUIDE SPECIAL CARTE VITALE Toutes nos quipes sont votre coute pour rpondre toutes vos questions. Contactez-nous des tso rue - cs 70238 - 77052 MELON CEDEX. 64 62 62 pour plus de 
              URL: http://stats.infocfe.cfe.fr Model: gpt-4o
              ```json{  "phishing_score": 7,  "brands": "CFE",  "phishing": true,  "suspicious_domain": true,  "has_loginform": false,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": true,  "legitmate_domain": "cfe.fr",  "reasons": "The URL 'http://stats.infocfe.cfe.fr' is suspicious because it uses a subdomain 'stats.infocfe' which is not commonly associated with the legitimate domain 'cfe.fr'. The page contains social engineering techniques, such as urging the user to click on a link to 'CONSULTEZ LE GUIDE SPECIAL CARTE VITALE' and providing instructions to log in to 'MON COMPTE CFE'. These elements are typical of phishing attempts. The legitimate domain for CFE is 'cfe.fr', and the use of an unfamiliar subdomain increases the risk. Additionally, the page does not have a login form or captcha, which are often present on legitimate sites for security purposes."}
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 24 14:18:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2673
              Entropy (8bit):3.9846988436853334
              Encrypted:false
              SSDEEP:
              MD5:8D606D0B13AAD8F177433107416E59CB
              SHA1:2AA2CD6B5ECBA62494E982773D94A9616322A525
              SHA-256:B1CA495BFCF5C30771F7AB3B81030CFA36EBA28701E5D67A8463A731975F23FF
              SHA-512:851E80C2DF87C41FB32347AD547EDE8F3B9F155370E7E20AD7D5EDBFC49399245080314C2E5572686109703745FF74AE48D813048B3D245D405DE4254ABA8BA8
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....N...I...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X=z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XHz....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XHz....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XHz..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XJz...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........N=0g.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 24 14:18:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2675
              Entropy (8bit):4.0059332726836985
              Encrypted:false
              SSDEEP:
              MD5:D9F30109EFF425AB295DD3BFE1D07FE8
              SHA1:8908FEF90AD9C5A2ECDCA4F06313D08F793D238F
              SHA-256:380865825D7FFABC8A524E9B28BED5607185E304E7D20C3B254AFA21FEBE4690
              SHA-512:1DEC935416B2E94F27F7FE7394FC4F007B3C2E5BCAF5AC9CD8A17E39F0436E3CF0D2B5DFD0D35422BE8082645501DD39D657DAD167AF13CADDEE123E58021D7B
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.......I...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X=z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XHz....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XHz....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XHz..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XJz...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........N=0g.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2689
              Entropy (8bit):4.008870599783097
              Encrypted:false
              SSDEEP:
              MD5:CDC49EA35BA460988BF79330BE4A091C
              SHA1:6D9D610B7F99E593A56381CE2D84F748FDCC85B5
              SHA-256:EEB8CDDD7B42B5033B2B19F85C7E25EB9B6B2A05BAC5868AF2BE05EAE220CED2
              SHA-512:9FF811A49980ACF5AD7CB93EB8932D495783440AEE24B9DE4B2FB27DD0E672B21FCB698BD207204FDCD4E094C66DC3A626F46039DE04D65EC278E0D15327BD6B
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X=z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XHz....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XHz....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XHz..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........N=0g.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 24 14:18:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):4.000453632021325
              Encrypted:false
              SSDEEP:
              MD5:11BA1C309EED82007863296C454E7C0B
              SHA1:5FAF8BF6270C924504DD473B1162156EB9B6A5D9
              SHA-256:A6DBAF52EECFC148C773E33D0358E8D50333F27F8EC003252D9932DE4647612C
              SHA-512:45F62C3396BE004FA77B8A6C413205C3F395EFCC9E7C9D8C265F413E2A21C25EEC3D4EEB09499B74B29328705AAB576CB538F31510E57B67BE1542599B038F5F
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....yb.I...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X=z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XHz....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XHz....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XHz..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XJz...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........N=0g.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 24 14:18:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.9912533524301375
              Encrypted:false
              SSDEEP:
              MD5:D6921C4EA02E202C80AEC62360D5C94A
              SHA1:60F7EB5C6B50DDAF39E739D3EB65AEA5B5116601
              SHA-256:2A8F0953D7F624A18EF305519A9B8C8444DEE167C2861B3015350A58B73D171E
              SHA-512:12FDE384B9042AF7FEE8C1E88D64846F4736A8BC34A7F967FAE5D17315BFE9891D3F7B0D1D9479B91022C8603B28CDB038CED92796DC4D2D2188D2FD49BA91D8
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....v..I...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X=z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XHz....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XHz....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XHz..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XJz...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........N=0g.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jun 24 14:18:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2679
              Entropy (8bit):3.998467261492193
              Encrypted:false
              SSDEEP:
              MD5:9B06A681A5CCB6A3717F25842C7122EB
              SHA1:8F29F4EEF9DF99D2ACDD4517B57D36C8F455E3DC
              SHA-256:5BF5E486C0B5064764FD8FC07DA6FE6912CE8E1BC31DFDAB07E70FF5F31BAAD4
              SHA-512:A5EB1217F4E1E2C22677F5AAE40A2DED67F77A039DAA7A1EBCACEBCFCDBBF1674DAE7F472226AA5B9FBA449B4D71AAEAC27041C7424DB69110F36FD5F7B31559
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....n..I...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X=z....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XHz....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XHz....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XHz..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XJz...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........N=0g.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:PDF document, version 1.4
              Category:dropped
              Size (bytes):2383
              Entropy (8bit):4.362953432075665
              Encrypted:false
              SSDEEP:
              MD5:EB01E8222AE1C46E73F2BCC1B43B98F2
              SHA1:5EB3AB1971A22F7F4EF3876DF49A32FDAB49617E
              SHA-256:571BEAE23A40796CFC4A2C691553B9D48EBDF0913F5FD4D220B1F8A920C87FEA
              SHA-512:86F369F709D7DED99717A6ADB2C99D1C0793A0B4A752930E1CE79442A0CFF6B43013A66D9CAC22D8A627A77E312C95C950162E4F909E0DF20A2EFCA09A6D49A7
              Malicious:false
              Reputation:unknown
              Preview:%PDF-1.4.%......93 0 obj.<</Linearized 1/L 439287/O 95/E 299739/N 2/T 437307/H [ 1976 396]>>.endobj. ..xref..93 84..0000000016 00000 n..0000002372 00000 n..0000002483 00000 n..0000003768 00000 n..0000003950 00000 n..0000004692 00000 n..0000005135 00000 n..0000005860 00000 n..0000005910 00000 n..0000005960 00000 n..0000006010 00000 n..0000006060 00000 n..0000006110 00000 n..0000006224 00000 n..0000006336 00000 n..0000006614 00000 n..0000006911 00000 n..0000007174 00000 n..0000007743 00000 n..0000008019 00000 n..0000008613 00000 n..0000009549 00000 n..0000010235 00000 n..0000010397 00000 n..0000010668 00000 n..0000011200 00000 n..0000011883 00000 n..0000012833 00000 n..0000013506 00000 n..0000014492 00000 n..0000014632 00000 n..0000014776 00000 n..0000015888 00000 n..0000016977 00000 n..0000017867 00000 n..0000018819 00000 n..0000019279 00000 n..0000031504 00000 n..0000042824 00000 n..0000055557 00000 n..0000056084 00000 n..0000056557 00000 n..0000057000 00000 n..0000057510
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:PDF document, version 1.4, 2 pages
              Category:dropped
              Size (bytes):0
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:
              MD5:F7AAD2D51E640826438E9D1316B06E3C
              SHA1:15F0DB07AEF9DB6BA6CFEE75499734802678E08D
              SHA-256:CED49D7A2BF27ECFC5654788CF823C579C4EBF004EF878FFA27D5B2320FA74AF
              SHA-512:BA68D17BEA1A8D6E3C3B81388CEB09226225DBE8D164990E43F941A63DECB16C2D30E64A3C775BB883523C9C34E4C9B23354A9D411E7AE9C0E2A9381732271FC
              Malicious:false
              Reputation:unknown
              Preview:%PDF-1.4.%......93 0 obj.<</Linearized 1/L 439287/O 95/E 299739/N 2/T 437307/H [ 1976 396]>>.endobj. ..xref..93 84..0000000016 00000 n..0000002372 00000 n..0000002483 00000 n..0000003768 00000 n..0000003950 00000 n..0000004692 00000 n..0000005135 00000 n..0000005860 00000 n..0000005910 00000 n..0000005960 00000 n..0000006010 00000 n..0000006060 00000 n..0000006110 00000 n..0000006224 00000 n..0000006336 00000 n..0000006614 00000 n..0000006911 00000 n..0000007174 00000 n..0000007743 00000 n..0000008019 00000 n..0000008613 00000 n..0000009549 00000 n..0000010235 00000 n..0000010397 00000 n..0000010668 00000 n..0000011200 00000 n..0000011883 00000 n..0000012833 00000 n..0000013506 00000 n..0000014492 00000 n..0000014632 00000 n..0000014776 00000 n..0000015888 00000 n..0000016977 00000 n..0000017867 00000 n..0000018819 00000 n..0000019279 00000 n..0000031504 00000 n..0000042824 00000 n..0000055557 00000 n..0000056084 00000 n..0000056557 00000 n..0000057000 00000 n..0000057510
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:PDF document, version 1.4, 2 pages
              Category:dropped
              Size (bytes):439287
              Entropy (8bit):7.885246777714484
              Encrypted:false
              SSDEEP:
              MD5:F7AAD2D51E640826438E9D1316B06E3C
              SHA1:15F0DB07AEF9DB6BA6CFEE75499734802678E08D
              SHA-256:CED49D7A2BF27ECFC5654788CF823C579C4EBF004EF878FFA27D5B2320FA74AF
              SHA-512:BA68D17BEA1A8D6E3C3B81388CEB09226225DBE8D164990E43F941A63DECB16C2D30E64A3C775BB883523C9C34E4C9B23354A9D411E7AE9C0E2A9381732271FC
              Malicious:false
              Reputation:unknown
              Preview:%PDF-1.4.%......93 0 obj.<</Linearized 1/L 439287/O 95/E 299739/N 2/T 437307/H [ 1976 396]>>.endobj. ..xref..93 84..0000000016 00000 n..0000002372 00000 n..0000002483 00000 n..0000003768 00000 n..0000003950 00000 n..0000004692 00000 n..0000005135 00000 n..0000005860 00000 n..0000005910 00000 n..0000005960 00000 n..0000006010 00000 n..0000006060 00000 n..0000006110 00000 n..0000006224 00000 n..0000006336 00000 n..0000006614 00000 n..0000006911 00000 n..0000007174 00000 n..0000007743 00000 n..0000008019 00000 n..0000008613 00000 n..0000009549 00000 n..0000010235 00000 n..0000010397 00000 n..0000010668 00000 n..0000011200 00000 n..0000011883 00000 n..0000012833 00000 n..0000013506 00000 n..0000014492 00000 n..0000014632 00000 n..0000014776 00000 n..0000015888 00000 n..0000016977 00000 n..0000017867 00000 n..0000018819 00000 n..0000019279 00000 n..0000031504 00000 n..0000042824 00000 n..0000055557 00000 n..0000056084 00000 n..0000056557 00000 n..0000057000 00000 n..0000057510
              No static file info