Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://lnkd.in/e4hHCn_z

Overview

General Information

Sample URL:https://lnkd.in/e4hHCn_z
Analysis ID:1466326

Detection

HTMLPhisher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site or detected (based on various text indicators)
Detected non-DNS traffic on DNS port
HTML body contains low number of good links
HTML body contains password input but no form action
HTML body with high number of embedded images detected
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7056 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://lnkd.in/e4hHCn_z MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5972 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1912,i,8533542759480149701,15470978331257409754,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
4.6.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    4.7.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      4.8.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        Phishing

        barindex
        Source: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.comLLM: Score: 9 brands: Microsoft, Adobe Reasons: The URL 'https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com' is highly suspicious. It uses a long and complex subdomain structure, which is a common tactic in phishing attacks to obscure the true domain. The domain 'linodeobjects.com' is not associated with Microsoft or Adobe, which are the brands displayed on the page. The page prominently asks for a Microsoft email address for 'document verification,' which is a common phishing tactic to harvest credentials. There is no CAPTCHA present, which is often used on legitimate sites to prevent automated attacks. The combination of these factors strongly suggests that this is a phishing site. DOM: 3.4.pages.csv
        Source: Yara matchFile source: 4.6.pages.csv, type: HTML
        Source: Yara matchFile source: 4.7.pages.csv, type: HTML
        Source: Yara matchFile source: 4.8.pages.csv, type: HTML
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caMatcher: Found strong image similarity, brand: MICROSOFT
        Source: Chrome DOM: 1.2OCR Text: 1 OneDrive for Business James Brandon shared a folder with you. Here's the folder James Brandon with you. You Have received (2) documents for your review. This message was sent to you to protect sensitive information. Date created: 02/07/2024 07:30 AM Size | 2.3 MB.Expiryl 11/07/2024 Ref: Review Shared Dcxuments from James Brandon "Click View and Print Online" To this file "cEck nd printonline" Download the app for Windows
        Source: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.htmlHTTP Parser: Number of links: 0
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: Number of links: 0
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: <input type="password" .../> found but no <form action="...
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: Total embedded image size: 18628
        Source: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.htmlHTTP Parser: Title: Verification Defender Associate does not match URL
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: Title: Sign in to Best Productivity Provider does not match URL
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: <input type="password" .../> found
        Source: https://media.licdn.com/dms/document/media/D4E1FAQEDaJIjLoNB4w/feedshare-document-pdf-analyzed/0/1719937496280?e=1720656000&v=beta&t=q1HtF8i6CbMgQJuq27L8FMsMuj5igRN7psHVGlSB4PQHTTP Parser: No favicon
        Source: file:///C:/Users/user/Downloads/downloaded.pdfHTTP Parser: No favicon
        Source: file:///C:/Users/user/Downloads/downloaded.pdfHTTP Parser: No favicon
        Source: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.htmlHTTP Parser: No favicon
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No favicon
        Source: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.htmlHTTP Parser: No <meta name="author".. found
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No <meta name="author".. found
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No <meta name="author".. found
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No <meta name="author".. found
        Source: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.htmlHTTP Parser: No <meta name="copyright".. found
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No <meta name="copyright".. found
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No <meta name="copyright".. found
        Source: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.caHTTP Parser: No <meta name="copyright".. found
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49716 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:49718 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:58353 version: TLS 1.2
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58344 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.16:58369 -> 1.1.1.1:53
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
        Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: lnkd.in
        Source: global trafficDNS traffic detected: DNS query: media.licdn.com
        Source: global trafficDNS traffic detected: DNS query: www.google.com
        Source: global trafficDNS traffic detected: DNS query: document-display-verifycation-download-pdf.us-east-1.linodeobjects.com
        Source: global trafficDNS traffic detected: DNS query: 4454275f.rwnbqwuligbumyzvpodsthfkaftacy.pages.dev
        Source: global trafficDNS traffic detected: DNS query: new-pdf-document-approval.us-lax-1.linodeobjects.com
        Source: global trafficDNS traffic detected: DNS query: a9d041c33434.wazo-biawalkeks.ru
        Source: global trafficDNS traffic detected: DNS query: openfpcdn.io
        Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
        Source: global trafficDNS traffic detected: DNS query: code.jquery.com
        Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58356 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58381 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58379 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58371 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58387
        Source: unknownNetwork traffic detected: HTTP traffic on port 58362 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58383
        Source: unknownNetwork traffic detected: HTTP traffic on port 58385 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58386
        Source: unknownNetwork traffic detected: HTTP traffic on port 58366 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58385
        Source: unknownNetwork traffic detected: HTTP traffic on port 58359 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58347 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58380
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58382
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58381
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58355 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58382 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58347
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58349
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58355
        Source: unknownNetwork traffic detected: HTTP traffic on port 58365 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58354
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58357
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58356
        Source: unknownNetwork traffic detected: HTTP traffic on port 58386 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58353
        Source: unknownNetwork traffic detected: HTTP traffic on port 58361 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58354 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58358 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58383 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58359
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58358
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58366
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58365
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58368
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58362
        Source: unknownNetwork traffic detected: HTTP traffic on port 58368 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58361
        Source: unknownNetwork traffic detected: HTTP traffic on port 58387 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58364 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58364
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58363
        Source: unknownNetwork traffic detected: HTTP traffic on port 58360 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58360
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
        Source: unknownNetwork traffic detected: HTTP traffic on port 58353 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 58378 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58380 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58357 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58349 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 58370 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58379
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58378
        Source: unknownNetwork traffic detected: HTTP traffic on port 58363 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
        Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58371
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58370
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49716 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:49718 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:58353 version: TLS 1.2
        Source: classification engineClassification label: mal64.phis.win@25/8@28/207
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://lnkd.in/e4hHCn_z
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1912,i,8533542759480149701,15470978331257409754,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1912,i,8533542759480149701,15470978331257409754,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        Registry Run Keys / Startup Folder
        1
        Process Injection
        3
        Masquerading
        OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Registry Run Keys / Startup Folder
        1
        Process Injection
        LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        https://lnkd.in/e4hHCn_z0%Avira URL Cloudsafe
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        file:///C:/Users/user/Downloads/downloaded.pdf0%Avira URL Cloudsafe
        about:blank0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        lnkd.in
        13.107.42.14
        truefalse
          unknown
          openfpcdn.io
          18.239.83.87
          truefalse
            unknown
            a9d041c33434.wazo-biawalkeks.ru
            104.21.44.57
            truefalse
              unknown
              a.nel.cloudflare.com
              35.190.80.1
              truefalse
                unknown
                4454275f.rwnbqwuligbumyzvpodsthfkaftacy.pages.dev
                188.114.97.3
                truefalse
                  unknown
                  code.jquery.com
                  151.101.130.137
                  truefalse
                    unknown
                    cdnjs.cloudflare.com
                    104.17.25.14
                    truefalse
                      unknown
                      s-part-0017.t-0009.t-msedge.net
                      13.107.246.45
                      truefalse
                        unknown
                        cs1404.wpc.epsiloncdn.net
                        152.199.21.118
                        truefalse
                          unknown
                          www.google.com
                          142.250.186.132
                          truefalse
                            unknown
                            s-part-0032.t-0009.t-msedge.net
                            13.107.246.60
                            truefalse
                              unknown
                              document-display-verifycation-download-pdf.us-east-1.linodeobjects.com
                              unknown
                              unknowntrue
                                unknown
                                media.licdn.com
                                unknown
                                unknownfalse
                                  unknown
                                  new-pdf-document-approval.us-lax-1.linodeobjects.com
                                  unknown
                                  unknownfalse
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.htmltrue
                                      unknown
                                      file:///C:/Users/user/Downloads/downloaded.pdffalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://media.licdn.com/dms/document/media/D4E1FAQEDaJIjLoNB4w/feedshare-document-pdf-analyzed/0/1719937496280?e=1720656000&v=beta&t=q1HtF8i6CbMgQJuq27L8FMsMuj5igRN7psHVGlSB4PQfalse
                                        unknown
                                        about:blankfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.catrue
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          142.250.185.99
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          142.250.185.78
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          1.1.1.1
                                          unknownAustralia
                                          13335CLOUDFLARENETUSfalse
                                          152.199.21.118
                                          cs1404.wpc.epsiloncdn.netUnited States
                                          15133EDGECASTUSfalse
                                          104.21.44.57
                                          a9d041c33434.wazo-biawalkeks.ruUnited States
                                          13335CLOUDFLARENETUSfalse
                                          13.107.246.45
                                          s-part-0017.t-0009.t-msedge.netUnited States
                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          172.217.16.206
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          216.58.206.67
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          142.250.185.234
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          13.107.246.60
                                          s-part-0032.t-0009.t-msedge.netUnited States
                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          13.107.42.14
                                          lnkd.inUnited States
                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          151.101.130.137
                                          code.jquery.comUnited States
                                          54113FASTLYUSfalse
                                          64.233.166.84
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          239.255.255.250
                                          unknownReserved
                                          unknownunknownfalse
                                          188.114.97.3
                                          4454275f.rwnbqwuligbumyzvpodsthfkaftacy.pages.devEuropean Union
                                          13335CLOUDFLARENETUSfalse
                                          173.255.231.96
                                          unknownUnited States
                                          63949LINODE-APLinodeLLCUSfalse
                                          188.114.96.3
                                          unknownEuropean Union
                                          13335CLOUDFLARENETUSfalse
                                          18.239.83.87
                                          openfpcdn.ioUnited States
                                          16509AMAZON-02USfalse
                                          142.250.186.132
                                          www.google.comUnited States
                                          15169GOOGLEUSfalse
                                          172.233.128.226
                                          unknownUnited States
                                          20940AKAMAI-ASN1EUfalse
                                          35.190.80.1
                                          a.nel.cloudflare.comUnited States
                                          15169GOOGLEUSfalse
                                          104.17.25.14
                                          cdnjs.cloudflare.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          IP
                                          192.168.2.16
                                          192.168.2.5
                                          Joe Sandbox version:40.0.0 Tourmaline
                                          Analysis ID:1466326
                                          Start date and time:2024-07-02 19:29:22 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                          Sample URL:https://lnkd.in/e4hHCn_z
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:14
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • EGA enabled
                                          Analysis Mode:stream
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal64.phis.win@25/8@28/207
                                          • Exclude process from analysis (whitelisted): svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 142.250.185.99, 64.233.166.84, 142.250.185.78, 34.104.35.123
                                          • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, 2-01-2c3e-005c.cdx.cedexis.net, clientservices.googleapis.com, clients.l.google.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtCreateFile calls found.
                                          • Report size getting too big, too many NtOpenFile calls found.
                                          • VT rate limit hit for: https://lnkd.in/e4hHCn_z
                                          InputOutput
                                          URL: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com/safe.html Model: Perplexity: mixtral-8x7b-instruct
                                          {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a form that explicitly requests sensitive information in the form of an email address, which can be associated with a user's account.","The text does not create a sense of urgency or interest, as it simply asks the user to enter their email address without making any promises or threats."]}Explanation:The webpage contains a form that requests the user to enter their Microsoft email address, which can be associated with a user's account. Therefore, the "loginform" field is set to true.The text on the webpage does not create a sense of urgency or interest, as it simply asks the user to enter their email address without making any promises or threats. Therefore, the "urgency" field is set to false.There is no CAPTCHA or anti-robot detection mechanism present on the webpage. Therefore, the "captcha" field is set to false.The "reasons" field contains an array of strings that explain the conclusions reached in the analysis. The first reason explains why the "loginform" field is set to true, while the second reason explains why the "urgency" field is set to false.
                                          Title: Verification Defender Associate OCR: Microsoft Verification Defender Provide Email for Document Verification Enter Your Microsoft Email Address Review Document 
                                          URL: https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com Model: gpt-4o
                                          ```json{  "phishing_score": 9,  "brands": "Microsoft, Adobe",  "phishing": true,  "suspicious_domain": true,  "has_prominent_loginform": true,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": true,  "legitmate_domain": "microsoft.com, adobe.com",  "reasons": "The URL 'https://document-display-verifycation-download-pdf.us-east-1.linodeobjects.com' is highly suspicious. It uses a long and complex subdomain structure, which is a common tactic in phishing attacks to obscure the true domain. The domain 'linodeobjects.com' is not associated with Microsoft or Adobe, which are the brands displayed on the page. The page prominently asks for a Microsoft email address for 'document verification,' which is a common phishing tactic to harvest credentials. There is no CAPTCHA present, which is often used on legitimate sites to prevent automated attacks. The combination of these factors strongly suggests that this is a phishing site."}
                                          URL: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.ca Model: Perplexity: mixtral-8x7b-instruct
                                          {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The title 'Sign in to Best Productivity Provider' suggests the presence of a login form, but upon analysis, the text 'Microsoft Dismiss' does not contain any login fields or requests for sensitive information.","The text 'Microsoft Dismiss' does not create a sense of urgency or interest.","Neither the title nor the text contains any CAPTCHA or anti-robot detection mechanisms."]}
                                          Title: Sign in to Best Productivity Provider OCR: Microsoft Dismiss 
                                          URL: https://new-pdf-document-approval.us-lax-1.linodeobjects.com/app.html#admin@halton.ca Model: Perplexity: mixtral-8x7b-instruct
                                          {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form as there is no explicit request for sensitive information such as passwords, email addresses, usernames, phone numbers or credit card numbers (CVV).","The text does not create a sense of urgency or interest as it does not contain any calls to action related to viewing documents or accessing secured content.","The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism."]}
                                          Title: Sign in to Best Productivity Provider OCR: Could not connect to corresponding ser.'er Dismiss 
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 16:29:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2673
                                          Entropy (8bit):3.990079131839028
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E7567DE74FEA48B11EFDFBC83E35065A
                                          SHA1:89FA7620D5B3F06650BDA1B5FA458FFC40BDAEB2
                                          SHA-256:CFFE1F5C0A285BAF958BB1F29B804FE8ABD617D4D414B81A71DC81471FA89DAE
                                          SHA-512:A577315010B6DD8FAE63541D4FD6C449E2C408F0B4E6226A3F7D95E29451F3E695A1A87C30841FEF3D2E99CD42AABDAEB9DEBC4DD0DC705A078B764881305250
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,....~.Sr....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 16:29:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2675
                                          Entropy (8bit):4.006630524368667
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DCD4962133E7084818EA95A55CBBE666
                                          SHA1:158D866B092AC8BFFD950D6A21373D2C325A4DFB
                                          SHA-256:9E3BD778ABBA8A155D56E25D77C30A2D9FFD6E4B0BBA41E46B5E1D1391EF9F31
                                          SHA-512:4DD0F71C4D08F3C39D0A4E516A5323E3852B8E2C57C29222755D837D2982794C5D214A427BEDC0FBD22D993A78BC017C73EABA5741654E625ACD70E93936AB7C
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,......Gr....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2689
                                          Entropy (8bit):4.0137235780439555
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2DF74208963E755D629AD58AC0F938FC
                                          SHA1:EBACE0A907858C2C343A0E798F1615E290F0A742
                                          SHA-256:EE948BF75CE7464C7B43DD11A2258ACCFCB7E9C549AEE207DDFF82AA1B8F5180
                                          SHA-512:B7B3C0C0AA30010DDCE996B01B67769E87ED3DCBB1E314D83787FD6C73CE606211A732849E3D3B854A9CBEF033E0B4E45355A374C6EFCE1AEA27EDEE386D4262
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 16:29:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):4.004145203898074
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:430233E43CA7687C9A7C3C2399F1F665
                                          SHA1:29FE11C5E257205C3A6F1B33E7F4C90FD7033145
                                          SHA-256:1A8BE17CD56FB87365930EE08DFBFC3845CD1721CFED0F2A70F74D020BCA1455
                                          SHA-512:39E942CF014617E39FEA723BEB480D54EB4B4EFC0FC40BEDD104F90590BF8200130A78D050600E6A974F05B13E96F25DC40351198EE39AD701FA23744351FCC1
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,......Ar....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 16:29:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):3.991401399909293
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6A8FC461E856BE1D740540FEA6233A8F
                                          SHA1:18E7C6DBCFAC39ABA285FCD10665EB11920A3E16
                                          SHA-256:11F2F3CC67F2F1035840D48A30F8A6171BBC781172F2F2ED4675982DAC45AAB1
                                          SHA-512:6336671BF47F5BF0546D27A93F4D5C9A76603AF8FCE355F95A6B980BFC1ACD578496C31B4E617E83140A86B530524D2652A332CDBD5665A2C5EDC02649499B7E
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,....1.Mr....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 2 16:29:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2679
                                          Entropy (8bit):4.0037544572858765
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:4ADBDD9605CCD2A9216B6FE732842B03
                                          SHA1:9980D8DF51CA7CB0FB4D1338DB043182AC882687
                                          SHA-256:ECEECE1C4472590D97A7C75793D6DBB08BBB6E5FAF939E3A4A35578506B811B9
                                          SHA-512:CA5743E815D6A2241E30A3B4E8699E77B09340F77BC59C0731DEE69D50275972FD4B97CEDE09B1B678A85A66AA586627237724645B2C6890871212C10C37F661
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,......7r....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PDF document, version 1.7, 1 pages
                                          Category:dropped
                                          Size (bytes):16383
                                          Entropy (8bit):7.793610455823998
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:842E49A01CF67A2DD546B98C8D413F34
                                          SHA1:292C9D024E89D27AC2E951948BB3DFD70431B0B4
                                          SHA-256:F3AAE780CFF8BA17C54B1ABACD6B13C58D9DB844CF5C08E2FC359B1B9DDD4843
                                          SHA-512:9F25C0D37DCF33A06C264DBDA565F3F69463859354A040E801ECBBD2FEE5D87E62D08137982A9F752DA8C04A4E8F857409A61B14458ADA6D57E1DD74781D217D
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 22 0 R/MarkInfo<</Marked true>>/Metadata 77 0 R/ViewerPreferences 78 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 11 0 R/F4 15 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image14 14 0 R/Image18 18 0 R/Image19 19 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 13 0 R 17 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 2925>>..stream..x..].o.6..=@...?I.Y...(...]...8..\.8.\b.y..m.?.f.r..#.dT/`.(}...3.......I..WG._...h..v6.*..d......7.....4u....ESh8......./........._Y.dqzyx..PS....`Z.8..2....#<..._.......eQ..8}wx......A....X..R..N~.........a#\..g../.._.A..GbU...'.U\t].......9....J@........).nj...[..nC.2..]..V;.jxS;...T2'..M.'-X.:..d.....L...A.Y.4..PPr8..SR.@..'e.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PDF document, version 1.7, 1 pages
                                          Category:dropped
                                          Size (bytes):0
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:842E49A01CF67A2DD546B98C8D413F34
                                          SHA1:292C9D024E89D27AC2E951948BB3DFD70431B0B4
                                          SHA-256:F3AAE780CFF8BA17C54B1ABACD6B13C58D9DB844CF5C08E2FC359B1B9DDD4843
                                          SHA-512:9F25C0D37DCF33A06C264DBDA565F3F69463859354A040E801ECBBD2FEE5D87E62D08137982A9F752DA8C04A4E8F857409A61B14458ADA6D57E1DD74781D217D
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 22 0 R/MarkInfo<</Marked true>>/Metadata 77 0 R/ViewerPreferences 78 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 11 0 R/F4 15 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image14 14 0 R/Image18 18 0 R/Image19 19 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 13 0 R 17 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 2925>>..stream..x..].o.6..=@...?I.Y...(...]...8..\.8.\b.y..m.?.f.r..#.dT/`.(}...3.......I..WG._...h..v6.*..d......7.....4u....ESh8......./........._Y.dqzyx..PS....`Z.8..2....#<..._.......eQ..8}wx......A....X..R..N~.........a#\..g../.._.A..GbU...'.U\t].......9....J@........).nj...[..nC.2..]..V;.jxS;...T2'..M.'-X.:..d.....L...A.Y.4..PPr8..SR.@..'e.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PDF document, version 1.7, 1 pages
                                          Category:dropped
                                          Size (bytes):0
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:842E49A01CF67A2DD546B98C8D413F34
                                          SHA1:292C9D024E89D27AC2E951948BB3DFD70431B0B4
                                          SHA-256:F3AAE780CFF8BA17C54B1ABACD6B13C58D9DB844CF5C08E2FC359B1B9DDD4843
                                          SHA-512:9F25C0D37DCF33A06C264DBDA565F3F69463859354A040E801ECBBD2FEE5D87E62D08137982A9F752DA8C04A4E8F857409A61B14458ADA6D57E1DD74781D217D
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 22 0 R/MarkInfo<</Marked true>>/Metadata 77 0 R/ViewerPreferences 78 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 11 0 R/F4 15 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image14 14 0 R/Image18 18 0 R/Image19 19 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 13 0 R 17 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 2925>>..stream..x..].o.6..=@...?I.Y...(...]...8..\.8.\b.y..m.?.f.r..#.dT/`.(}...3.......I..WG._...h..v6.*..d......7.....4u....ESh8......./........._Y.dqzyx..PS....`Z.8..2....#<..._.......eQ..8}wx......A....X..R..N~.........a#\..g../.._.A..GbU...'.U\t].......9....J@........).nj...[..nC.2..]..V;.jxS;...T2'..M.'-X.:..d.....L...A.Y.4..PPr8..SR.@..'e.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PDF document, version 1.7, 1 pages
                                          Category:dropped
                                          Size (bytes):148351
                                          Entropy (8bit):7.953988895457267
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:4B9FF72DCBC1102DF4D141B65DFB764C
                                          SHA1:0AE682F457509FE26038AACCE9F4510DBBC6C10D
                                          SHA-256:47390008C186A40AC2DA08F0F9DBED30D3E0CEDB9F3A2DE224EA11FACA6450C3
                                          SHA-512:22DFDFBF2491AA4648B8DEF9559B157621033A0007EAE42F63B92F3CF4F0CA44E515DDAC0FD6269EC78DB48F476F06C532FB7B548C9B60F068C25963A53990DB
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 22 0 R/MarkInfo<</Marked true>>/Metadata 77 0 R/ViewerPreferences 78 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 11 0 R/F4 15 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image14 14 0 R/Image18 18 0 R/Image19 19 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 13 0 R 17 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 2925>>..stream..x..].o.6..=@...?I.Y...(...]...8..\.8.\b.y..m.?.f.r..#.dT/`.(}...3.......I..WG._...h..v6.*..d......7.....4u....ESh8......./........._Y.dqzyx..PS....`Z.8..2....#<..._.......eQ..8}wx......A....X..R..N~.........a#\..g../.._.A..GbU...'.U\t].......9....J@........).nj...[..nC.2..]..V;.jxS;...T2'..M.'-X.:..d.....L...A.Y.4..PPr8..SR.@..'e.
                                          No static file info