Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9

Overview

General Information

Sample URL:http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9
Analysis ID:1467139
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 6332 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6688 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2020,i,13668262737148622772,3217388757870679107,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 5504 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: global trafficTCP traffic: 192.168.2.5:50765 -> 1.1.1.1:53
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: unknown1.win@19/6@4/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2020,i,13668262737148622772,3217388757870679107,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2020,i,13668262737148622772,3217388757870679107,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1467139 URL: http://signetjewelers-l%20m... Startdate: 03/07/2024 Architecture: WINDOWS Score: 1 5 chrome.exe 8 2->5         started        8 chrome.exe 2->8         started        dnsIp3 13 192.168.2.5, 443, 49198, 49703 unknown unknown 5->13 15 239.255.255.250 unknown Reserved 5->15 10 chrome.exe 5->10         started        process4 dnsIp5 17 www.google.com 216.58.206.36, 443, 49711 GOOGLEUS United States 10->17 19 google.com 10->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=90%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
172.217.168.78
truefalse
    unknown
    www.google.com
    216.58.206.36
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        216.58.206.36
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.5
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1467139
        Start date and time:2024-07-03 18:38:44 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 56s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:UNKNOWN
        Classification:unknown1.win@19/6@4/3
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • URL browsing timeout or error
        • URL not reachable
        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.185.110, 64.233.184.84, 142.250.185.131, 34.104.35.123, 184.28.90.27, 40.127.169.103, 2.19.126.163, 2.19.126.137, 192.229.221.95, 20.242.39.171, 20.3.187.198
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, clients.l.google.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:39:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.9857129856536915
        Encrypted:false
        SSDEEP:48:8RdzWTTyEpU+HPidAKZdA19ehwiZUklqehNy+3:83W3tpUeKy
        MD5:442F728FAAE4D5AAFA3FC400941EA5BF
        SHA1:D9433F88ADE74B375C1A21B04A88D47705464612
        SHA-256:9432880C2F3941B945734B7CA5D3BF5DC75ACE87C7A8B85962C65399993F1ADD
        SHA-512:8E688086D54AE4E492D5F8A8E232CEAA952662EF6A2B4A9B82304214C0AC0F0ACD49645C71E6EA8AAB2FFE1BBC6E089266A73DE4EBEF716DB7458B213FD8D31A
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....A.~.g...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........q........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:39:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.9979693977371817
        Encrypted:false
        SSDEEP:48:8odzWTTyEpU+HPidAKZdA1weh/iZUkAQkqeh6y+2:8cW3tpU89Q/y
        MD5:16A3B9B2FCC010815021079DEDEA339D
        SHA1:0658DCBE1BE9E591C3AEEF769E41FABF780478DB
        SHA-256:C81F95F333C15619D86D1373AA9AA4204B300A8D8A33AFB1E482E904AB9F3AF1
        SHA-512:6A7A267645DA9B294A1F007B18B895B6D209FF0CD95678248AE614C9B97FF54A2BC8C283D3A1004808C0A8EACDFCC914B3C369EED9AF1BFA64578C661B027FC4
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....r.r.g...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........q........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2693
        Entropy (8bit):4.010274310118391
        Encrypted:false
        SSDEEP:48:8xDdzWTTyEpsHPidAKZdA14tseh7sFiZUkmgqeh7s8y+BX:8xRW3tpKn2y
        MD5:9B6A227246BFD8BEC4504C2F6FE20227
        SHA1:8C20C1CDA4F71A19485BA2263E71FEC1C6FA8299
        SHA-256:7314450E696225918979C19316C679E783C05D1E7075FABFF32B2B2CF5CF9376
        SHA-512:1B7CEAE38432ADB98D4D17645E26088C51C930C8246AFD574DB5694DA84C2AFFD92C84345AFDC235F510CCFC5C8A649648ECB8DB21147160E6897244D42802F6
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........q........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:39:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.997616704842088
        Encrypted:false
        SSDEEP:48:8OdzWTTyEpU+HPidAKZdA1vehDiZUkwqehOy+R:8aW3tpUH0y
        MD5:7581DCBEEF3A6322BA4DFCE82CC56DC0
        SHA1:074905F32A4F64A891ADCE1663D59D6C9A5C5D97
        SHA-256:96C77B4BA63C49F7B13BDDD9A1A673ADC5F096FC7BC97B8E642DDF0485FF1F47
        SHA-512:C79571E6CBC13C711B6E9531836D11612599D795C827285C1B1804BE3221AA3FFD1A335CFBC4E2E19504E2D6BC4AB97EE18661A8EBE59FD4B6BA9C6384C178E1
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,....n.k.g...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........q........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:39:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2681
        Entropy (8bit):3.988630376523963
        Encrypted:false
        SSDEEP:48:8mdzWTTyEpU+HPidAKZdA1hehBiZUk1W1qehYy+C:8CW3tpU394y
        MD5:6AF74F9C5C5B02B8BC087E265DB347BA
        SHA1:1AAF685E3AF5EFEA4CC64118209A8B4EC6446EE1
        SHA-256:C2623DDB5597B8F579BC2936AD433F8321E599B565472B0BAE7065DFB932915D
        SHA-512:2D69F40E1266329E5C8D97426EF9D99D8914EBF3E4129ED97A876ABF524591F78ADD79345597A21C9A1DB41BB3FE1B26637488F8EE2F5B4792ADFF8F4EF99B60
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,......w.g...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........q........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:39:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2683
        Entropy (8bit):3.9990108036286243
        Encrypted:false
        SSDEEP:48:8AdzWTTyEpU+HPidAKZdA1duT+ehOuTbbiZUk5OjqehOuTb2y+yT+:8kW3tpU/T/TbxWOvTb2y7T
        MD5:1AE6D8CFF4D7BEA43ADBA20C23D65DCF
        SHA1:BD9CF5C53E59803A73B4642E2FFC73B1D140F70D
        SHA-256:0F937B96CA308B856BB3161B9530C2071672326A13B9001DBC0377FAEECF272B
        SHA-512:3CFBD3791080E03DDC070FBBB296D985676A6E8B7DDF31D2624B12DCF77F4144BE8ADE154BA49C22EA2593625779B41E310421EDB2B91DF790C08AC01E39FCA2
        Malicious:false
        Reputation:low
        Preview:L..................F.@.. ...$+.,.....Kb.g...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........q........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        No static file info
        TimestampSource PortDest PortSource IPDest IP
        Jul 3, 2024 18:39:29.710411072 CEST49674443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:29.710413933 CEST49675443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:29.819778919 CEST49673443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:39.264930010 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:39.265002966 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:39.265068054 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:39.265322924 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:39.265343904 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:39.316129923 CEST49674443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:39.316144943 CEST49675443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:39.425642967 CEST49673443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:39.910409927 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:39.922919989 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:39.922951937 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:39.925401926 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:39.925544977 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:39.952990055 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:39.953160048 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:40.003669977 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:40.003724098 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:40.050518990 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:41.089214087 CEST4434970323.1.237.91192.168.2.5
        Jul 3, 2024 18:39:41.089308023 CEST49703443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:49.814758062 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:49.814809084 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:49.814929008 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:51.216165066 CEST49711443192.168.2.5216.58.206.36
        Jul 3, 2024 18:39:51.216243982 CEST44349711216.58.206.36192.168.2.5
        Jul 3, 2024 18:39:52.254956007 CEST49703443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:52.255076885 CEST49703443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:52.255776882 CEST49720443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:52.255826950 CEST4434972023.1.237.91192.168.2.5
        Jul 3, 2024 18:39:52.255891085 CEST49720443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:52.256278992 CEST49720443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:52.256292105 CEST4434972023.1.237.91192.168.2.5
        Jul 3, 2024 18:39:52.261653900 CEST4434970323.1.237.91192.168.2.5
        Jul 3, 2024 18:39:52.261666059 CEST4434970323.1.237.91192.168.2.5
        Jul 3, 2024 18:39:52.857498884 CEST4434972023.1.237.91192.168.2.5
        Jul 3, 2024 18:39:52.857599020 CEST49720443192.168.2.523.1.237.91
        Jul 3, 2024 18:39:53.762809038 CEST5076553192.168.2.51.1.1.1
        Jul 3, 2024 18:39:53.770311117 CEST53507651.1.1.1192.168.2.5
        Jul 3, 2024 18:39:53.770432949 CEST5076553192.168.2.51.1.1.1
        Jul 3, 2024 18:39:53.770498991 CEST5076553192.168.2.51.1.1.1
        Jul 3, 2024 18:39:53.777084112 CEST53507651.1.1.1192.168.2.5
        Jul 3, 2024 18:39:54.215842962 CEST53507651.1.1.1192.168.2.5
        Jul 3, 2024 18:39:54.216166973 CEST5076553192.168.2.51.1.1.1
        Jul 3, 2024 18:39:54.221278906 CEST53507651.1.1.1192.168.2.5
        Jul 3, 2024 18:39:54.221389055 CEST5076553192.168.2.51.1.1.1
        TimestampSource PortDest PortSource IPDest IP
        Jul 3, 2024 18:39:34.703241110 CEST53491981.1.1.1192.168.2.5
        Jul 3, 2024 18:39:34.704257011 CEST53531231.1.1.1192.168.2.5
        Jul 3, 2024 18:39:35.794557095 CEST53574201.1.1.1192.168.2.5
        Jul 3, 2024 18:39:36.422861099 CEST5910753192.168.2.58.8.8.8
        Jul 3, 2024 18:39:36.423120975 CEST6063353192.168.2.51.1.1.1
        Jul 3, 2024 18:39:36.429546118 CEST53591078.8.8.8192.168.2.5
        Jul 3, 2024 18:39:36.430577993 CEST53606331.1.1.1192.168.2.5
        Jul 3, 2024 18:39:39.230243921 CEST6522853192.168.2.51.1.1.1
        Jul 3, 2024 18:39:39.230931044 CEST6226953192.168.2.51.1.1.1
        Jul 3, 2024 18:39:39.237934113 CEST53622691.1.1.1192.168.2.5
        Jul 3, 2024 18:39:39.238245010 CEST53652281.1.1.1192.168.2.5
        Jul 3, 2024 18:39:53.184243917 CEST53580991.1.1.1192.168.2.5
        Jul 3, 2024 18:39:53.762295008 CEST53507951.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 3, 2024 18:39:36.422861099 CEST192.168.2.58.8.8.80xfa7dStandard query (0)google.comA (IP address)IN (0x0001)false
        Jul 3, 2024 18:39:36.423120975 CEST192.168.2.51.1.1.10xe891Standard query (0)google.comA (IP address)IN (0x0001)false
        Jul 3, 2024 18:39:39.230243921 CEST192.168.2.51.1.1.10x295cStandard query (0)www.google.comA (IP address)IN (0x0001)false
        Jul 3, 2024 18:39:39.230931044 CEST192.168.2.51.1.1.10x4108Standard query (0)www.google.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 3, 2024 18:39:36.429546118 CEST8.8.8.8192.168.2.50xfa7dNo error (0)google.com172.217.168.78A (IP address)IN (0x0001)false
        Jul 3, 2024 18:39:36.430577993 CEST1.1.1.1192.168.2.50xe891No error (0)google.com172.217.16.206A (IP address)IN (0x0001)false
        Jul 3, 2024 18:39:39.237934113 CEST1.1.1.1192.168.2.50x4108No error (0)www.google.com65IN (0x0001)false
        Jul 3, 2024 18:39:39.238245010 CEST1.1.1.1192.168.2.50x295cNo error (0)www.google.com216.58.206.36A (IP address)IN (0x0001)false
        Jul 3, 2024 18:39:51.547702074 CEST1.1.1.1192.168.2.50x23e3No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Jul 3, 2024 18:39:51.547702074 CEST1.1.1.1192.168.2.50x23e3No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:12:39:30
        Start date:03/07/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:12:39:33
        Start date:03/07/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2020,i,13668262737148622772,3217388757870679107,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:3
        Start time:12:39:35
        Start date:03/07/2024
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://signetjewelers-l%20my.sharepoint.com/:o:/p/ann_%20grimmett/%20ingvy9%5D%20l6NEvoyBZlH4A9kB3u191nCqounRk_%20hYf1BFsA?e=5%3alPhqsX&at=9"
        Imagebase:0x7ff715980000
        File size:3'242'272 bytes
        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly