Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www-bbc-co-uk.cdn.ampproject.org/c/s/%41%4E%54oniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%A3%E2%82%AC%E2%80%9A

Overview

General Information

Sample URL:https://www-bbc-co-uk.cdn.ampproject.org/c/s/%41%4E%54oniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%A3%E2%82%AC%E2%80%9A
Analysis ID:1467142

Detection

HTMLPhisher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Phishing site detected (based on favicon image match)
Snort IDS alert for network traffic
Yara detected HtmlPhish54
Phishing site detected (based on image similarity)
Detected hidden input values containing email addresses (often used in phishing pages)
Found iframes
HTML body contains low number of good links
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 3880 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www-bbc-co-uk.cdn.ampproject.org/c/s/ANToniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3660 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1688,i,6533737972295395928,14521196600636627258,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6744 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5896 --field-trial-handle=1688,i,6533737972295395928,14521196600636627258,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
2.4.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
    2.4.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
      3.5.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
        3.7.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
          2.4.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
            Click to see the 3 entries
            No Sigma rule has matched
            Timestamp:07/03/24-18:43:22.778279
            SID:2857090
            Source Port:443
            Destination Port:49717
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            Phishing

            barindex
            Source: https://microsoft-office-offic365.pawradar.com.brLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://microsoft-office-offic365.pawradar.com.br' is highly suspicious. It uses a subdomain 'microsoft-office-offic365' which mimics the legitimate brand 'Microsoft' to mislead users. The legitimate domain for Microsoft services is 'microsoft.com'. The image shows a prompt asking the user to click 'Confirm' to continue, which is a common social engineering technique to trick users into taking an action without verifying the authenticity of the site. There is no prominent login form or captcha, but the presence of a suspicious link and the use of social engineering techniques strongly indicate that this is a phishing site. DOM: 2.2.pages.csv
            Source: https://microsoft-office-offic365.pawradar.com.brLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://microsoft-office-offic365.pawradar.com.br' is highly suspicious. The legitimate domain for Microsoft services is 'microsoft.com'. The use of 'pawradar.com.br' as the domain is not associated with Microsoft and is likely an attempt to mislead users. The webpage closely resembles the legitimate Microsoft login page, which is a common social engineering technique used in phishing attacks. The presence of a prominent login form without a CAPTCHA further indicates a potential phishing attempt. Therefore, this site is very likely a phishing site. DOM: 3.8.pages.csv
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueMatcher: Template: microsoft matched with high similarity
            Source: Yara matchFile source: 2.4.pages.csv, type: HTML
            Source: Yara matchFile source: 2.4.pages.csv, type: HTML
            Source: Yara matchFile source: 3.5.pages.csv, type: HTML
            Source: Yara matchFile source: 3.7.pages.csv, type: HTML
            Source: Yara matchFile source: 2.4.pages.csv, type: HTML
            Source: Yara matchFile source: 3.7.pages.csv, type: HTML
            Source: Yara matchFile source: 3.5.pages.csv, type: HTML
            Source: Yara matchFile source: 3.8.pages.csv, type: HTML
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9AMatcher: Found strong image similarity, brand: MICROSOFT
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueMatcher: Found strong image similarity, brand: MICROSOFT
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: jennifer.brockway@exeterfinance.com
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: Iframe src: https://8b97567b-32180065.pawradar.com.br/Prefetch/Prefetch.aspx
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: Iframe src: https://8b97567b-32180065.pawradar.com.br/Prefetch/Prefetch.aspx
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: Iframe src: https://8b97567b-32180065.pawradar.com.br/Prefetch/Prefetch.aspx
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: Number of links: 0
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: Title: Sign in to your account does not match URL
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: <input type="password" .../> found
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9AHTTP Parser: No favicon
            Source: https://8b97567b-32180065.pawradar.com.br/Prefetch/Prefetch.aspxHTTP Parser: No favicon
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: No <meta name="author".. found
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: No <meta name="author".. found
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: No <meta name="author".. found
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
            Source: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
            Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49719 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49720 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49721 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49722 version: TLS 1.2
            Source: chrome.exeMemory has grown: Private usage: 13MB later: 30MB

            Networking

            barindex
            Source: TrafficSnort IDS: 2857090 ETPRO CURRENT_EVENTS JS/PsyduckPockeball Payload Inbound 134.209.234.126:443 -> 192.168.2.16:49717
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
            Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
            Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: global trafficDNS traffic detected: DNS query: www-bbc-co-uk.cdn.ampproject.org
            Source: global trafficDNS traffic detected: DNS query: antoniopneus-com-br.cdn.ampproject.org
            Source: global trafficDNS traffic detected: DNS query: antoniopneus.com.br
            Source: global trafficDNS traffic detected: DNS query: www.google.com
            Source: global trafficDNS traffic detected: DNS query: microsoft-office-offic365.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: ced6cd5f-32180065.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: 76caa522-32180065.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: 65e61ca5-32180065.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: l1ve.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: 8b97567b-32180065.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: f22e46c7-32180065.pawradar.com.br
            Source: global trafficDNS traffic detected: DNS query: c3ba69d5-32180065.pawradar.com.br
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
            Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
            Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49719 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49720 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49721 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49722 version: TLS 1.2
            Source: classification engineClassification label: mal76.phis.win@18/6@32/151
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www-bbc-co-uk.cdn.ampproject.org/c/s/ANToniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1688,i,6533737972295395928,14521196600636627258,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1688,i,6533737972295395928,14521196600636627258,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5896 --field-trial-handle=1688,i,6533737972295395928,14521196600636627258,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5896 --field-trial-handle=1688,i,6533737972295395928,14521196600636627258,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Drive-by Compromise
            Windows Management Instrumentation1
            Registry Run Keys / Startup Folder
            1
            Process Injection
            1
            Masquerading
            OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Registry Run Keys / Startup Folder
            1
            Process Injection
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Extra Window Memory Injection
            1
            Extra Window Memory Injection
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            https://www-bbc-co-uk.cdn.ampproject.org/c/s/%41%4E%54oniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$0%Avira URL Cloudsafe
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            65e61ca5-32180065.pawradar.com.br
            134.209.234.126
            truetrue
              unknown
              l1ve.pawradar.com.br
              134.209.234.126
              truetrue
                unknown
                76caa522-32180065.pawradar.com.br
                134.209.234.126
                truetrue
                  unknown
                  antoniopneus.com.br
                  191.252.141.106
                  truefalse
                    unknown
                    ced6cd5f-32180065.pawradar.com.br
                    134.209.234.126
                    truetrue
                      unknown
                      www.google.com
                      216.58.206.68
                      truefalse
                        unknown
                        cdn-content.ampproject.org
                        142.250.184.225
                        truefalse
                          unknown
                          8b97567b-32180065.pawradar.com.br
                          134.209.234.126
                          truetrue
                            unknown
                            microsoft-office-offic365.pawradar.com.br
                            134.209.234.126
                            truetrue
                              unknown
                              c3ba69d5-32180065.pawradar.com.br
                              134.209.234.126
                              truetrue
                                unknown
                                f22e46c7-32180065.pawradar.com.br
                                134.209.234.126
                                truetrue
                                  unknown
                                  antoniopneus-com-br.cdn.ampproject.org
                                  unknown
                                  unknownfalse
                                    unknown
                                    www-bbc-co-uk.cdn.ampproject.org
                                    unknown
                                    unknownfalse
                                      unknown
                                      NameMaliciousAntivirus DetectionReputation
                                      https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=truetrue
                                        unknown
                                        https://8b97567b-32180065.pawradar.com.br/Prefetch/Prefetch.aspxfalse
                                          unknown
                                          https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9Atrue
                                            unknown
                                            https://antoniopneus-com-br.cdn.ampproject.org/c/s/ANToniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%A3%E2%82%AC%E2%80%9Afalse
                                              unknown
                                              https://antoniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%A3%E2%82%AC%E2%80%9Afalse
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                134.209.234.126
                                                65e61ca5-32180065.pawradar.com.brUnited States
                                                14061DIGITALOCEAN-ASNUStrue
                                                142.250.186.67
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                1.1.1.1
                                                unknownAustralia
                                                13335CLOUDFLARENETUSfalse
                                                108.177.15.84
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                142.250.185.138
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                216.58.206.68
                                                www.google.comUnited States
                                                15169GOOGLEUSfalse
                                                142.250.185.193
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                142.250.181.227
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                239.255.255.250
                                                unknownReserved
                                                unknownunknownfalse
                                                142.250.185.142
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                142.250.184.225
                                                cdn-content.ampproject.orgUnited States
                                                15169GOOGLEUSfalse
                                                142.250.186.110
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                191.252.141.106
                                                antoniopneus.com.brBrazil
                                                27715LocawebServicosdeInternetSABRfalse
                                                IP
                                                192.168.2.16
                                                192.168.2.4
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1467142
                                                Start date and time:2024-07-03 18:42:46 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                Sample URL:https://www-bbc-co-uk.cdn.ampproject.org/c/s/%41%4E%54oniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%A3%E2%82%AC%E2%80%9A
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:16
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • EGA enabled
                                                Analysis Mode:stream
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal76.phis.win@18/6@32/151
                                                • Exclude process from analysis (whitelisted): svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 108.177.15.84, 142.250.185.142, 142.250.181.227, 142.251.168.84, 142.250.186.110, 142.250.185.99, 34.104.35.123
                                                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • VT rate limit hit for: https://www-bbc-co-uk.cdn.ampproject.org/c/s/%41%4E%54oniopneus.com.br/dayo/uzmzp/captcha/amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$
                                                InputOutput
                                                URL: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A Model: Perplexity: mixtral-8x7b-instruct
                                                {"loginform": false,"urgency": true,"captcha": false,"reasons": ["The text 'Please click confirm to continue' creates a sense of urgency as it prompts the user to take immediate action.","No login form was found on the webpage."]}
                                                Title: Confirming OCR: 'ii Microsoft Please click confirm to continue Confirm 
                                                URL: https://microsoft-office-offic365.pawradar.com.br Model: gpt-4o
                                                ```json{  "phishing_score": 9,  "brands": "Microsoft",  "phishing": true,  "suspicious_domain": true,  "has_prominent_loginform": false,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": true,  "legitmate_domain": "microsoft.com",  "reasons": "The URL 'https://microsoft-office-offic365.pawradar.com.br' is highly suspicious. It uses a subdomain 'microsoft-office-offic365' which mimics the legitimate brand 'Microsoft' to mislead users. The legitimate domain for Microsoft services is 'microsoft.com'. The image shows a prompt asking the user to click 'Confirm' to continue, which is a common social engineering technique to trick users into taking an action without verifying the authenticity of the site. There is no prominent login form or captcha, but the presence of a suspicious link and the use of social engineering techniques strongly indicate that this is a phishing site."}
                                                URL: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct
                                                {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The text 'Sign in to your account' suggests the presence of a login form.","The text does not create a sense of urgency.","There is no CAPTCHA or anti-robot detection mechanism present.","The text 'Microsoft Trying to sign you in ance Terms of use Privacy & ckies' does not contain any language that creates a sense of urgency or interest."]}
                                                Title: Sign in to your account OCR: Microsoft Trying to sign you in ance Terms of use Privacy & ckies 
                                                URL: https://microsoft-office-offic365.pawradar.com.br Model: gpt-4o
                                                ```json{  "phishing_score": 9,  "brands": "Microsoft",  "phishing": true,  "suspicious_domain": true,  "has_prominent_loginform": false,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": false,  "legitmate_domain": "microsoft.com",  "reasons": "The URL 'https://microsoft-office-offic365.pawradar.com.br' is highly suspicious. It uses a subdomain that mimics 'Microsoft' and 'Office 365', which are legitimate brands, but the main domain 'pawradar.com.br' is not associated with Microsoft. This is a common social engineering technique used in phishing attacks to mislead users. The page resembles a legitimate Microsoft login page, but the domain mismatch is a significant red flag. There is no prominent login form or CAPTCHA visible, but the use of misleading subdomains and the attempt to mimic a legitimate brand strongly indicate phishing."}
                                                URL: https://microsoft-office-offic365.pawradar.com.br/?offic=amVubmlmZXIuYnJvY2t3YXlAZXhldGVyZmluYW5jZS5jb20=$%C3%83%C2%A3%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9A&sso_reload=true Model: Perplexity: mixtral-8x7b-instruct
                                                {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The text 'Sign in to your account' suggests the presence of a login form.","The text does not create a sense of urgency.","There is no CAPTCHA or anti-robot detection mechanism present.","The reason for the login requirement is unclear without further investigation."]}Explanation:The title of the webpage, "Sign in to your account", explicitly suggests the presence of a login form. Therefore, the "loginform" key is set to true.The text "-.a Microsoft Sign in jennifer.brockway@exeterfinance.co No account? Create one! Can't access your account? Next Sign-in options Terms of use Privacy & ckies" does not create a sense of urgency. There is no language that suggests the user must take immediate action or face negative consequences. Therefore, the "urgency" key is set to false.There is no CAPTCHA or anti-robot detection mechanism present in the text. Therefore, the "captcha" key is set to false.The reason for the login requirement is unclear without further investigation. However, the text "No account? Create one!" suggests that creating an account may be necessary to access certain features or content on the webpage. This is a common reason for login requirements on websites.
                                                Title: Sign in to your account OCR: -.a Microsoft Sign in jennifer.brockway@exeterfinance.co No account? Create one! Can't access your account? Next Sign-in options Terms of use Privacy & ckies 
                                                URL: https://microsoft-office-offic365.pawradar.com.br Model: gpt-4o
                                                ```json{  "phishing_score": 9,  "brands": "Microsoft",  "phishing": true,  "suspicious_domain": true,  "has_prominent_loginform": true,  "has_captcha": false,  "setechniques": true,  "has_suspicious_link": false,  "legitmate_domain": "microsoft.com",  "reasons": "The URL 'https://microsoft-office-offic365.pawradar.com.br' is highly suspicious. The legitimate domain for Microsoft services is 'microsoft.com'. The use of 'pawradar.com.br' as the domain is not associated with Microsoft and is likely an attempt to mislead users. The webpage closely resembles the legitimate Microsoft login page, which is a common social engineering technique used in phishing attacks. The presence of a prominent login form without a CAPTCHA further indicates a potential phishing attempt. Therefore, this site is very likely a phishing site."}
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:43:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2673
                                                Entropy (8bit):3.9848838819978436
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:8C289688B4E22142B6CC160024692188
                                                SHA1:474699BD1E23B0EE80898723633AD0129059F1A9
                                                SHA-256:E010E2841D121AB8683C5891AB600F3B74FF913CFC324E5D74D74F0FFE8C7BD3
                                                SHA-512:3E5208E7DB1FE7D7C7C5D140946EA0CC63F3152C444441B3D598B2EAB8F921B89EBF40DAAC1FC03524F906EB3154DEE8A99F96F4B8EF89A975C619B997974A7E
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....K.4.h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X\.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xf.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xf.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xf............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xh............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............4~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:43:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2675
                                                Entropy (8bit):3.9996983200231644
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:B74F986712CE02C5616652B920250DA9
                                                SHA1:E6C192F16C544108BF5FDE3D42772078BE954752
                                                SHA-256:F666A87F6F0EFE801BEE498BB5DDC3F66FFDA7E11D635B4DF7556C6FF2A68AEB
                                                SHA-512:93BBF1F87DF44CFEE3A1B0D229177DF03BD6D600E48F9DDAEF6B5B44BAF4672D94F2443022C72839B97ECF77D27956DA76B51C30155C6B507DCA57B194D7EC42
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,......).h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X\.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xf.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xf.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xf............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xh............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............4~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2689
                                                Entropy (8bit):4.010006399088729
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:9AF198FBC8127A0E9EA0BCC1411ABF85
                                                SHA1:EDCC9208C6DCCFAEA8091B8D3BA8D438FF34826C
                                                SHA-256:EF7F29039EF0F99BF84C87382246DBD02CFBBC02125DD60585782A1451422B83
                                                SHA-512:FF456AB0BFB078985A1077A336D688ACE62AEC0DC3941ED126358539A2EAC653F4955496168BBDB58B705B4AD7C54697925D97F30FB3EC041B805212DC7DC517
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X\.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xf.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xf.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xf............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............4~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:43:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2677
                                                Entropy (8bit):3.9960690640402223
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:EC2F656DE970A141CF70BB64F9E91548
                                                SHA1:2A8774012A1234687473AE8BB6DDB474710343C2
                                                SHA-256:32D4BD06DBEB2B50AD3735EE1E2F67538AFEB335CB7EA38E73D78BF9AF271C13
                                                SHA-512:F195604519E28051E87D630E4F578ED1B51D734D7A56BC24E20B5EC7D4C75494349B7B90E84A8A9F31939BC5B1D299082667065674CD834EE4E095C454FC0B01
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....ob#.h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X\.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xf.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xf.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xf............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xh............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............4~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:43:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2677
                                                Entropy (8bit):3.9856947192190137
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:F24EA5C32A2E146388B7112719EC5ED8
                                                SHA1:A80458633A2092FD4847D226275038F7187314A7
                                                SHA-256:2D11C552C85CDEF8836F00D577BCCFC937313FA6171563E32D317412AB0D4AC9
                                                SHA-512:BA17C3BA2BECAFC450FEB16A5DE7BB99EB10A88D6A064FDDF4D904BCA9EB0C456669551C2A46569CFF6830AD461A6FA65F8DC11DABA7C05AE5A6A3EB0BEF0BFD
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....F...h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X\.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xf.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xf.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xf............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xh............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............4~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 15:43:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2679
                                                Entropy (8bit):3.9985276234557183
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:C8E2CF18DF3036EE95E5C4F4A5A75271
                                                SHA1:EBFB28864815B81CD365A428C2BC04EE90761B71
                                                SHA-256:E2AB869D404D90159FC87F2554AF0F2DE9EC4937147FCE114230F2EA3E109E4E
                                                SHA-512:39296522051AE4E2551576C003DE05CE11929375A5F7059AFE8BF2864EBE4DCDC894F142BCCE638CAEBD29E17F6DCAB7BCAFD5DF136F7749C4F8B0CB76649DE7
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,.......h...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X\.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xf.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xf.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xf............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xh............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............4~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                No static file info