Windows
Analysis Report
https://t.apemail.net/c/nqkqcbqbabjfidqbdicvivqcdibqkvqhdjkq4vkudjivivagkuaqibieb4bqcfi3audqkaica4drwaabbyhaibihainq4byoaedqeaipamnqogyvpf3bkgyvafkambqpkikwu-nqdbwfkcivnrkgyvpf3bkgygamaa4bqedmcagbahdmcqabipaadaogygaebagdqpaunqkbyfaebaoby3aubq4dqdamaa6gyvaedacacskqhacgqfkrlaegqdavlaogsvbzkvigsrkrkamv
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6668 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// t.apemail. net/c/nqkq cbqbabjfid qbdicvivqc dibqkvqhdj kq4vkudjiv ivagkuaqib ieb4bqcfi3 audqkaica4 drwaabbyha ibihainq4b yoaedqeaip amnqogyvpf 3bkgyvafka mbqpkikwu- nqdbwfkciv nrkgyvpf3b kgygamaa4b qedmcagbah dmcqabipaa daogygaeba gdqpaunqkb yfaebaoby3 aubq4dqdam aa6gyvaeda cacskqhacg qfkrlaegqd avlaogsvbz kvigsrkrka mvibaqcqid ydaekrwdqh byaqoaqbb4 brwflqmv3g 4zddpb4xef y7mzbf4vc4 c5sfewktdy krwfkelzif sf2ci4krwa abbyhaibih ainrkx2din duidiydbku kvstjzbvqw 2vkjcugrcd ijjv4wcedf kfqwqykrce igchl5drqx szknje6gk7 innfwfi3in cueuq3aaba egyvpf3bkg 2zijnvwg2z ijnvwg2zij nvwg2zijnv wgyvafkamb qpkikwu MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6856 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2204 --fi eld-trial- handle=197 2,i,873860 3309117868 059,852920 2513183420 505,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
k8s-eksinternetfacing-baa4792011-459661169.us-west-2.elb.amazonaws.com | 34.210.92.61 | true | false | unknown | |
bradytolbertstudios.com | 103.83.194.55 | true | false | unknown | |
www.google.com | 172.217.18.4 | true | false | unknown | |
t.apemail.net | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
34.210.92.61 | k8s-eksinternetfacing-baa4792011-459661169.us-west-2.elb.amazonaws.com | United States | 16509 | AMAZON-02US | false | |
142.250.186.46 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.18.4 | www.google.com | United States | 15169 | GOOGLEUS | false | |
103.83.194.55 | bradytolbertstudios.com | United States | 132335 | NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdIN | false | |
142.250.184.227 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.184.206 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.99 | unknown | United States | 15169 | GOOGLEUS | false | |
66.102.1.84 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1470185 |
Start date and time: | 2024-07-09 16:54:43 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://t.apemail.net/c/nqkqcbqbabjfidqbdicvivqcdibqkvqhdjkq4vkudjivivagkuaqibieb4bqcfi3audqkaica4drwaabbyhaibihainq4byoaedqeaipamnqogyvpf3bkgyvafkambqpkikwu-nqdbwfkcivnrkgyvpf3bkgygamaa4bqedmcagbahdmcqabipaadaogygaebagdqpaunqkbyfaebaoby3aubq4dqdamaa6gyvaedacacskqhacgqfkrlaegqdavlaogsvbzkvigsrkrkamvibaqcqidydaekrwdqhbyaqoaqbb4brwflqmv3g4zddpb4xefy7mzbf4vc4c5sfewktdykrwfkelzifsf2ci4krwaabbyhaibihainrkx2dinduidiydbkukvstjzbvqw2vkjcugrcdijjv4wcedfkfqwqykrceigchl5drqxszknje6gk7innfwfi3incueuq3aabaegyvpf3bkg2zijnvwg2zijnvwg2zijnvwg2zijnvwgyvafkambqpkikwu |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@15/0@6/102 |
- Exclude process from analysis
(whitelisted): dllhost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.184.227, 1 42.250.186.46, 66.102.1.84 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, cl ientservices.googleapis.com, c lients.l.google.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//t.apemail.net/c/nqkqcbqbabjf idqbdicvivqcdibqkvqhdjkq4vkudj ivivagkuaqibieb4bqcfi3audqkaic a4drwaabbyhaibihainq4byoaedqea ipamnqogyvpf3bkgyvafkambqpkikw u-nqdbwfkcivnrkgyvpf3bkgygamaa 4bqedmcagbahdmcqabipaadaogygae bagdqpaunqkbyfaebaoby3aubq4dqd amaa6gyvaedacacskqhacgqfkrlaeg qdavlaogsvbzkvigsrkrkamvibaqcq idydaekrwdqhbyaqoaqbb4brwflqmv 3g4zddpb4xefy7mzbf4vc4c5sfewkt dykrwfkelzifsf2ci4krwaabbyhaib ihainrkx2dinduidiydbkukvstjzbv qw2vkjcugrcdijjv4wcedfkfqwqykr ceigchl5drqxszknje6gk7innfwfi3 incueuq3aabaegyvpf3bkg2zijnvwg 2zijnvwg2zijnvwg2zijnvwgyvafka mbqpkikwu