Windows
Analysis Report
http://res.public.onecdn.static.microsoft
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6944 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://r es.public. onecdn.sta tic.micros oft/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 5920 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2188 --fi eld-trial- handle=194 8,i,290675 3758950526 836,895010 7923724627 038,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Timestamp: | 2024-07-16T16:15:34.113468+0200 |
SID: | 2840787 |
Source Port: | 49711 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Potentially Bad Traffic |
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.186.132 | true | false | unknown | |
sni1gl.wpc.sigmacdn.net | 152.199.21.175 | true | false | unknown | |
res.public.onecdn.static.microsoft | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.142 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.195 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.163 | unknown | United States | 15169 | GOOGLEUS | false | |
152.199.21.175 | sni1gl.wpc.sigmacdn.net | United States | 15133 | EDGECASTUS | false | |
142.250.186.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.186.110 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.173.84 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.22 |
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1474261 |
Start date and time: | 2024-07-16 16:14:56 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://res.public.onecdn.static.microsoft |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@14/8@4/103 |
- Exclude process from analysis
(whitelisted): SgrmBroker.exe, MoUsoCoreWorker.exe, svchost. exe - Excluded IPs from analysis (wh
itelisted): 142.250.185.195, 1 42.250.185.142, 142.251.173.84 , 93.184.221.240, 34.104.35.12 3 - Excluded domains from analysis
(whitelisted): res-ocdi-publi c.trafficmanager.net, cdn-offi ce.azureedge.net, fs.microsoft .com, clients2.google.com, acc ounts.google.com, edgedl.me.gv t1.com, ctldl.windowsupdate.co m, clientservices.googleapis.c om, clients.l.google.com, cdn- office.ec.azureedge.net - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: http:/
/res.public.onecdn.static.micr osoft
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9916610076435495 |
Encrypted: | false |
SSDEEP: | |
MD5: | E2657F97BC24982BD7101E8032757ACB |
SHA1: | F52D4CE9DB42D9545736D17D294C0ED50DFBD1D2 |
SHA-256: | 332F29BFAD5414C74F62610BEC380EFF6478B0246A0C22CB3C36C9C9A64F686D |
SHA-512: | 2349592EF0BECE0CFB16FAC692A69247053FA21A586668EB91FBB0CA755B7163DCE8FA7E03CB7EEB0BBC0E26FACB11DBAEA55EED85C999247984A1D851B98758 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.011524248276206 |
Encrypted: | false |
SSDEEP: | |
MD5: | 66B63B020583C055752809876B59D407 |
SHA1: | FE9BC030E30BCC78F2CC704F5C139FDBB4756EFB |
SHA-256: | 92DAF52A79BC1385522E7166C1D73DB27164A43144AB1D0263E01DFC549C285B |
SHA-512: | 4F57631769D0B73464DC3854524AB476E8C3F23951730C2FFFAA4D8649E2AB6B4346AABD046ADABFB06A99095B4CB3AA6F1E56C137161BE87D729C062D72635E |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.01585101936259 |
Encrypted: | false |
SSDEEP: | |
MD5: | F8C41BDC8A947996E939E26C9717D28F |
SHA1: | D6533B3F2730EDEA705706FDF7873C014DC23866 |
SHA-256: | BD8CFB48BCC03EE5D13CDC4D279A1B35A441A78849DB62CA8102880AD9DFBD98 |
SHA-512: | 1F9EED5E6001E97955E78EC1E2D0BC2673A7C78F8DFFE74DD100A9C98EF2FC8862F66AEFFAB6DEFBF1BD2C700A54E6276514AD1420ECF1437764386A88E3A44D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.010144390544683 |
Encrypted: | false |
SSDEEP: | |
MD5: | 39E4CE720E08B78156C1F2A889EBA8EB |
SHA1: | E20EB8B457B2EA338816B130A67506C85BAFE8E1 |
SHA-256: | 69A394208DBF76F15E27B6BBF23D81F24FA58837A27DE75CA990FC2A5FDEF77C |
SHA-512: | BF447DD2900DFFDC17CA5E3E93419DB2808E3C7F0C9A2768E436896F20D723E9E510C488D5BD4F60421F6FA84879BED41D55D1D7211B7BB5EBC6A64DD582A628 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.995962857160941 |
Encrypted: | false |
SSDEEP: | |
MD5: | 778C02DC15C5F0A26A6C9D71632AFE9C |
SHA1: | A0C8054DF64C37F579B94A2444CC8746C447F54C |
SHA-256: | 63002759F737CF3C36701C1EF91F0A8C001FBB7C191ABE2E41C86A2895ABC16F |
SHA-512: | 782E8ADBAD3082B240B78FA446C849C36CE056E7F578F3CC925273BB9FA355928861DFCA17BCC664424DAFF20633F8A0E96BEE8091CB266FFABC921F851B832B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.00716019099407 |
Encrypted: | false |
SSDEEP: | |
MD5: | E7FAF97DD6E8082A4EB8625B6FC491A2 |
SHA1: | 1AD34124203E630C2ACEE0D1791697028E5399DC |
SHA-256: | 96191E1694A51BDD1BCBB3F6A4D48093543BC7B5A8725CE71247C92FBF43E770 |
SHA-512: | D22513A695136B01BF355F72A6A93F6190A580B61A319EE5F514D7DB9ED4FE63886DECF3392D95172155D1DF4A9FAD16B801B5D6A67FF599BA70D5BBC2E1AA68 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 235 |
Entropy (8bit): | 7.070460869958352 |
Encrypted: | false |
SSDEEP: | |
MD5: | FE0161C3BA8D5CE83CAAA89806829191 |
SHA1: | 1557AF14F4B89B280B58D7AB93114EC6DC034121 |
SHA-256: | D28D8A85F6570AF5DD5CA5AB7CBEA04124645116324D84C7D890AABD79934108 |
SHA-512: | 9D95A096621962525AEB9C908A83D806A3CB9CBD22C6D4B322E303E3935B115DFF3A954D52411A671DE3708189D494A847F6FE363CB30D079DA60645B1D0D53E |
Malicious: | false |
Reputation: | unknown |
URL: | http://res.public.onecdn.static.microsoft/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 233 |
Entropy (8bit): | 7.090889726179065 |
Encrypted: | false |
SSDEEP: | |
MD5: | FE04A47FAB9D8999BE94059713F0D212 |
SHA1: | D67D0D14E3758A5C08ABB97D8FB2F33DE582CD01 |
SHA-256: | FB0F876CED985632D2B46C0FB7EEB97F2E5C266D4E7082737B834D551E776A99 |
SHA-512: | 041A8FDB0A5C3E6632F358C55B90B95C740F3EC03C700D545F4922877EE853743E7F3DDAB879CE5311C3A6AB62FAED1CC434502A336E7D2618C4203117CE7A75 |
Malicious: | false |
Reputation: | unknown |
URL: | http://res.public.onecdn.static.microsoft/ |
Preview: |