Windows
Analysis Report
http://apidevst.com
Overview
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6376 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://a pidevst.co m/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6648 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2072 --fi eld-trial- handle=196 0,i,564188 3058213712 243,435294 4998191655 537,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Timestamp: | 2024-07-25T16:21:20.593426+0200 |
SID: | 2052290 |
Source Port: | 63207 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:21.708503+0200 |
SID: | 2052290 |
Source Port: | 62877 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:27.754859+0200 |
SID: | 2052290 |
Source Port: | 53240 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:03.924539+0200 |
SID: | 2052290 |
Source Port: | 50267 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:42.996905+0200 |
SID: | 2052290 |
Source Port: | 57153 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:04.932511+0200 |
SID: | 2052290 |
Source Port: | 50267 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:21.707893+0200 |
SID: | 2052290 |
Source Port: | 50998 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:00.893104+0200 |
SID: | 2052290 |
Source Port: | 52334 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:00.880879+0200 |
SID: | 2052290 |
Source Port: | 64800 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:06.946458+0200 |
SID: | 2052290 |
Source Port: | 50267 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:01.895967+0200 |
SID: | 2052290 |
Source Port: | 54856 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:00.881141+0200 |
SID: | 2052290 |
Source Port: | 53606 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:27.754681+0200 |
SID: | 2052290 |
Source Port: | 59674 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:23:02.918314+0200 |
SID: | 2052290 |
Source Port: | 50267 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:20.569780+0200 |
SID: | 2052290 |
Source Port: | 63499 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:22:00.831534+0200 |
SID: | 2052290 |
Source Port: | 55570 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:22.725988+0200 |
SID: | 2052290 |
Source Port: | 60301 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:22:00.820136+0200 |
SID: | 2052290 |
Source Port: | 52765 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:28.772525+0200 |
SID: | 2052290 |
Source Port: | 49322 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:28.772829+0200 |
SID: | 2052290 |
Source Port: | 49859 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:20.593768+0200 |
SID: | 2052290 |
Source Port: | 64043 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:20.569613+0200 |
SID: | 2052290 |
Source Port: | 49212 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:30.797894+0200 |
SID: | 2052290 |
Source Port: | 52211 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:22.725834+0200 |
SID: | 2052290 |
Source Port: | 59977 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:22:00.819985+0200 |
SID: | 2052290 |
Source Port: | 53768 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:21:20.604176+0200 |
SID: | 2052290 |
Source Port: | 64444 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:22:00.841830+0200 |
SID: | 2052290 |
Source Port: | 49957 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
Timestamp: | 2024-07-25T16:22:00.830272+0200 |
SID: | 2052290 |
Source Port: | 65249 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Exploit Kit Activity Detected |
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
google.com | 172.217.18.14 | true | false | unknown | |
www.google.com | 142.250.185.164 | true | false | unknown | |
apidevst.com | unknown | unknown | false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
8.8.8.8 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.168.84 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.74.206 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.16.206 | unknown | United States | 15169 | GOOGLEUS | false | |
216.58.206.35 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1482026 |
Start date and time: | 2024-07-25 16:20:43 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://apidevst.com |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.win@19/6@32/98 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 216.58.206.35, 172 .217.16.206, 142.251.168.84, 3 4.104.35.123, 13.95.31.18 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: http:/
/apidevst.com
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.986445578819572 |
Encrypted: | false |
SSDEEP: | |
MD5: | A75EF9C692DD4D093AEAA932A9D3C6F4 |
SHA1: | 3DC0FE647698631886B1D6E34F9AA01941BFB69C |
SHA-256: | 84B42F88DF897545A2583E8CC5FD8D4FD830EDC7C8B886894EA14FAE99E43779 |
SHA-512: | AF2E66DD6C82A4EEAA17208F68DF72EB67C42E54BE11E7F2078D3DB32B3D8C755A84AB222C0AB07EB3099780D4E8F41BDF365185F91FF53E0E0D2BF21CE0F148 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9992724901513483 |
Encrypted: | false |
SSDEEP: | |
MD5: | F2CEA09FE164665FF2DC976E2A5640C7 |
SHA1: | FE7EC88E1177A855AF7E2BB8A55AB8BC91D23A23 |
SHA-256: | A1AFB65DEAF17E73537A7733F3FFB7527A6E0C4EEA02A1CC6B75576356BC2E5E |
SHA-512: | CD6F11DEE603BF57074FE1E34AEE77C555A2C68F9B858CB5B7B3AE6E9616B717D51CF5DBDD25396FEBB55B60298EC63DB045D75B40D88F4851A1EFE4A937B37D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.009010215711237 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5ECD204859322E146938E9883652DE92 |
SHA1: | 8ACD0736973BC5DFFEE78E9994CE9D52DD66580E |
SHA-256: | 286C44DFC8E8D4B5934DAF7865E39926727894F6123B1FBA11451967BDF68777 |
SHA-512: | ABCA1E5E7BFD77CF852EA6C57645AA6065490A7F0E5CCFCE42DD66D9234DF6FE5427618556866EFC4AA4733531EA1A4297DBAFB4784804D3A43C69DBB166ABA6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9993024487070166 |
Encrypted: | false |
SSDEEP: | |
MD5: | 28B2EB648E8F6394EB61AAD66EE3FDB1 |
SHA1: | 93B74207381F075877B6F3C3A821FEEB75A31DB5 |
SHA-256: | 55DB3B61CFBB6D2A900F2206684DB5B94B0D7FD8617FC5978AD7AB7EB80B2CAD |
SHA-512: | 01AC45153CEA6CE72E68F8DC56F7E2F3DB439A91A54A9EBC5BAEAED91C15B89001C7CD31CD1D026DC3A6BAEA8C99050ABCC6B4E7302298F1270594A770E5A42F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.987870794635369 |
Encrypted: | false |
SSDEEP: | |
MD5: | CBC1C8C5F352FBC8FD181422221CA7B5 |
SHA1: | F03628683A10AA6C29D28546E028D30B37A36396 |
SHA-256: | 273B6A6FAAD296AB5FD12945EC9F4E609EF57229497C773105232E35B053D96E |
SHA-512: | 6CA7BCA0D4809DF32C076A9B3DCA0B9271CC60BB1B6977A53B25E1D34E8B953590D478266E86944AC87286FED460337D1ED626DB643E54A6A695BB2C9C5E141B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9989467188883396 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6C7DA3A78C00EF4AEF8A7A8B3762CA10 |
SHA1: | F8B19C1AD5C9A7099CF9EF67D03C729CB0B41532 |
SHA-256: | 58A86235EE1630BAF986D460FCAA779F6E0E134A47453D6DBB66AC632C6747D8 |
SHA-512: | C424588F354DDA977A3DE5C98349DC43C3A868EB494070B28513E2AE1CC27160A7CDB0254F5BDB7D3C514C56DD2E0AE4FC0343F69C08128383BC6D439A43C284 |
Malicious: | false |
Reputation: | unknown |
Preview: |