Edit tour

Windows Analysis Report
https://3.64.163.50

Overview

General Information

Sample URL:https://3.64.163.50
Analysis ID:1484879
Infos:
Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 5000 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5800 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 --field-trial-handle=2508,i,17415492344621718780,17106832172963036619,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6388 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://3.64.163.50" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched
Timestamp:2024-07-30T19:02:46.733661+0200
SID:2022930
Source Port:443
Destination Port:49743
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownTCP traffic detected without corresponding DNS query: 3.64.163.50
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: classification engineClassification label: unknown0.win@17/0@2/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 --field-trial-handle=2508,i,17415492344621718780,17106832172963036619,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://3.64.163.50"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 --field-trial-handle=2508,i,17415492344621718780,17106832172963036619,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1484879 URL: https://3.64.163.50 Startdate: 30/07/2024 Architecture: WINDOWS Score: 0 5 chrome.exe 2->5         started        8 chrome.exe 2->8         started        dnsIp3 13 192.168.2.4, 138, 443, 49723 unknown unknown 5->13 15 239.255.255.250 unknown Reserved 5->15 10 chrome.exe 5->10         started        process4 dnsIp5 17 www.google.com 142.250.185.68, 443, 49740 GOOGLEUS United States 10->17 19 3.64.163.50, 443, 49735, 49736 AMAZON-02US United States 10->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://3.64.163.500%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.185.68
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.185.68
      www.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      3.64.163.50
      unknownUnited States
      16509AMAZON-02USfalse
      IP
      192.168.2.4
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1484879
      Start date and time:2024-07-30 19:01:36 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 47s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:https://3.64.163.50
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:UNKNOWN
      Classification:unknown0.win@17/0@2/4
      Cookbook Comments:
      • URL browsing timeout or error
      • URL not reachable
      • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.186.163, 142.250.185.78, 66.102.1.84, 34.104.35.123, 216.58.206.67, 184.28.90.27, 40.68.123.157, 93.184.221.240, 20.242.39.171, 192.229.221.95
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, ocsp.edge.digicert.com, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, www.gstatic.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      • VT rate limit hit for: https://3.64.163.50
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      No static file info

      Download Network PCAP: filteredfull

      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
      2024-07-30T19:02:46.733661+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974340.68.123.157192.168.2.4
      • Total Packets: 32
      • 443 (HTTPS)
      • 80 (HTTP)
      • 53 (DNS)
      TimestampSource PortDest PortSource IPDest IP
      Jul 30, 2024 19:02:21.639179945 CEST49675443192.168.2.4173.222.162.32
      Jul 30, 2024 19:02:31.211657047 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.211699009 CEST443497353.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.211924076 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.211924076 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.211935043 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.212387085 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.212387085 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.212409019 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.214390993 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.214401960 CEST443497353.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.245992899 CEST49675443192.168.2.4173.222.162.32
      Jul 30, 2024 19:02:31.909228086 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.909416914 CEST443497353.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.909476042 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.909490108 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.909581900 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.909588099 CEST443497353.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.910561085 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.910618067 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.910729885 CEST443497353.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.910789967 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.911806107 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.911974907 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.912033081 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.912084103 CEST49736443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.912096977 CEST443497363.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.912755013 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.912801981 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:31.912925005 CEST443497353.64.163.50192.168.2.4
      Jul 30, 2024 19:02:31.912969112 CEST49735443192.168.2.43.64.163.50
      Jul 30, 2024 19:02:33.493479013 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:33.493524075 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:33.493597031 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:33.493952990 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:33.493967056 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:34.151705980 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:34.151921988 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:34.151936054 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:34.152982950 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:34.153053999 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:34.154426098 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:34.154623032 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:34.200551033 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:34.200566053 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:34.244936943 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:44.038307905 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:44.038383007 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:44.038436890 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:45.758080006 CEST49740443192.168.2.4142.250.185.68
      Jul 30, 2024 19:02:45.758111000 CEST44349740142.250.185.68192.168.2.4
      Jul 30, 2024 19:02:48.772728920 CEST4972380192.168.2.4199.232.210.172
      Jul 30, 2024 19:02:48.778274059 CEST8049723199.232.210.172192.168.2.4
      Jul 30, 2024 19:02:48.778352976 CEST4972380192.168.2.4199.232.210.172
      TimestampSource PortDest PortSource IPDest IP
      Jul 30, 2024 19:02:29.471615076 CEST53643031.1.1.1192.168.2.4
      Jul 30, 2024 19:02:29.491219997 CEST53582521.1.1.1192.168.2.4
      Jul 30, 2024 19:02:30.485757113 CEST53564941.1.1.1192.168.2.4
      Jul 30, 2024 19:02:31.994138956 CEST53506251.1.1.1192.168.2.4
      Jul 30, 2024 19:02:33.483428955 CEST5822253192.168.2.41.1.1.1
      Jul 30, 2024 19:02:33.483580112 CEST5063753192.168.2.41.1.1.1
      Jul 30, 2024 19:02:33.490973949 CEST53582221.1.1.1192.168.2.4
      Jul 30, 2024 19:02:33.491329908 CEST53506371.1.1.1192.168.2.4
      Jul 30, 2024 19:02:47.489253044 CEST53652721.1.1.1192.168.2.4
      Jul 30, 2024 19:02:49.299597979 CEST138138192.168.2.4192.168.2.255
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Jul 30, 2024 19:02:33.483428955 CEST192.168.2.41.1.1.10xd223Standard query (0)www.google.comA (IP address)IN (0x0001)false
      Jul 30, 2024 19:02:33.483580112 CEST192.168.2.41.1.1.10x9704Standard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jul 30, 2024 19:02:33.490973949 CEST1.1.1.1192.168.2.40xd223No error (0)www.google.com142.250.185.68A (IP address)IN (0x0001)false
      Jul 30, 2024 19:02:33.491329908 CEST1.1.1.1192.168.2.40x9704No error (0)www.google.com65IN (0x0001)false
      Jul 30, 2024 19:02:47.710247040 CEST1.1.1.1192.168.2.40x765fNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Jul 30, 2024 19:02:47.710247040 CEST1.1.1.1192.168.2.40x765fNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
      05101520s020406080100

      Click to jump to process

      05101520s0.0050100MB

      Click to jump to process

      Target ID:0
      Start time:13:02:24
      Start date:30/07/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:13:02:27
      Start date:30/07/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 --field-trial-handle=2508,i,17415492344621718780,17106832172963036619,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:13:02:30
      Start date:30/07/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://3.64.163.50"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

      No disassembly