Windows
Analysis Report
https://irp.cdn-website.com/b8142857/site_favicon_16_1623683434251.ico
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 5344 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) chrome.exe (PID: 1596 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2032 --fi eld-trial- handle=194 4,i,155844 8200762980 6256,17085 2129064999 979,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
chrome.exe (PID: 1340 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://irp.c dn-website .com/b8142 857/site_f avicon_16_ 1623683434 251.ico" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.74.196 | true | false | unknown | |
irp.cdn-website.com | 13.32.99.60 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
108.177.15.84 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
13.32.99.60 | irp.cdn-website.com | United States | 16509 | AMAZON-02US | false | |
172.217.18.3 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.238 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.74.195 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.74.196 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.18 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1528238 |
Start date and time: | 2024-10-07 17:16:57 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://irp.cdn-website.com/b8142857/site_favicon_16_1623683434251.ico |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@16/6@4/55 |
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 142.250.74.195, 14 2.250.185.238, 108.177.15.84, 34.104.35.123 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, clients2.google.com, accou nts.google.com, edgedl.me.gvt1 .com, clientservices.googleapi s.com, clients.l.google.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//irp.cdn-website.com/b8142857 /site_favicon_16_1623683434251 .ico
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.973749914972706 |
Encrypted: | false |
SSDEEP: | |
MD5: | B1B803CAC6027AF27A8549D3B058F417 |
SHA1: | BA8BBECCADBE39299AEDF503D854691EBD2AF886 |
SHA-256: | 21EB60B3C6C74FB6019F04BE459F7F53FB1108DD80541A7B4F0161DDE95F0D2F |
SHA-512: | 2114038E12A2818B47838DC7DC36D38F336C4000E9E5BD62139AA59C0FE99216A3CFF0071BF36CFAF8ECFC11CCAF770E7320B93E40A61DF49E908E5F2DE1B54D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9890305251462856 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6A9A099962AAA962B475CFC8607A70C0 |
SHA1: | A3A63F673F5DEAED58873C9F31D7F41C90AA0D13 |
SHA-256: | 08A40310DDEABF93D381C718C0F9620032289D6544CC39DA05C2CA0022000C4C |
SHA-512: | F7273F96F47C4E851A0D14AED067B921E16DBB44B324909E727360B8DAFD86C7F367E799DF7B810A95072C2EA1F9F29ACCCBBEB9225C6E2A873767767E7D7432 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2691 |
Entropy (8bit): | 3.999040085344338 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5735E5964E8DDBBC50C9BB86884B3566 |
SHA1: | 849BB464EAD629D17C1746A8742D2FBBC573A06B |
SHA-256: | 83D5839DB02F8A3075071AF2BEB14487EE249C270B8F42E4159CD5224E846613 |
SHA-512: | EE815257CA96ED54AF33C3C86F558D7DB8C2A2F7132E0C62AA940B4B48E0DDA400C75DF86F2AC35B92A87A2B8A0476B846FBB19426F94E8F8DE4D9AC17BF6A6F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9880286929579474 |
Encrypted: | false |
SSDEEP: | |
MD5: | D0D4AAD912C05AD279FA2610FD1008AD |
SHA1: | 6C1F265C89DCDF572508D397F0EA267E5C526C30 |
SHA-256: | 61B45F191CA20F1AE53BEB94E34A0409F0A58A308FE7CF1AC66EDDBC244AD577 |
SHA-512: | 20481522EEEA978E0FDDAA77F68C1884EBE52184F96C49C2F5A11D3C7896B5CAA7EFD8AE52B85D9421F38770B5C7508AF87F0302DAEEF067E8412A97FB4649BE |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9758453848811595 |
Encrypted: | false |
SSDEEP: | |
MD5: | ECD269C0E7E26349D1C2426677495DA2 |
SHA1: | 41F93F86CA726907865E6FF78EDFF6F76F39E0AB |
SHA-256: | 340550EE819D3A1ED308C52C56113DF1A89496FFD92CB901A29B7B18A9001AB8 |
SHA-512: | 990CED1880CF788E08971C19B735E49F30ECAE5CDE44C6777054F3B1BD41F6DDBA4D62128B5C5F85081292A65415F491FD589608DAF04A6D4840A27277259DD6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.988335761679219 |
Encrypted: | false |
SSDEEP: | |
MD5: | 47F39AA34E83662286948A54BE2AE3B2 |
SHA1: | 1FB89ADC2A4DB9D9E2FBBE19238902FADE626F1B |
SHA-256: | 807AE5CF8B8C9AB631125088811744C86A37002832522FF182DA69AEE325B7AC |
SHA-512: | 4E9054116368FEDD0CDB6D7B852C56A1E3B2663D880C8F2D2CF4D3C5219393A615D61BA2F1D63EBACA8433981A05889D5BDA6F7C0EA37E89972CBB793D6C9485 |
Malicious: | false |
Reputation: | unknown |
Preview: |