Windows
Analysis Report
phish_alert_sp2_2.0.0.0 - 2024-10-14T143610.340.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 7116 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\phis h_alert_sp 2_2.0.0.0 - 2024-10- 14T143610. 340.eml" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 6240 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "01E 8992E-80A1 -413E-9AC1 -607868438 4B2" "268F 9226-BCD4- 4F11-B91D- 5F5EA72A95 4B" "7116" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 5492 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// www.amazon .com/a/c/r /x0bcRZ2VM ef4tPrE77V klgIkN MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 936 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2172 --fi eld-trial- handle=195 6,i,131384 3726182120 6712,16573 1936903818 45994,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7712 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// www.amazon .com/gp/f. html?C=LLJ FP8MEWM3T& K=10INX0DJ 82T68&M=ur n:rtn:msg: 2024101416 2056cb2436 f68d33494c 8b835aab7b c0p0na&R=2 05E5DHOCDF PV&T=C&U=h ttps%3A%2F %2Fwww.ama zon.com%2F a%2Fc%2Fr% 2Fx0bcRZ2V Mef4tPrE77 VklgIkN%3F ref_%3Dpe_ 44305210_5 79583930&H =0ZPAOSVC9 DMZ7WONQOA FMWIIXQ8A& ref_=pe_44 305210_579 583930 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7888 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2024 --fi eld-trial- handle=193 2,i,403425 2152245162 802,136566 5374335990 8747,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Persistence and Installation Behavior |
---|
Source: | LLM: | ||
Source: | LLM: |
Source: | LLM: | ||
Source: | LLM: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 2 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 13 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.185.100 | true | false | unknown | |
c.media-amazon.com | 13.32.47.116 | true | false | unknown | |
d3ag4hukkh62yn.cloudfront.net | 99.86.8.42 | true | false | unknown | |
media.amazon.map.fastly.net | 151.101.129.16 | true | false | unknown | |
www.amazon.com | unknown | unknown | false | unknown | |
m.media-amazon.com | unknown | unknown | false | unknown | |
images-na.ssl-images-amazon.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.184.195 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.35 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
99.86.8.42 | d3ag4hukkh62yn.cloudfront.net | United States | 16509 | AMAZON-02US | false | |
108.138.1.219 | unknown | United States | 16509 | AMAZON-02US | false | |
52.109.89.18 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
20.189.173.2 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.185.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
2.19.126.160 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
13.32.47.116 | c.media-amazon.com | United States | 16509 | AMAZON-02US | false | |
151.101.129.16 | media.amazon.map.fastly.net | United States | 54113 | FASTLYUS | false | |
142.250.184.238 | unknown | United States | 15169 | GOOGLEUS | false | |
2.19.225.143 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
52.109.76.243 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
66.102.1.84 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1533532 |
Start date and time: | 2024-10-14 20:37:21 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | phish_alert_sp2_2.0.0.0 - 2024-10-14T143610.340.eml |
Detection: | MAL |
Classification: | mal48.winEML@24/36@14/93 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.76.243, 52.113.194.132, 2.19.126.160, 2.19.126.151
- Excluded domains from analysis (whitelisted): ecs.office.com, omex.cdn.office.net, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, weu-azsc-config.officeapps.live.com, prod.roaming1.live.com.akadns.net, eur.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, neu-azsc-000.roaming.officeapps.live.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, s-0005.s-msedge.net, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net, a1864.dscd.akamai.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: phish_alert_sp2_2.0.0.0 - 2024-10-14T143610.340.eml
Input | Output |
---|---|
URL: Email Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "There's an order ready for your approval", "prominent_button_name": "Approve or Deny", "text_input_field_labels": [ "When", "Device", "Near" ], "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: Email Model: claude-3-haiku-20240307 | ```json { "brands": [ "Amazon" ] } |
URL: Email Model: jbxai | { "brands":["Amazon"], "text":"MARK JOHNSON, There's an order ready for your approval When: Oct 14, 2024 12:20 PM Eastern Daylight Time Device: Fire HD 10 (11th Gen) Near: Connecticut, United States Approve or Deny. Is it safe to follow this link? The link provided in this email starts with \"https://www.amazon.com\". If you prefer, copy the following link and paste it into a browser to view. https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VkIgIkN", "contains_trigger_text":true, "trigger_text":"Approve or Deny.", "prominent_button_name":"unknown", "text_input_field_labels":"unknown", "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "There's an order ready for your approval", "prominent_button_name": "unknown", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "To secure your account, tap 'Continue' and confirm.", "prominent_button_name": "Continue", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: jbxai | { "brands":["Amazon"], "text":"There's an order ready for your approval", "contains_trigger_text":true, "trigger_text":"There's an order ready for your approval", "prominent_button_name":"unknown", "text_input_field_labels":"unknown", "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: jbxai | { "brands":["Amazon"], "text":"There's an order ready for your approval", "contains_trigger_text":true, "trigger_text":"Are you sure?", "prominent_button_name":"Continue", "text_input_field_labels":["To secure your account, tap 'Continue' and confirm."], "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: claude-3-haiku-20240307 | ```json { "brands": [ "Amazon" ] } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: claude-3-haiku-20240307 | ```json { "brands": [ "Amazon" ] } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN Model: gpt-4o | ```json{ "legit_domain": "amazon.com", "classification": "wellknown", "reasons": [ "The URL 'www.amazon.com' matches the legitimate domain name for the brand 'Amazon'.", "Amazon is a well-known global e-commerce brand.", "There are no suspicious elements in the URL such as misspellings, extra characters, or unusual domain extensions.", "The domain name is fully matching with the legitimate domain name associated with Amazon." ], "riskscore": 1} |
URL: www.amazon.com Brands: Amazon Input Fields: u, n, k, n, o, w, n | |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "There's an order ready for your approval", "prominent_button_name": "unknown", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": true, "has_visible_qrcode": false } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: jbxai | { "brands":["Amazon"], "text":"There's an order ready for your approval", "contains_trigger_text":true, "trigger_text":"There's an order ready for your approval", "prominent_button_name":"unknown", "text_input_field_labels":"unknown", "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: claude-3-haiku-20240307 | ```json { "brands": [ "Amazon" ] } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "To secure your account, tap 'Continue' and confirm.", "prominent_button_name": "Continue", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: jbxai | { "brands":["Amazon"], "text":"There's an order ready for your approval", "contains_trigger_text":true, "trigger_text":"There's an order ready for your approval", "prominent_button_name":"Continue", "text_input_field_labels":["To secure your account, tap 'Continue' and confirm."], "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: claude-3-haiku-20240307 | ```json { "brands": [ "Amazon" ] } |
URL: https://www.amazon.com/a/c/r/x0bcRZ2VMef4tPrE77VklgIkN?ref_=pe_44305210_579583930 Model: gpt-4o | ```json{ "legit_domain": "amazon.com", "classification": "wellknown", "reasons": [ "The URL 'www.amazon.com' matches the legitimate domain name for the brand 'Amazon'.", "Amazon is a well-known global e-commerce brand.", "There are no suspicious elements in the URL such as misspellings, extra characters, or unusual domain extensions.", "The URL structure is simple and does not contain any additional words or hyphens that could indicate phishing." ], "riskscore": 1} |
URL: www.amazon.com Brands: Amazon Input Fields: u, n, k, n, o, w, n |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.378827043397039 |
Encrypted: | false |
SSDEEP: | |
MD5: | DFC2A10D76F37CEF867918FCE679ABF4 |
SHA1: | 665A82AE1527D55B1EEA5B26EA5246A6DF4484F9 |
SHA-256: | 10C6DA19CFDE8E2AB9A1A8C9C20724059FAD9C86463C46FB1CBE771CBDDD6984 |
SHA-512: | DB5FF82A0DE61B4BAF5FC03CB7745CB6A62460628FEFA9E62E8419DF3CADB088C9C6D4226646F518165166061C38E29D3B1B6A2F71BAAFAB02A08C7A81A43153 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 322260 |
Entropy (8bit): | 4.000299760592446 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC90D669144261B198DEAD45AA266572 |
SHA1: | EF164048A8BC8BD3A015CF63E78BDAC720071305 |
SHA-256: | 89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 |
SHA-512: | 16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.9219280948873623 |
Encrypted: | false |
SSDEEP: | |
MD5: | 310FBD36FFABF9F097DD8C594161DCF2 |
SHA1: | E13ED9E247A30D7C885904CDFEE18AEEBAC82921 |
SHA-256: | 2FDB6C4F833584BC34ED8A7D6DC28ED5C60B8760336F210A64849C5137947670 |
SHA-512: | B0D42C67F656E55E023BD67D399C3BB2C5606982C0AD1B1CCABD47EB85740F73D5F6ED1B43CE06A4D8F0B8CA392ADADBD72A06D91183C3DB236D6B77D5AE6803 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\1263EA7F-B69A-426D-9B5D-7E143308BF19
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 178099 |
Entropy (8bit): | 5.290536417797002 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1101C058319A3EB067030F89DB9D6A1D |
SHA1: | 5420ADA8CC190274B540EBB6249854209C806F56 |
SHA-256: | 4DCDC73742E2F19110CDA86D87C254FDD10B8F631D7303AA19C5A202DB8B1554 |
SHA-512: | F37E44D4A518281980A795EBEBD59E98F61D4BA647488FAB8A8649C60869A51DD6C53EF68C15F036E574287629F1D41071C2B5C664432186BC2382EA878A3AFC |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 0.09304735440217722 |
Encrypted: | false |
SSDEEP: | |
MD5: | D0DE7DB24F7B0C0FE636B34E253F1562 |
SHA1: | 6EF2957FDEDDC3EB84974F136C22E39553287B80 |
SHA-256: | B6DC74E4A39FFA38ED8C93D58AADEB7E7A0674DAC1152AF413E9DA7313ADE6ED |
SHA-512: | 42D00510CD9771CE63D44991EA10C10C8FBCF69DF08819D60B7F8E7B0F9B1D385AE26912C847A024D1D127EC098904784147218869AE8D2050BCE9B306DB2DDE |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4616 |
Entropy (8bit): | 0.1384465837476566 |
Encrypted: | false |
SSDEEP: | |
MD5: | FFC6230887E17AECBEEAF3DB72333B83 |
SHA1: | DCE231AB92D4E91E4FB7FCE1ADFA2B87353518D0 |
SHA-256: | 7A5DC495E86F05A66A294F87CDB4B71D902583169A83F879A6262206A21B5131 |
SHA-512: | DE72557F623557D57F27D344C7937A2A81E4149193FE4337013FBDF0734E37E0F0DDCDD7F90D99CD258A7021FBCD989328FB7485228CA1F3C6AC22E052F315E2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.0447824104283491 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2B59ECDAB849E80977B799FF57EDBE74 |
SHA1: | 8C7E3CE237B39171A41ECDFAE38E404F225C74CF |
SHA-256: | 96E3506121263E0558C662125CEE0F7265D81E6FA8FA07B2EC1E9A3197823CC8 |
SHA-512: | 24FB9D248FCEE2A869C28F14B751E916A3479C30BC7FE980BE2A7FDB97C4D540E25E5EABA0AE7F315B85EEC5D0C63AF7106C8118CAF3DE1DCB60378AE79F6E0A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 45352 |
Entropy (8bit): | 0.3937694664183705 |
Encrypted: | false |
SSDEEP: | |
MD5: | B0DC540AEC13B72F481752F871F3AE18 |
SHA1: | AD36891E6593BD9A56EEA40E71CAA20F04DC3AE6 |
SHA-256: | 3B49B6EA6F9C898CE44DDD5CC95CD159072AD91EFB5B08346CD85A87A3A349FC |
SHA-512: | 8F746D7C2743B20AE59D7C3A40E5CEAC03FC5F73C15AE1A497055021D7351639D4CB39EF7C9F29EA76960F61D4003D7690466020A8452E942C564255940BF173 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{6206218B-D2B7-458D-9A7B-E3A79FA7A234}.tmp
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 7428 |
Entropy (8bit): | 4.253424002716362 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2AEA5845CF40B1C5F18904AC9FB4685D |
SHA1: | B5A7570C17ADDC39063AE678501D8D8E79BFA69C |
SHA-256: | A83EE91BBF6585FB144A419DDF41EEBAEDC7A75B19CFE0E83EDD16374C4945AC |
SHA-512: | 4483A7AB215514CC4EBCD9AE3108352B4555976A5C3E27B41E13B0DB03EAC6D04234A4523C91A128FC2EC89EE72E6B7AF10D69B32160259763EEEA118A2FBC89 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1728931073955941500_50CB7BD8-7747-4E2C-9B34-18C2252FC158.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.16175862184147075 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9042D0C7392FC7BEF536F79D4F0B3549 |
SHA1: | 0A740EEA8BA0010B116C7AE6F7421D047E9E86F9 |
SHA-256: | 22007B0CF329B158628B43741E65C59BC731EFC66CBABE11A94DC0F440DB7FB7 |
SHA-512: | 14489F8CC33A989BC799902C9B22F313ED238558191D46B795D151DECC58F7A217EE25957D89382EBA744AA67F1030A714C79E62FC7D23F9BE18C1DDE6C2390A |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1728931073956895200_50CB7BD8-7747-4E2C-9B34-18C2252FC158.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241014T1437530760-7116.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 102400 |
Entropy (8bit): | 4.4691144909553895 |
Encrypted: | false |
SSDEEP: | |
MD5: | AB162C7481B8708EF423684612C2292E |
SHA1: | 63588D1A68FF96F05A0186189188F4806C2708DC |
SHA-256: | E76A5B4F91370146ACD69552BA093F250A068BE2AFEC1A4CCA185A8FA2680451 |
SHA-512: | 457E7FBA19356B02F9A21D29AABDA2380B977B69783CB49BDB55786CE0E1C0EBCB9945C3A7EDC403919CF803C668E4CED15B4A741C0B6A3FF5E348B8C33E7339 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | A2E5FFFE5E9D71A8B80197CD4F83B1DA |
SHA1: | FB98C3B4DE8581ECB86CC2281C27119B59A50CA8 |
SHA-256: | 95E7F6A76505708FB698F0BDD27293AFD6AC1F4F82CEBD7FDE7A6E96D41D2543 |
SHA-512: | ABE38834F57EC8632F119A7052FF984F78AAE2238425E09A95E444DCD3AD63ABB8CEEDBAE6E39C23C6BBFC24B0565E919BFC9B6F900089E944DCF2109B2B0390 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.670299540857104 |
Encrypted: | false |
SSDEEP: | |
MD5: | 69BD1819CD4D72D3507874843A07ECFF |
SHA1: | 9F7920299FD2EE209BDAEBB24EE331158890C1BA |
SHA-256: | A1F399F37D685C63CF84246AB5D07C791135E3CA23C2D155B7DDEABF95C77791 |
SHA-512: | BB6563D9ACF45EDE45821DCB96217E40CF75FDADDFE5E0DB72E327DE5979AE6FAF0F27AC4D25DA81BD58AC14E3BFB0A94DB4128A6DD3801492E0B2DAE4DEBA41 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.989333018646853 |
Encrypted: | false |
SSDEEP: | |
MD5: | D33B66D67B651FFF03530DCD01AC068F |
SHA1: | 401EF509F4E47A5B6DBB89070CE67B7338DC4896 |
SHA-256: | 69CB28509134DD56BD2493CAD111947BD17F02C8AFFAE797E2AC5A8A184CE199 |
SHA-512: | 8128C4B99BC076F144B3181BE2F0DA0A875698FB2C654118BF966BC8D9D2B9BCA3A40F200B40F87E0E975DD6533414A27E609616EFD07FC27CAEFC670C0D233C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.004408741056881 |
Encrypted: | false |
SSDEEP: | |
MD5: | C267E9DD68EF87D8A2C1A3BAFB81922E |
SHA1: | E6BD622EDE3F5AB448888D3DDF08672D0B741232 |
SHA-256: | F800592982C2312A0FBD25E250C730ED391AF7F45DF13BC51487CCEF09407C58 |
SHA-512: | 14C52EADAF170229145285AB3584BF90D016F8CF404F277BF471773FEBAA2F6089CB63FC8E169857C8DCE418246BA144C74B9CB2A5DA27F63FA10A875F925729 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.0121747577446065 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5B8A24BDC59F6D9FDAF81EBEA4591D6A |
SHA1: | 1B0FAF4FB4090E33DF12C5874E62C122C429A0E3 |
SHA-256: | 42929EF5341E79A1A081512391241218B34CE4DFF879253B53FD49CA885DB823 |
SHA-512: | 10C12D6CB31EA5AA08B2DA9BFFDF2A3CD06E96693CDE336DAF4AA3F7DB3A147031A70AC047B61B6D1CE02BF0295637A236391FA906A90D5C5C57524DB3F50CAA |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.0029476935313735 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9B52CF3F64F0724CE62FB73153974CAE |
SHA1: | 8E258D23D5D32941D42F56988E87E83941ACCDB3 |
SHA-256: | 85F8AEDEA91EFD95B223C5DD39DAEFC8259D4B0F22882C24FAED671DBB18E0C9 |
SHA-512: | 4D36F3E92FCD30694FAC73C1D7304FFA9C9D61B83D4765582115BE4CB0C20131FE8C943460FD2F46D4E81D99F585235D4135DF6B0C9266CD6EDBAAAA42D69891 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9904651186656004 |
Encrypted: | false |
SSDEEP: | |
MD5: | FC611CC03F4B28A072269ED3D5BD8759 |
SHA1: | D7B111F34B10C90C653E850B3DA3B30454C09ED1 |
SHA-256: | 6E3C5E7DFE70E082F81787A5DF6FA096105E4867800AB4FB701858855E254725 |
SHA-512: | E661DC196F011BD0F99417B684E2B9D9849513D8FC0B4F98EEEADD3D3260C4E667D79662C25CB0545A7BE3C91BA4BBA8EAD7BCF8646A4AE20CCAB587F2AB61AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9993957720526105 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC117B64A71DAF9BB7AD30F01D170DA4 |
SHA1: | 6CB90AAE63F005F8D1B84C9CA19F0ADA624DBD0E |
SHA-256: | 88E2C87DEA68ED78504DC35CA95830091689C4981CED75354FCA2F3C7B63C858 |
SHA-512: | 1BEC0507067C919D3806D8EDD172FE437A0CC7D4D814861C3C51B72AC83516DE71ADCF05AB96AA3578D0242617D193113445911BB78381E55CFCF2C71E9048D7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 2.687898590456985 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2B1C9A18DC4A68AF8F9A09FF94530222 |
SHA1: | EF5B5BAE1B5BE6E260C90162DF7ABD5C50357D94 |
SHA-256: | 0D858A14EBEBE4975DF90794FC926D74BE3507DEADB2FC25BBE296B2B0057C56 |
SHA-512: | 61CF13FD52FA5CE8623F993AF1BEFB55167FB1EDE56AA58F878380C80A46FA3512A6B10BFEA465DE40C0FE4F44171FAFF479CF05C734DFAA5F9943CFA13368A7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 2.971838935993398 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0B2C250D656657A256B62F28EB942127 |
SHA1: | E04B5D98A1F83CE123F5C789405D16EBD66AB792 |
SHA-256: | CF87C6E5CE1F0CF6D2B84DB65CD3ECC8851DDE44228CC2FAB963E55FAC0F4C5E |
SHA-512: | E5E37910992EBE8E1B2EBF525A5F880E9FEAA44E5FE4242D7906E97339C1D77F4240A7FA476B8825389CAA0F6371DEFCCB71F917F8D5133FBFC97CFD13941018 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17448 |
Entropy (8bit): | 7.988215424387779 |
Encrypted: | false |
SSDEEP: | |
MD5: | 48B83F7B9CF25C402AC0946A957F74BA |
SHA1: | 80FF7ABA37DD1FF5A6B90233A19E3A780A96DC2F |
SHA-256: | E27466D19D5B9459F659FACA4609650719F1AA6E9ABCD5BAB91E1A3BA63AC2F0 |
SHA-512: | 43CF9FB0EDFAECE5D3B3ED390C18383D7126D3551B2008FF6ACC8D37887603FAB5011DB63117496D275417C1C5326FF537011F97468ECDE2CA1973AEBB209343 |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/2SazJx$EeTHfhMN.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 27920 |
Entropy (8bit): | 7.99242211313595 |
Encrypted: | true |
SSDEEP: | |
MD5: | 0F85A003B4D8AFBFEDD8118278061C34 |
SHA1: | 245045FA7DE5DF027437F47209A5ADD3B48108A1 |
SHA-256: | AFF8DAE3B2DD2A0FD5C5CE60670CBBCA15A1F5BFAFCD70D13AD002EF920920F3 |
SHA-512: | 69206330B785407D74A86D2916A13BC1311DC52218BE3B9F4629971E540D9C2FA6ECE1B2AF82404858242728B6F4079677187D3DED6524C550B2B4F8FD42E8B4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/Dv1WQ5DdeMS5qP7.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 21508 |
Entropy (8bit): | 7.989562036604764 |
Encrypted: | false |
SSDEEP: | |
MD5: | 49A8476C4C1CBBE861D58EE73146477F |
SHA1: | FAC44C6A6EB11604F6CB0A9901566FAFC93080E3 |
SHA-256: | 5D2E0937AFADFE093EB3FFDB36AC561DA423F81A9DFBC0A875CE29D32584B6F4 |
SHA-512: | 485419C61167DE6851CC9D9A73B5F9691F6D01465AE81670F7C82A0F97D5C60F67F7A174A1C0094BD51411E00E6D3AC0A69D9ED7DDFBB959E09F46491945D915 |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/VjTR4RqBzY0mUYx.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 28598 |
Entropy (8bit): | 7.946117721484674 |
Encrypted: | false |
SSDEEP: | |
MD5: | AA9067518A5C2167AB0C50E91647E2AE |
SHA1: | A340943F4584CCBD156E53AD45E802217710113E |
SHA-256: | 48FE67856B7307F9F319C9E8524546A1910D3DB3F45B3AB14C2EFD37EE862F20 |
SHA-512: | 562732A97368888F781DF3BEEDD16307CE477CDCDFCC7776CA7E926718DA8ACCF098B24AEFE3FA0401C8ABD68FC62777FF2CD81EC6F4E1F2C9E8F3DA0FEB4521 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 29240 |
Entropy (8bit): | 7.993601718527624 |
Encrypted: | true |
SSDEEP: | |
MD5: | C58D60F633A61A473A746505B4373194 |
SHA1: | 32110B329B0FF64B386960BCEC4E61964EDEAA17 |
SHA-256: | 823E37B5143B1B90333E54B872BDB8D40B9F12AD98547D30874FA6350D09A9F3 |
SHA-512: | 800F34827D7913082944F2F3C58D978CB58042B4C198A0CBD773D676245281D17DC58246BDA9F75504C340C19AA5E5B603BC790184F4FD3655319BAA56720343 |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/ozb5-CLHQWI6Soc.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 338942 |
Entropy (8bit): | 5.377397017457609 |
Encrypted: | false |
SSDEEP: | |
MD5: | C8C63005E5685422975D6FD0F122081D |
SHA1: | A3235C77E499BE1E421626874D60A52901C9E4A3 |
SHA-256: | 20E15D023893FEA42887AE854C1FD7AD3135279AD589B31D8FDE0CD270D1A970 |
SHA-512: | A4ADB58B7B2A9EDF7D3F9042F7C6FAC3B4E49D0AA6BCF071FCAB93135BEAEEBEA6F8911951681721A02C8B7B1DB23537281F0766305AD3CD2B5FB436F1D1D2BF |
Malicious: | false |
Reputation: | unknown |
URL: | "https://images-na.ssl-images-amazon.com/images/I/61XKxrBtDVL._RC%7C11Y+5x+kkTL.js,51106gSDnJL.js,11yKORv-GTL.js,11giXtZCwVL.js,01+z+uIeJ-L.js,01VRMV3FBdL.js,21SDJtBU-PL.js,012FVc3131L.js,11rRjDLdAVL.js,51H19hJRYrL.js,11kWu3cNjYL.js,11tMohjWmVL.js,11OREnu1epL.js,11wcWdhrnDL.js,21ssiLNIZvL.js,0190vxtlzcL.js,51+N26vFcBL.js,01JYHc2oIlL.js,31R9m8rig5L.js,01ezj5Rkz1L.js,11+RxVdhNcL.js,31o2NGTXThL.js,01rpauTep4L.js,01KFkXJxMTL.js_.js?AUIClients/AmazonUI" |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17336 |
Entropy (8bit): | 7.986832176880709 |
Encrypted: | false |
SSDEEP: | |
MD5: | B39E082C6B983705892045FD87E0B9A8 |
SHA1: | 9CC1BB64EB270135F1ADF3A4881C2EE5E7C37BE5 |
SHA-256: | CB0F25CA005489D2399434C33762F291BD8746714EAE3AA72DE20ACA08EDC458 |
SHA-512: | DDBB8B598854DD829BEFB27641B1C56F23FCE55283D3FA33F0BFDA1C3B38CE7DC03A799E84902C580BA8A54361D33A49038368C96D9FCDE6A50FE83514774D17 |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/WOnTLzkiaEccV7F.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 180988 |
Entropy (8bit): | 5.02624081385034 |
Encrypted: | false |
SSDEEP: | |
MD5: | 57C6E9B1176EC402644759138C2789D4 |
SHA1: | A5721FA2112B9AC5BF24DAE2011A3EAAA7ABBE04 |
SHA-256: | 227227E725825D15D777D52DB691B81386E7CB0E329F7E87BB51916BBCFCCA83 |
SHA-512: | 8CD9F4628D07C6BC5819E5BE3548A043F511C93AF46BD3D2B258008F82A0060162DB887408E1B3A85AE6CB821F3E0B2113BF4B1B8709880559BF09E99B327F20 |
Malicious: | false |
Reputation: | unknown |
URL: | "https://images-na.ssl-images-amazon.com/images/I/11EIQ5IGqaL._RC%7C01ZTHTZObnL.css,41wZkyTaWoL.css,31Y8m1dzTdL.css,013z33uKh2L.css,017DsKjNQJL.css,0131vqwP5UL.css,41EWOOlBJ9L.css,11TIuySqr6L.css,01ElnPiDxWL.css,11bGSgD5pDL.css,01Dm5eKVxwL.css,01IdKcBuAdL.css,01y-XAlI+2L.css,21N4kUH7pxL.css,01oDR3IULNL.css,41CYNGpGlrL.css,01XPHJk60-L.css,114y0SIP+yL.css,21aPhFy+riL.css,11gneA3MtJL.css,21fecG8pUzL.css,01ulGzBW88L.css,01CFUgsA-YL.css,31C80IiXalL.css,11qour3ND0L.css,11gKCCKQV+L.css,11061HxnEvL.css,11oHt2HYxnL.css,013RDhw9hoL.css,11JQtnL-6eL.css,116v6uYvN6L.css,11jtXRmppwL.css,01QrWuRrZ-L.css,21zuRztKjtL.css,11QyqG8yiqL.css,11K24eOJg4L.css,11F2+OBzLyL.css,01890+Vwk8L.css,11Y05DTEL6L.css,01cbS3UK11L.css,21F85am0yFL.css,01giMEP+djL.css_.css?AUIClients/AmazonUI" |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16616 |
Entropy (8bit): | 7.986966282975233 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4AFCD3B79B78D33386F497877A29C518 |
SHA1: | CC7EBAA05A2CD3B02C0929AC0475A44AB30B7EFA |
SHA-256: | CDED49F94FC16DC0A14923975E159FBF4B14844593E612C1342C9E34E2F96821 |
SHA-512: | 2DC9FFF1D57D5529C9C7BFF26FA9F3F94ADC47E9CEF51D782E55ECF93045200140706AB5816DFD4A0B49B8DB2263320FA2F0FA31A04E12D0C91FEA79B127255D |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/pDxWAF1pBB0dzGB.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21550 |
Entropy (8bit): | 7.91806209600598 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9E8500E037B11113FAB1203FD5FC3225 |
SHA1: | 8A38DE74DE61C0B7310EA41A0737FF5FF79B27EC |
SHA-256: | 678178853400CF330B026757894259C3B246F35BF350A18FA2CE3F4BE4FE6F78 |
SHA-512: | 9966C8428DDBFF463FC59919B1071BCC1BAB64D9BFC6C2F6A4A6EDEA3DC380D39573542D75EAF717EE4C5CAA6FC5F65E2BD3ACEBEAD4DF63AA69FCE23C865008 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16460 |
Entropy (8bit): | 7.987708256804987 |
Encrypted: | false |
SSDEEP: | |
MD5: | 15E17F26C664EE0518F82972282E6FF3 |
SHA1: | 46B91BDA68161C14E554A779643EF4957431987B |
SHA-256: | 4065B43BA3DB8DA5390BA0708555889F78E86483FE0226EF79EA22D07C306B89 |
SHA-512: | 54EADB53589C5386A724C8EEA2603481EBB23E7062FD7BFAB0EAFE55C9E1344F96320259412FB0DC7A6F5B6E09B32F6907F9AAA66BCA5812D45157E3771C902F |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/KFPk-9IF4FqAqY-.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23220 |
Entropy (8bit): | 7.992386121959413 |
Encrypted: | true |
SSDEEP: | |
MD5: | 3A49BFC56868E37D88AF0A8C98502AF0 |
SHA1: | 70056995A9F3A8AF43162ECB4D14399F0A1258F2 |
SHA-256: | 2931B4FEF361FB14CEBE167B5C0827F3C00D0651B4AE34AF1EBDA1BCC261C254 |
SHA-512: | 9C1CFEA187895BD8B0532609EF338497BB803689BEB7D71C2FBA06CBA3F9FBDF8FDC2623E7C448A544930744204458D323927FEF8C0CF190D12AB8BA58F62BEA |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/KwhNPG8Jz-Vz2X7.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16237 |
Entropy (8bit): | 7.914373477606932 |
Encrypted: | false |
SSDEEP: | |
MD5: | 52B8D386D2B1D407C71A4AE966B61ADD |
SHA1: | B962650FFFC15637F0D9F57C332702459F084B7B |
SHA-256: | D47C1E50DB91BB597B75EDC63362CD0C568E4F5F15A3F8BE1B6ADFF24E89E447 |
SHA-512: | C6B69AF93D0683324A86CBEE5575E42A293C8588267C49034D1CC9AB3635034897838F9D5EA665B694C90D72CFE2B3F462CAD907CC74749E9AF863A90D233998 |
Malicious: | false |
Reputation: | unknown |
URL: | https://m.media-amazon.com/images/S/sash/McBZv0ZvnbehkIx.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17542 |
Entropy (8bit): | 2.247918084411713 |
Encrypted: | false |
SSDEEP: | |
MD5: | CA6619B86C2F6E6068B69BA3AADDB7E4 |
SHA1: | C44A1BB9D14385334EB851FBB0AFB19D961C1EE7 |
SHA-256: | 17D02E2DB6DBEDB95DD449D06868C147AC2C3B5371497BCB9407E75336A99E09 |
SHA-512: | 30F8F8618BFBCD57925411E6860A10B6AD9A60F2A6B08D35C870EA3F4CEC4692596A937FF1457CEFF5847D5DA2B86CEBA0200706625E28C56A2455E6A8C121D3 |
Malicious: | false |
Reputation: | unknown |
Preview: |
File type: | |
Entropy (8bit): | 5.946815047251555 |
TrID: |
|
File name: | phish_alert_sp2_2.0.0.0 - 2024-10-14T143610.340.eml |
File size: | 15'511 bytes |
MD5: | 1d4079e26e68e03bcf15e84051360cf8 |
SHA1: | a5ee44215c94a70fc29b8dccd7fda64d10373d46 |
SHA256: | bfe70b7b3faeb21d584d40fe063a97f1853be53142b0dc56dedcf2ce09c03d30 |
SHA512: | 7eb8ea2ef8db9d7de15e351d264f7dfdad6e623a1d205c6a9e3b024c2ae5e41aac74e2c78b46b4d3530c81c920decf690e8c9e31ae6255019edcbcc0da929d53 |
SSDEEP: | 192:9aNipuIvMmttdPvayIncmyRwzfyZ/JdcDQACs28zWo+dAGAhCzj7t7hxoz3Pwrol:9aNGrJt3t/xdcY/sW1+/0+kUeBenCs |
TLSH: | 70625AD1AE0531B626B4ABC4D8317E52D3D0586F97F2A4C0BD9E8692EF8D43413123BE |
File Content Preview: | Received: from SA1PR22MB5044.namprd22.prod.outlook.com.. (2603:10b6:806:3c9::10) by SN7PR22MB4126.namprd22.prod.outlook.com with.. HTTPS; Mon, 14 Oct 2024 16:21:06 +0000..Received: from SJ0PR05CA0148.namprd05.prod.outlook.com.. (2603:10b6:a03:33d::33) by |
Subject: | [EXTERNAL] amazon.com: Purchase attempt |
From: | "amazon.com" <account-update@amazon.com> |
To: | Mark Johnson <markj@infra-metals.com> |
Cc: | |
BCC: | |
Date: | Mon, 14 Oct 2024 16:20:56 +0000 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from a13-64.smtp-out.amazonses.com (a13-64.smtp-out.amazonses.com [54.240.13.64]) by infra-metals-com-1.fortimailcloud.com with ESMTPS id 49EGKwFe2212461-49EGKwFf2212461 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=OK) for <MARKJ@INFRA-METALS.COM>; Mon, 14 Oct 2024 12:20:58 -0400 |
Authentication-Results | spf=fail (sender IP is 154.52.4.131) smtp.mailfrom=bounces.amazon.com; dkim=pass (signature was verified) header.d=amazon.com;dmarc=pass action=none header.from=amazon.com;compauth=pass reason=100 |
Received-Spf | Fail (protection.outlook.com: domain of bounces.amazon.com does not designate 154.52.4.131 as permitted sender) receiver=protection.outlook.com; client-ip=154.52.4.131; helo=infra-metals-com-1.fortimailcloud.com; |
Authentication-Results-Original | infra-metals-com-1.fortimailcloud.com; spf=pass (fortimailcloud.com: domain of 20241014162056cb2436f68d33494c8b835aab7bc0p0na-C38OX993MKS91E@bounces.amazon.com designates 54.240.13.64 as permitted sender) smtp.mailfrom=20241014162056cb2436f68d33494c8b835aab7bc0p0na-C38OX993MKS91E@bounces.amazon.com; dkim=pass header.i=@amazon.com dkim=pass header.i=@amazonses.com; dmarc=pass header.from=amazon.com; |
Dkim-Signature | v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1728922857; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type:Feedback-ID; bh=x/7k7+uUySeME6NuDHMZf+Mq/SJlkgsC/BGZZpbE9wY=; b=uAX3g/s9mJpmFIsQXX7zbvW+grkexO3Rj8iyfFvuLh2YoPIpaZg0hwvmjdDpc1ef BjI/vSEL2lPsQrUnxUdhJ8m3eMzKI0AV42Ix0a5EnsYOBi6ZgaNzNAJbnyvkvmT7cqW 5OLu1k/7lPhyiG5ow3n0WxKCrXOGWVaHuVlhnnDc= |
Date | Mon, 14 Oct 2024 16:20:56 +0000 |
From | "amazon.com" <account-update@amazon.com> |
To | Mark Johnson <markj@infra-metals.com> |
Message-Id | <010001928bd52db8-9ae8b36d-3718-4b7d-8aea-8826af6acabf-000000@email.amazonses.com> |
Subject | [EXTERNAL] amazon.com: Purchase attempt |
MIME-Version | 1.0 |
Content-Type | multipart/mixed; boundary="----sinikael-?=_1-17289272397200.023669104294110177" |
X-Amazon-Mail-Relay-Type | notification |
Bounces-To | 20241014162056cb2436f68d33494c8b835aab7bc0p0na-C38OX993MKS91E@bounces.amazon.com |
X-Amazon-Metadata | CA=C38OX993MKS91E-CU=ARN7R7COEJPH4 |
X-Original-Messageid | <urn.rtn.msg.20241014162056cb2436f68d33494c8b835aab7bc0p0na@1728922856875.> |
Feedback-Id | 579583930::1.us-east-1.ZHcGJK6s+x+i9lRHKog4RW3tECwWIf1xzTYCZyUaiec=:AmazonSES |
X-Ses-Outgoing | 2024.10.14-54.240.13.64 |
X-Feas-Dkim | Valid |
X-Feas-Client-Ip | 54.240.13.64 |
X-Fe-Last-Public-Client-Ip | 54.240.13.64 |
X-Fe-Envelope-From | 20241014162056cb2436f68d33494c8b835aab7bc0p0na-C38OX993MKS91E@bounces.amazon.com |
X-Fe-Policy-Id | 0:1:1:SYSTEM |
Return-Path | 20241014162056cb2436f68d33494c8b835aab7bc0p0na-C38OX993MKS91E@bounces.amazon.com |
X-Ms-Exchange-Organization-Expirationstarttime | 14 Oct 2024 16:20:59.7712 (UTC) |
X-Ms-Exchange-Organization-Expirationstarttimereason | OriginalSubmit |
X-Ms-Exchange-Organization-Expirationinterval | 1:00:00:00.0000000 |
X-Ms-Exchange-Organization-Expirationintervalreason | OriginalSubmit |
X-Ms-Exchange-Organization-Network-Message-Id | bcb00ccd-3bf0-48b8-5719-08dcec6c30b7 |
X-Eopattributedmessage | 0 |
X-Eoptenantattributedmessage | 5f5cb6f5-df48-4a8e-a3b9-2628e6d26c56:0 |
X-Ms-Exchange-Organization-Messagedirectionality | Incoming |
X-Ms-Publictraffictype | |
X-Ms-Traffictypediagnostic | CO1PEPF000042AC:EE_|SA1PR22MB5044:EE_|SN7PR22MB4126:EE_ |
X-Ms-Exchange-Organization-Authsource | CO1PEPF000042AC.namprd03.prod.outlook.com |
X-Ms-Exchange-Organization-Authas | Anonymous |
X-Ms-Office365-Filtering-Correlation-Id | bcb00ccd-3bf0-48b8-5719-08dcec6c30b7 |
X-Ms-Exchange-Atpmessageproperties | SA|SL |
X-Ms-Exchange-Organization-Scl | -1 |
X-Microsoft-Antispam | BCL:3;ARA:13230040|69100299015|13012899012|12012899012|13102899012|5082899009|5073199012|32142699015|82310400026|5062899012|3092899012|4092899012|3072899012|2092899012; |
X-Forefront-Antispam-Report | CIP:154.52.4.131;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:infra-metals-com-1.fortimailcloud.com;PTR:relaysjc20.fortimailcloud.com;CAT:NONE;SFS:(13230040)(69100299015)(13012899012)(12012899012)(13102899012)(5082899009)(5073199012)(32142699015)(82310400026)(5062899012)(3092899012)(4092899012)(3072899012)(2092899012);DIR:INB; |
X-Ms-Exchange-Crosstenant-Originalarrivaltime | 14 Oct 2024 16:20:59.6150 (UTC) |
X-Ms-Exchange-Crosstenant-Network-Message-Id | bcb00ccd-3bf0-48b8-5719-08dcec6c30b7 |
X-Ms-Exchange-Crosstenant-Id | 5f5cb6f5-df48-4a8e-a3b9-2628e6d26c56 |
X-Ms-Exchange-Crosstenant-Authsource | CO1PEPF000042AC.namprd03.prod.outlook.com |
X-Ms-Exchange-Crosstenant-Authas | Anonymous |
X-Ms-Exchange-Crosstenant-Fromentityheader | Internet |
X-Ms-Exchange-Transport-Crosstenantheadersstamped | SA1PR22MB5044 |
X-Ms-Exchange-Transport-Endtoendlatency | 00:00:07.2696795 |
X-Ms-Exchange-Processed-By-Bccfoldering | 15.20.8048.020 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | 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 |
Content-Transfer-Encoding | 7bit |
Icon Hash: | 46070c0a8e0c67d6 |