Windows
Analysis Report
https://u47839971.ct.sendgrid.net/ls/click?upn=u001.SS8YqfWjf1b3UNFf2g8-2BbyepSJ9NnVqTjg5p4PlqyZLDG-2F-2FRHUWKB7tpHO-2BD9IAzfDK69NBor6n5GDDWuKOaXjILtpHrb-2FuqosweWIwJauCFjFOIVaIDje-2BTbWeqpid-2Fe0IpJIrTIznxRC8RuWTXkcZZXZKUxIgeeMWOFH96Tjh3a3uDeIXRyoiB6ZRGKZhHD63OuPdyktyTbMDbA-2FurGQ-3D-3DGlRK_1fgoI9z
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 5556 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6888 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2028 --fi eld-trial- handle=199 6,i,491559 2215475389 430,165054 6129578064 789,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6480 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://u4783 9971.ct.se ndgrid.net /ls/click? upn=u001.S S8YqfWjf1b 3UNFf2g8-2 BbyepSJ9Nn VqTjg5p4Pl qyZLDG-2F- 2FRHUWKB7t pHO-2BD9IA zfDK69NBor 6n5GDDWuKO aXjILtpHrb -2FuqosweW IwJauCFjFO IVaIDje-2B TbWeqpid-2 Fe0IpJIrTI znxRC8RuWT XkcZZXZKUx IgeeMWOFH9 6Tjh3a3uDe IXRyoiB6ZR GKZhHD63Ou PdyktyTbMD bA-2FurGQ- 3D-3DGlRK_ 1fgoI9z-2B meHj6kFR5j mXJyN8Vyo9 ja5rNrkl1r R8UXAlmAe6 PSc2-2FD85 CLOIF98tpC jfsSquWpaR YnYzjD-2B- 2FDF-2F8Bw iwRSEwmTXw wlDUaQI3bD BZTUv-2Ffb se4A61ed6h Vc-2BhhTqd pCqzpir5GY 49O-2BVdqG 9mHEhTR8Ov RsDhxES9QA dY7ZiH-2Bu rXMNUWGL6V uIIVYma05Z XZK6zhQMDh jNBnJShmRW Pp7Ow2IJgH 96F8uRyUdy MUZ9au5PfR hmvWMnTj3B 1KVxYBpNo7 XRlBSlYjK7 4Z4HptPWz0 XAvVILLp4Z 5Qq7I-2BYF 76YXE5ZsE- 2F9hOEdmxn qZwZIEaC1B NDg2XB-2Bl uEEvEXRuR9 ohEPc6VObq uUxTQmba8b ObSY0wG3oO eb2xD8hV6I KwMnr9d-2B 5HbQscEqkW H5k7qnk6bA GBIHHNt95V H4uagG-2Bh 74PJCdwHqp itEnC4IeAH XNdNtMkKw3 4-2BF8TeV7 q4SmkRwe9o sbefOHPWGy ls7sZdEjod VX7wlBDRV2 BLQlTlDkK- 2FzuZ2EsHC tWTv7yrVJT -2B6p3fl4O 5qZGyWAuAT jn7386Smbg YFZYAIaRja bXb6J3Z9IY hB-2BBiP3z xZSMd-2BGG NtSLCQw7Fq wKOUhYoEZS gG-2FLraJh b7xOSF-2FZ GKBw-2FWGP Q5W16K6ZnP 31akPWN-2F Ry3A1tFL9- 2FQXaviWuN n8VOeqLfBR 9isxQ-2BqB -2Fm-2BPFR MhM4zyM42F PD-2FRIJxC XHHfAnucSq TKeA1iykI8 9pw6joYB-2 B9v-2FXzQp kgszpTxbxZ cZ7mH0xUY6 S3QZDaIWpt -2F-2B0Fpv Tn8cArsTTK jQo1QO476b dWvqqoz32v BNn214xuFk N0blGHeazk hMWwmEzZM6 r-2BTFrW2- 2Fha62dTAc 7eNUguY6HO m3gtrj2-2F YlAidnBTp5 Y8fj3jmA-3 D-3D" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Click to jump to signature section
Phishing |
---|
Source: | LLM: |
Source: | Matcher: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
u47839971.ct.sendgrid.net | 167.89.123.60 | true | false | unknown | |
d2vgu95hoyrpkh.cloudfront.net | 18.165.32.115 | true | false | unknown | |
cs837.wac.edgecastcdn.net | 192.229.133.221 | true | false | unknown | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown | |
sni1gl.wpc.omegacdn.net | 152.199.21.175 | true | false | unknown | |
s-part-0017.t-0009.fb-t-msedge.net | 13.107.253.45 | true | false | unknown | |
www.google.com | 142.250.186.100 | true | false | unknown | |
s-part-0039.t-0009.t-msedge.net | 13.107.246.67 | true | false | unknown | |
startuppro.wethemez.com | 103.187.22.30 | true | true | unknown | |
aadcdn.msftauth.net | unknown | unknown | false | unknown | |
www.w3schools.com | unknown | unknown | false | unknown | |
cdn.socket.io | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.184.195 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.110.84 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
13.107.246.45 | s-part-0017.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
13.107.246.67 | s-part-0039.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
172.217.16.206 | unknown | United States | 15169 | GOOGLEUS | false | |
13.107.253.45 | s-part-0017.t-0009.fb-t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
18.165.32.115 | d2vgu95hoyrpkh.cloudfront.net | United States | 3 | MIT-GATEWAYSUS | false | |
18.245.31.89 | unknown | United States | 16509 | AMAZON-02US | false | |
192.229.133.221 | cs837.wac.edgecastcdn.net | United States | 15133 | EDGECASTUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
167.89.123.60 | u47839971.ct.sendgrid.net | United States | 11377 | SENDGRIDUS | false | |
152.199.21.175 | sni1gl.wpc.omegacdn.net | United States | 15133 | EDGECASTUS | false | |
142.250.186.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.184.227 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.16.195 | unknown | United States | 15169 | GOOGLEUS | false | |
103.187.22.30 | startuppro.wethemez.com | unknown | 7575 | AARNET-AS-APAustralianAcademicandResearchNetworkAARNe | true | |
142.250.184.234 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542043 |
Start date and time: | 2024-10-25 13:55:14 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://u47839971.ct.sendgrid.net/ls/click?upn=u001.SS8YqfWjf1b3UNFf2g8-2BbyepSJ9NnVqTjg5p4PlqyZLDG-2F-2FRHUWKB7tpHO-2BD9IAzfDK69NBor6n5GDDWuKOaXjILtpHrb-2FuqosweWIwJauCFjFOIVaIDje-2BTbWeqpid-2Fe0IpJIrTIznxRC8RuWTXkcZZXZKUxIgeeMWOFH96Tjh3a3uDeIXRyoiB6ZRGKZhHD63OuPdyktyTbMDbA-2FurGQ-3D-3DGlRK_1fgoI9z-2BmeHj6kFR5jmXJyN8Vyo9ja5rNrkl1rR8UXAlmAe6PSc2-2FD85CLOIF98tpCjfsSquWpaRYnYzjD-2B-2FDF-2F8BwiwRSEwmTXwwlDUaQI3bDBZTUv-2Ffbse4A61ed6hVc-2BhhTqdpCqzpir5GY49O-2BVdqG9mHEhTR8OvRsDhxES9QAdY7ZiH-2BurXMNUWGL6VuIIVYma05ZXZK6zhQMDhjNBnJShmRWPp7Ow2IJgH96F8uRyUdyMUZ9au5PfRhmvWMnTj3B1KVxYBpNo7XRlBSlYjK74Z4HptPWz0XAvVILLp4Z5Qq7I-2BYF76YXE5ZsE-2F9hOEdmxnqZwZIEaC1BNDg2XB-2BluEEvEXRuR9ohEPc6VObquUxTQmba8bObSY0wG3oOeb2xD8hV6IKwMnr9d-2B5HbQscEqkWH5k7qnk6bAGBIHHNt95VH4uagG-2Bh74PJCdwHqpitEnC4IeAHXNdNtMkKw34-2BF8TeV7q4SmkRwe9osbefOHPWGyls7sZdEjodVX7wlBDRV2BLQlTlDkK-2FzuZ2EsHCtWTv7yrVJT-2B6p3fl4O5qZGyWAuATjn7386SmbgYFZYAIaRjabXb6J3Z9IYhB-2BBiP3zxZSMd-2BGGNtSLCQw7FqwKOUhYoEZSgG-2FLraJhb7xOSF-2FZGKBw-2FWGPQ5W16K6ZnP31akPWN-2FRy3A1tFL9-2FQXaviWuNn8VOeqLfBR9isxQ-2BqB-2Fm-2BPFRMhM4zyM42FPD-2FRIJxCXHHfAnucSqTKeA1iykI89pw6joYB-2B9v-2FXzQpkgszpTxbxZcZ7mH0xUY6S3QZDaIWpt-2F-2B0FpvTn8cArsTTKjQo1QO476bdWvqqoz32vBNn214xuFkN0blGHeazkhMWwmEzZM6r-2BTFrW2-2Fha62dTAc7eNUguY6HOm3gtrj2-2FYlAidnBTp5Y8fj3jmA-3D-3D |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal52.phis.win@17/18@18/66 |
- Exclude process from analysis (whitelisted): svchost.exe
- Excluded IPs from analysis (whitelisted): 142.250.184.195, 172.217.16.206, 142.250.110.84, 34.104.35.123, 88.221.110.91, 142.250.184.234, 142.250.185.74, 142.250.185.170, 142.250.186.106, 142.250.185.138, 172.217.16.138, 216.58.206.74, 172.217.18.10, 142.250.186.138, 142.250.185.202, 142.250.186.170, 172.217.18.106, 142.250.184.202, 172.217.16.202, 142.250.185.106, 172.217.23.106
- Excluded domains from analysis (whitelisted): logincdn.msauth.net, fs.microsoft.com, lgincdnmsftuswe2.azureedge.net, accounts.google.com, content-autofill.googleapis.com, aadcdnoriginwus2.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.net, clients2.google.com, edgedl.me.gvt1.com, aadcdnoriginwus2.afd.azureedge.net, lgincdnmsftuswe2.afd.azureedge.net, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://u47839971.ct.sendgrid.net/ls/click?upn=u001.SS8YqfWjf1b3UNFf2g8-2BbyepSJ9NnVqTjg5p4PlqyZLDG-2F-2FRHUWKB7tpHO-2BD9IAzfDK69NBor6n5GDDWuKOaXjILtpHrb-2FuqosweWIwJauCFjFOIVaIDje-2BTbWeqpid-2Fe0IpJIrTIznxRC8RuWTXkcZZXZKUxIgeeMWOFH96Tjh3a3uDeIXRyoiB6ZRGKZhHD63OuPdyktyTbMDbA-2FurGQ-3D-3DGlRK_1fgoI9z-2BmeHj6kFR5jmXJyN8Vyo9ja5rNrkl1rR8UXAlmAe6PSc2-2FD85CLOIF98tpCjfsSquWpaRYnYzjD-2B-2FDF-2F8BwiwRSEwmTXwwlDUaQI3bDBZTUv-2Ffbse4A61ed6hVc-2BhhTqdpCqzpir5GY49O-2BVdqG9mHEhTR8OvRsDhxES9QAdY7ZiH-2BurXMNUWGL6VuIIVYma05ZXZK6zhQMDhjNBnJShmRWPp7Ow2IJgH96F8uRyUdyMUZ9au5PfRhmvWMnTj3B1KVxYBpNo7XRlBSlYjK74Z4HptPWz0XAvVILLp4Z5Qq7I-2BYF76YXE5ZsE-2F9hOEdmxnqZwZIEaC1BNDg2XB-2BluEEvEXRuR9ohEPc6VObquUxTQmba8bObSY0wG3oOeb2xD8hV6IKwMnr9d-2B5HbQscEqkWH5k7qnk6bAGBIHHNt95VH4uagG-2Bh74PJCdwHqpitEnC4IeAHXNdNtMkKw34-2BF8TeV7q4SmkRwe9osbefOHPWGyls7sZdEjodVX7wlBDRV2BLQlTlDkK-2FzuZ2EsHCtWTv7yrVJT-2B6p3fl4O5qZGyWAuATjn7386SmbgYFZYAIaRjabXb6J3Z9IYhB-2BBiP3zxZSMd-2BGGNtSLCQw7FqwKOUhYoEZSgG-2FLraJhb7xOSF-2FZGKBw-2FWGPQ5W16K6
Input | Output |
---|---|
URL: https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Nalisonr@sanctuary-housing.co.uk Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Trying to sign in", "prominent_button_name": "Cancel", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Nalisonr@sanctuary-housing.co.uk Model: claude-3-haiku-20240307 | ```json { "brands": [] } |
URL: https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Nalisonr@sanctuary-housing.co.uk Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": false, "trigger_text": "unknown", "prominent_button_name": "Cancel", "text_input_field_labels": [ "I'm not a robot" ], "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Nalisonr@sanctuary-housing.co.uk Model: claude-3-haiku-20240307 | ```json { "brands": [ "Microsoft" ] } |
URL: https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Nalisonr@sanctuary-housing.co.uk Model: gpt-4o | ```json{ "legit_domain": "microsoft.com", "classification": "wellknown", "reasons": [ "The URL 'startuppro.wethemez.com' does not match the legitimate domain 'microsoft.com'.", "The domain 'wethemez.com' is not associated with Microsoft.", "The presence of a subdomain 'startuppro' and the main domain 'wethemez.com' suggests a third-party site, which is suspicious when claiming to represent Microsoft.", "The brand 'Microsoft' is well-known and typically uses its own domain for official pages.", "The input field 'I'm not a robot' is commonly used in phishing sites to mimic legitimate security checks." ], "riskscore": 9} Google indexed: True |
URL: startuppro.wethemez.com Brands: Microsoft Input Fields: I'm not a robot |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9832624772717797 |
Encrypted: | false |
SSDEEP: | |
MD5: | 762506A6E259BD76C839A2654377FB17 |
SHA1: | D0B6A7D295BDFA97AC48DA516B7E3DF14EE8F041 |
SHA-256: | 70142FC6A27FDFED88EF2FB95DDD8C895E96F2203C5DE32F54DF64B7672316D3 |
SHA-512: | 0E00484F9F3B453EB995EE5E22357AE17681230C245E3C29945E15F27619DBC940EECDB6FD3A9900DF7862F53214E12F25F4CC84A827FFAF0D2DB371CE0A850A |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.002196372367199 |
Encrypted: | false |
SSDEEP: | |
MD5: | D8B3854F685487B1C33C8343513E0B05 |
SHA1: | 2E65FC96618759255FA729E63D63C5A408DEE5CD |
SHA-256: | E5422D5B9666D69C7D548D51C7864F291679FC10932FA3D57B8F460056494D5B |
SHA-512: | C323C173A0B59C928485185EE0926C0E2E4ABE3EFBC00134E78D3799F9201261D36EABC06A0A0CE45E89F705D5C1ABA42DC704AE8BE0D4AD66F602D9F3EC2AD5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.008348991307518 |
Encrypted: | false |
SSDEEP: | |
MD5: | 20C93A4208B06E81FDAAE0E9D23CB9C8 |
SHA1: | 82B004CD52CB860BDCEFACB91942A486DC5C5C50 |
SHA-256: | 0263A717714EDB5E8F92191721925ECB3069D1D4784DF5B11A9A0C38450F9EA8 |
SHA-512: | E0074096F21DEDF2BD1813B545730FA59D21294BC2D2E562E7A17B7620392B4C78345AC60BC4EA7E962099DE323D5561B1E4BA252CBAB1B24BF97CDBC07FBB05 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.000344983778038 |
Encrypted: | false |
SSDEEP: | |
MD5: | 24A39941C8D5E856183AC29FE335F6FC |
SHA1: | 9B4DA7D191A9FF683D3770C36BDFE14FB281F806 |
SHA-256: | B6A2A7A36C013BC18A7B6CBF9A082F0F330B550BF5303238F1C635D5BD4240B4 |
SHA-512: | 4E2F664E6571BC23189F26D40FB3744BB31879449E4855A753DFD903DB3B2251B01F3E9BF90FC519A60AC44B0100E4D6F4160C5FC0D9C6DAD25BF5786FF33AF9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9882226958116016 |
Encrypted: | false |
SSDEEP: | |
MD5: | B38F6B45FF7C24516A82411501C1655D |
SHA1: | 45E9864A430711460C7A69945A021969C87D5A39 |
SHA-256: | D6A6D9D90D8A4E494F8A8F7BAC59A9F7EC4C6568D3190B1C8D59BA2C7FD6532B |
SHA-512: | D7BCFC1BAEEA6394974B5B9290FC77A888DADF38685EBA0CE3C0893B055566D2145BADF1999DED974CD99B2C2FE5F86B4F20B01DC09980DE6EBF2EC48FEBE94F |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.997513860642948 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF5DF70A894A673ED1574AEEF25CB9CC |
SHA1: | 8CDA3ECF51227BF0BD6F30DFA3B3A1A21ABD7161 |
SHA-256: | 802CE96D72E86DE1B082937E64C8F91CF3C327B4C3F26724F18A7C99E8F1B151 |
SHA-512: | 94D3E7958CD7506B76F20575754EC1D3A033845417639F9035E3EC1DCBE33E9E71826AF40A3EC1DFFA9822F979E5881689409292369F42C3F54B2AD3BF08D711 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 49993 |
Entropy (8bit): | 5.216475744251136 |
Encrypted: | false |
SSDEEP: | |
MD5: | 777EB8FD4F8320B6E5CC9A7159BDEC6A |
SHA1: | 6B4032E88D0040182089FE3BEFDECEE9346E8921 |
SHA-256: | 73EBA16BC895FDFA454E27ECB80DEF31EDE8D861F99E175FF93B110EABEC044F |
SHA-512: | D75B7C43EBD8F49942AEBF8FBDE64A4D826AF27ECED3D6395FFA64FDA31DDEF26E812BEEE313AE9C6114CDA003A8BDC8F1C64A13FA41C3009F5F30E4449876B1 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdn.socket.io/4.7.5/socket.io.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 52 |
Entropy (8bit): | 4.190260390968384 |
Encrypted: | false |
SSDEEP: | |
MD5: | 09BDE5D10D92DEBBB74AE9C3DF3AECAB |
SHA1: | 2F4EEA05E85C26DE82C5E7CBA471687EC8D855EC |
SHA-256: | F67F67274C88240DE01FA51D483271F58A5752B607B13DEE041C7A0671290E7F |
SHA-512: | 0FF4A460BC9068E61B6EEC0078E97F2AD0DCD12288E8161688351C3BB85A87D624E5B7635C47ED1B5B93C6D3B4A29A756A75A897394B4E6A3986BBB1762CFC6C |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISJQnAMflJRU29DhIFDZFhlU4SBQ01hlQcEgUNkWGVThIFDZFhlU4=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 276 |
Entropy (8bit): | 7.316609873335077 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4E3510919D29D18EEB6E3E8B2687D2F5 |
SHA1: | 31522A9EC576A462C3F1FFA65C010D4EB77E9A85 |
SHA-256: | 1707BE1284617ACC0A66A14448207214D55C3DA4AAF25854E137E138E089257E |
SHA-512: | DFAD29E3CF9E51D1749961B47382A5151B1F3C98DEABF2B63742EB6B7F7743EE9B605D646A730CF3E087D4F07E43107C8A01FF5F68020C7BF933EBA370175682 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 199 |
Entropy (8bit): | 6.766983163126765 |
Encrypted: | false |
SSDEEP: | |
MD5: | 21B761F2B1FD37F587D7222023B09276 |
SHA1: | F7A416C8907424F9A9644753E3A93D4D63AE640E |
SHA-256: | 72D4161C18A46D85C5566273567F791976431EFEF49510A0E3DD76FEC92D9393 |
SHA-512: | 77745F60804D421B34DE26F8A216CEE27C440E469FD786A642757CCEDBC4875D5196431897D80137BD3E20B01104BA76DEC7D8E75771D8A9B5F14B66F2A9B7C0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1636 |
Entropy (8bit): | 4.214613323368661 |
Encrypted: | false |
SSDEEP: | |
MD5: | F7AB697E65B83CE9870A4736085DEEEC |
SHA1: | 5FF40BFF26B523FBBEAA5228A2AAC63E44AFAA90 |
SHA-256: | CBB3706E65B35A43BDCFEBD23B5479DC0542CA7E23197869B683D12B524472FE |
SHA-512: | 158874143CE65485348813431BB585227772F315234E08158A329DF98319AA5F1DB21DEF2AD7CAA5C25AD11660E7D4E05158CFA1198913A33B1B91676C4CA402 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 397 |
Entropy (8bit): | 5.578603993640571 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4E48D0FA9F1F240205B88891E4845DAB |
SHA1: | A1D9D3BDD532D74D94D500ADB331502332DA3D44 |
SHA-256: | 5AC2F11B500C83117BC867C987124488E61039A8555CB5799648726850F5C32F |
SHA-512: | 109D8B43229B7BB4326831C020A93D867D29874577673E5112EF1670653990FFF32ED4D3EDBF9468800D8A5D7CA92176CD4E1731ADFC01CD078E6CB25AAB305F |
Malicious: | false |
Reputation: | unknown |
URL: | https://startuppro.wethemez.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVVXdzRVWEk9JnVpZD1VU0VSMjExMDIwMjRVNTIxMDIxNTI=N0123Nalisonr@sanctuary-housing.co.uk |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2407 |
Entropy (8bit): | 7.900400471609788 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9D372E951D45A26EDE2DC8B417AAE4F8 |
SHA1: | 84F97A777B6C33E2947E6D0BD2BFCFFEC601785A |
SHA-256: | 4E9C9141705E9A4D83514CEE332148E1E92126376D049DAED9079252FA9F9212 |
SHA-512: | 78F5AA71EA44FF18BA081288F13AD118DB0E1B9C8D4D321ED40DCAB29277BD171BBB25BA7514566BBD4E25EA416C066019077FAA43E6ED781A29ADB683D218E2 |
Malicious: | false |
Reputation: | unknown |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 100217 |
Entropy (8bit): | 4.516887791126109 |
Encrypted: | false |
SSDEEP: | |
MD5: | 57B032180AFEBEB7A6C31D0A7F35C47A |
SHA1: | E6C8EE94D3A447EF0B81A1F406AA7F2907CBC798 |
SHA-256: | DB290E0F0161B9962787FA22C846F5D53BEBCD5B46B77837AF5048C09981A7BB |
SHA-512: | 0A059C64899F0A20FE9EDF7A94E9F0FE76775B7DED8703140CF5D309D87643575E1F98C4020862270A44D679170CDD9B061B7C924CAE7D7B7B5DFE3F66A6F269 |
Malicious: | false |
Reputation: | unknown |
URL: | https://startuppro.wethemez.com/o/jsnom.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23427 |
Entropy (8bit): | 5.112735417225198 |
Encrypted: | false |
SSDEEP: | |
MD5: | BA0537E9574725096AF97C27D7E54F76 |
SHA1: | BD46B47D74D344F435B5805114559D45979762D5 |
SHA-256: | 4A7611BC677873A0F87FE21727BC3A2A43F57A5DED3B10CE33A0F371A2E6030F |
SHA-512: | FC43F1A6B95E1CE005A8EFCDB0D38DF8CC12189BEAC18099FD97C278D254D5DA4C24556BD06515D9D6CA495DDB630A052AEFC0BB73D6ED15DEBC0FB1E8E208E7 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.w3schools.com/w3css/4/w3.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1435 |
Entropy (8bit): | 7.8613342322590265 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9F368BC4580FED907775F31C6B26D6CF |
SHA1: | E393A40B3E337F43057EEE3DE189F197AB056451 |
SHA-256: | 7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36 |
SHA-512: | 0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0 |
Malicious: | false |
Reputation: | unknown |
URL: | https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2228 |
Entropy (8bit): | 7.82817506159911 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF9941290C50CD3866E2BA6B793F010D |
SHA1: | 4736508C795667DCEA21F8D864233031223B7832 |
SHA-256: | 1B9EFB22C938500971AAC2B2130A475FA23684DD69E43103894968DF83145B8A |
SHA-512: | A0C69C70117C5713CAF8B12F3B6E8BBB9CDAF72768E5DB9DB5831A3C37541B87613C6B020DD2F9B8760064A8C7337F175E7234BFE776EEE5E3588DC5662419D9 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.gstatic.com/recaptcha/api2/logo_48.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 673 |
Entropy (8bit): | 7.6596900876595075 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0E176276362B94279A4492511BFCBD98 |
SHA1: | 389FE6B51F62254BB98939896B8C89EBEFFE2A02 |
SHA-256: | 9A2C174AE45CAC057822844211156A5ED293E65C5F69E1D211A7206472C5C80C |
SHA-512: | 8D61C9E464C8F3C77BF1729E32F92BBB1B426A19907E418862EFE117DBD1F0A26FCC3A6FE1D1B22B836853D43C964F6B6D25E414649767FBEA7FE10D2048D7A1 |
Malicious: | false |
Reputation: | unknown |
Preview: |