Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://doscome.cluster029.hosting.ovh.net/Sglient/

Overview

General Information

Sample URL:http://doscome.cluster029.hosting.ovh.net/Sglient/
Analysis ID:1543997

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7040 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6408 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1936,i,13555308600037944717,3134048788954920081,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6148 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://doscome.cluster029.hosting.ovh.net/Sglient/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24=LLM: Score: 9 Reasons: The brand 'SG' is likely referring to Socit Gnrale, a well-known French bank., The legitimate domain for Socit Gnrale is 'sg.fr'., The provided URL 'doscome.cluster029.hosting.ovh.net' does not match the legitimate domain., The URL uses a hosting service domain 'ovh.net', which is often used for hosting various websites and not specific to any brand., The presence of a subdomain and unrelated domain name is suspicious and indicative of phishing., The input field 'Saisissez votre code client' suggests a request for sensitive information, which is common in phishing attempts. DOM: 1.0.pages.csv
Source: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24=#LLM: Score: 9 Reasons: The brand 'SG' is likely referring to Socit Gnrale, a well-known French bank., The URL 'doscome.cluster029.hosting.ovh.net' does not match the legitimate domain 'sg.fr' associated with Socit Gnrale., The domain 'ovh.net' is a hosting provider, which can be used by anyone to host websites, increasing the risk of phishing., The presence of a subdomain 'doscome.cluster029' is unusual and not typically associated with the official bank's domain., The input field 'Saisissez votre code client' suggests the site is asking for sensitive information, which is common in phishing attempts. DOM: 2.1.pages.csv
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.164.15:443 -> 192.168.2.16:63426 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:63427 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:63428 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:63429 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.16:63425 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:63425 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:63425 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:63425 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:63425 -> 162.159.36.2:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Mon, 28 Oct 2024 16:39:31 GMTcontent-type: application/javascriptcontent-length: 30675server: Apachelast-modified: Mon, 28 Oct 2024 13:30:04 GMTaccept-ranges: bytescache-control: max-age=900expires: Mon, 28 Oct 2024 16:54:31 GMTvary: Accept-Encodingcontent-encoding: gzipsecuritas_autorized_country: frsecuritas_enable_typing_info: x-iplb-request-id: 9B5EF1BC:A46D_335BECFF:0050_671FBE43_1E25D:5A83x-iplb-instance: 52364Data Raw: 1f 8b 08 00 00 00 00 00 00 03 bd bd 79 7b db 46 b2 2f fc ff fb 29 44 8c 8f 06 30 5b 14 e5 64 e6 9e 01 85 f0 71 64 3b 71 26 bb 9d 6d 28 26 0f 44 82 12 22 0a 60 00 50 4b 44 9e cf 7e eb 57 d5 dd 68 80 a0 92 99 7b ef 9b 19 8b 58 1a bd 56 57 d7 5e c7 cf 7b 07 bf 7e b3 4e 8a 87 83 db 0f 06 1f 0e 4e 0e 36 07 fe 2c 38 f8 ec dd c1 9b 7c 9d cd e3 2a cd b3 83 38 9b 1f e4 d5 55 52 1c cc f2 ac 2a d2 8b 75 95 17 25 15 fd f5 37 7c 3a c8 8b cb e3 65 3a 4b b2 32 39 78 7e fc ff f5 16 eb 6c 86 0f fd 44 55 c1 a3 b7 a6 c7 25 7d 36 ab bc 91 97 5f fc 9a d0 45 14 55 0f ab 24 5f 1c dc e4 f3 f5 32 39 3c dc f3 62 90 dc af f2 a2 2a c7 cd db 28 19 cc f3 d9 fa 26 c9 aa 71 45 cd f4 86 41 58 b7 1a 3c a6 0b bf 57 17 09 aa ab 22 bf 3b c8 92 bb 83 d7 45 91 17 be a7 c7 5c 24 bf ad d3 22 29 0f e2 83 bb 34 9b 53 99 bb b4 ba a2 3b f3 a5 17 8c 8a a4 5a 17 d9 01 b5 12 6c 43 fe eb 7b 34 33 c9 22 cd 92 b9 d7 33 dd 95 ef c7 f2 13 56 57 69 a9 6c 87 ce 54 d2 9a 86 db b8 38 a8 a2 c9 54 bd 8e ce 6c 37 55 11 7d c5 93 30 b8 4c aa af 8b bc ca 51 f7 57 0b 55 46 d5 a0 c4 04 ab 4b ba a2 35 98 c5 95 5a d3 e5 6a 5d 5e a9 94 2e a8 d5 e4 9e 4a 66 d1 e3 56 e5 51 36 a8 f2 77 d4 54 76 a9 6e e9 e6 2a 2e bf ba cb a8 c6 55 52 54 0f 2a 8e 6e eb f7 cb 28 1e cc e2 e5 d2 97 a6 03 f5 80 2a 6e 22 77 36 65 0a 3c f3 a8 5e 23 ac 5b b6 be b9 48 8a 7a 22 92 41 96 cf 93 f7 74 b3 55 f7 1d d5 1c 64 eb e5 b2 17 d1 a7 49 14 d1 3a ca 8c 6d d5 2c 7a 44 0d 61 6f a8 ca 62 86 9f 8c 06 9a c8 c5 17 bc fa 74 bd 1d 99 1a 0f 2e 00 5e 2a 0b 1e 31 99 85 4a 69 dc 7e 16 65 9b cd eb 60 30 2b 92 b8 4a 5e 2f 13 cc ab ef 95 b3 22 5d 61 31 09 2e f2 41 95 dc 57 11 40 73 41 a0 50 1c a4 d9 c1 2c f0 69 16 27 c5 74 b3 e1 c9 7f 59 09 94 53 27 9b f7 7e 11 04 87 87 f9 a0 6c 3c 53 69 30 a2 59 4e e2 f9 20 5e ad 92 6c 7e 76 95 2e e7 7e 1e 0c 56 71 41 1d f8 92 26 64 50 24 37 f9 6d 62 de 6c ed 30 ee 5a 53 43 73 32 4e fa 9e 17 ee ec 88 64 b3 e9 5a 83 71 36 c9 65 09 93 80 06 60 3e 0b cd fb 2d e6 67 11 79 bc bf 3d 75 1d 35 b7 a7 69 9a 36 c7 f5 60 91 11 28 a5 15 bf d9 aa 55 74 fc f3 e4 bc 3c 5f bf 79 fd e6 cd f9 fd cb e1 b4 bf 69 dd 3f 3b be ac 57 64 8e a1 08 68 f7 7a 80 8d 65 92 5d 56 57 1e cd 30 96 7b 20 b7 04 a4 18 b3 de 58 bd 1b ba 3e 3c ec dd f3 8f ef c5 45 11 3f d0 e8 b0 90 43 fa a9 68 44 1a c4 ec 90 ab c3 c3 e1 29 fd a9 8e 4e b0 7a b4 25 d1 f3 e8 7a b0 32 Data Ascii: y{F/)D0[dqd;q&m(&D"`PKD~Wh{XVW^{~NN6,8|*8UR*u%7|:e:K29x~lDU%}6_EU$_29<b*(&
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Mon, 28 Oct 2024 16:39:32 GMTcontent-type: application/javascriptcontent-length: 30675server: Apachelast-modified: Mon, 28 Oct 2024 13:30:04 GMTaccept-ranges: bytescache-control: max-age=900expires: Mon, 28 Oct 2024 16:54:32 GMTvary: Accept-Encodingcontent-encoding: gzipsecuritas_autorized_country: frsecuritas_enable_typing_info: x-iplb-request-id: 9B5EF1BC:B361_335BECFF:0050_671FBE44_14BC8:55B2x-iplb-instance: 52463Data Raw: 1f 8b 08 00 00 00 00 00 00 03 bd bd 79 7b db 46 b2 2f fc ff fb 29 44 8c 8f 06 30 5b 14 e5 64 e6 9e 01 85 f0 71 64 3b 71 26 bb 9d 6d 28 26 0f 44 82 12 22 0a 60 00 50 4b 44 9e cf 7e eb 57 d5 dd 68 80 a0 92 99 7b ef 9b 19 8b 58 1a bd 56 57 d7 5e c7 cf 7b 07 bf 7e b3 4e 8a 87 83 db 0f 06 1f 0e 4e 0e 36 07 fe 2c 38 f8 ec dd c1 9b 7c 9d cd e3 2a cd b3 83 38 9b 1f e4 d5 55 52 1c cc f2 ac 2a d2 8b 75 95 17 25 15 fd f5 37 7c 3a c8 8b cb e3 65 3a 4b b2 32 39 78 7e fc ff f5 16 eb 6c 86 0f fd 44 55 c1 a3 b7 a6 c7 25 7d 36 ab bc 91 97 5f fc 9a d0 45 14 55 0f ab 24 5f 1c dc e4 f3 f5 32 39 3c dc f3 62 90 dc af f2 a2 2a c7 cd db 28 19 cc f3 d9 fa 26 c9 aa 71 45 cd f4 86 41 58 b7 1a 3c a6 0b bf 57 17 09 aa ab 22 bf 3b c8 92 bb 83 d7 45 91 17 be a7 c7 5c 24 bf ad d3 22 29 0f e2 83 bb 34 9b 53 99 bb b4 ba a2 3b f3 a5 17 8c 8a a4 5a 17 d9 01 b5 12 6c 43 fe eb 7b 34 33 c9 22 cd 92 b9 d7 33 dd 95 ef c7 f2 13 56 57 69 a9 6c 87 ce 54 d2 9a 86 db b8 38 a8 a2 c9 54 bd 8e ce 6c 37 55 11 7d c5 93 30 b8 4c aa af 8b bc ca 51 f7 57 0b 55 46 d5 a0 c4 04 ab 4b ba a2 35 98 c5 95 5a d3 e5 6a 5d 5e a9 94 2e a8 d5 e4 9e 4a 66 d1 e3 56 e5 51 36 a8 f2 77 d4 54 76 a9 6e e9 e6 2a 2e bf ba cb a8 c6 55 52 54 0f 2a 8e 6e eb f7 cb 28 1e cc e2 e5 d2 97 a6 03 f5 80 2a 6e 22 77 36 65 0a 3c f3 a8 5e 23 ac 5b b6 be b9 48 8a 7a 22 92 41 96 cf 93 f7 74 b3 55 f7 1d d5 1c 64 eb e5 b2 17 d1 a7 49 14 d1 3a ca 8c 6d d5 2c 7a 44 0d 61 6f a8 ca 62 86 9f 8c 06 9a c8 c5 17 bc fa 74 bd 1d 99 1a 0f 2e 00 5e 2a 0b 1e 31 99 85 4a 69 dc 7e 16 65 9b cd eb 60 30 2b 92 b8 4a 5e 2f 13 cc ab ef 95 b3 22 5d 61 31 09 2e f2 41 95 dc 57 11 40 73 41 a0 50 1c a4 d9 c1 2c f0 69 16 27 c5 74 b3 e1 c9 7f 59 09 94 53 27 9b f7 7e 11 04 87 87 f9 a0 6c 3c 53 69 30 a2 59 4e e2 f9 20 5e ad 92 6c 7e 76 95 2e e7 7e 1e 0c 56 71 41 1d f8 92 26 64 50 24 37 f9 6d 62 de 6c ed 30 ee 5a 53 43 73 32 4e fa 9e 17 ee ec 88 64 b3 e9 5a 83 71 36 c9 65 09 93 80 06 60 3e 0b cd fb 2d e6 67 11 79 bc bf 3d 75 1d 35 b7 a7 69 9a 36 c7 f5 60 91 11 28 a5 15 bf d9 aa 55 74 fc f3 e4 bc 3c 5f bf 79 fd e6 cd f9 fd cb e1 b4 bf 69 dd 3f 3b be ac 57 64 8e a1 08 68 f7 7a 80 8d 65 92 5d 56 57 1e cd 30 96 7b 20 b7 04 a4 18 b3 de 58 bd 1b ba 3e 3c ec dd f3 8f ef c5 45 11 3f d0 e8 b0 90 43 fa a9 68 44 1a c4 ec 90 ab c3 c3 e1 29 fd a9 8e 4e b0 7a b4 25 d1 f3 e8 7a b0 32 Data Ascii: y{F/)D0[dqd;q&m(&D"`PKD~Wh{XVW^{~NN6,8|*8UR*u%7|:e:K29x~lDU%}6_EU$_29<b*(&
Source: global trafficHTTP traffic detected: GET /Sglient/ HTTP/1.1Host: doscome.cluster029.hosting.ovh.netConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /Sglient/home/ HTTP/1.1Host: doscome.cluster029.hosting.ovh.netConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24= HTTP/1.1Host: doscome.cluster029.hosting.ovh.netConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /Sglient/home/ssg_files/jquery.min.js?NDExMg== HTTP/1.1Host: doscome.cluster029.hosting.ovh.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Referer: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24=Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /Sglient/home/ssg_files/jquery.min.js?NDExMg== HTTP/1.1Host: doscome.cluster029.hosting.ovh.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: doscome.cluster029.hosting.ovh.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: unknownNetwork traffic detected: HTTP traffic on port 63429 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 63428 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 63427 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 63426 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63427
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63426
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63429
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63428
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.164.15:443 -> 192.168.2.16:63426 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:63427 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:63428 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:63429 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@16/9@8/36
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1936,i,13555308600037944717,3134048788954920081,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://doscome.cluster029.hosting.ovh.net/Sglient/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1936,i,13555308600037944717,3134048788954920081,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cluster029.hosting.ovh.net
51.91.236.255
truetrue
    unknown
    www.google.com
    142.250.186.132
    truefalse
      unknown
      15.164.165.52.in-addr.arpa
      unknown
      unknownfalse
        unknown
        doscome.cluster029.hosting.ovh.net
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg_files/jquery.min.js?NDExMg==false
            unknown
            http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24=true
              unknown
              http://doscome.cluster029.hosting.ovh.net/Sglient/home/false
                unknown
                http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24=#true
                  unknown
                  http://doscome.cluster029.hosting.ovh.net/Sglient/false
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    74.125.206.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    216.58.212.142
                    unknownUnited States
                    15169GOOGLEUSfalse
                    216.58.206.67
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.186.132
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    172.217.23.106
                    unknownUnited States
                    15169GOOGLEUSfalse
                    51.91.236.255
                    cluster029.hosting.ovh.netFrance
                    16276OVHFRtrue
                    IP
                    192.168.2.16
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1543997
                    Start date and time:2024-10-28 17:38:55 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:http://doscome.cluster029.hosting.ovh.net/Sglient/
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal48.phis.win@16/9@8/36
                    • Exclude process from analysis (whitelisted): SgrmBroker.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 216.58.206.67, 216.58.212.142, 74.125.206.84, 34.104.35.123, 172.217.23.106, 216.58.212.138, 142.250.184.234, 142.250.185.138, 142.250.185.106, 172.217.18.10, 172.217.16.202, 216.58.206.74, 216.58.212.170, 142.250.185.170, 142.250.185.234, 142.250.186.170, 142.250.185.202, 142.250.186.106, 142.250.185.74, 216.58.206.42
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, content-autofill.googleapis.com, clientservices.googleapis.com, clients.l.google.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • VT rate limit hit for: http://doscome.cluster029.hosting.ovh.net/Sglient/
                    InputOutput
                    URL: Model: claude-3-5-sonnet-latest
                    {
                        "typosquatting": false,
                        "unusual_query_string": false,
                        "suspicious_tld": false,
                        "ip_in_url": false,
                        "long_subdomain": true,
                        "malicious_keywords": false,
                        "encoded_characters": false,
                        "redirection": false,
                        "contains_email_address": false,
                        "known_domain": false,
                        "brand_spoofing_attempt": false,
                        "third_party_hosting": true
                    }
                    URL: URL: http://doscome.cluster029.hosting.ovh.net
                    URL: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb2 Model: claude-3-haiku-20240307
                    ```json
                    {
                      "contains_trigger_text": true,
                      "trigger_text": "Obtenir vos codes",
                      "prominent_button_name": "Valider",
                      "text_input_field_labels": [
                        "Saisissez votre code client"
                      ],
                      "pdf_icon_visible": false,
                      "has_visible_captcha": false,
                      "has_urgent_text": false,
                      "has_visible_qrcode": false
                    }
                    URL: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb2 Model: claude-3-haiku-20240307
                    ```json
                    {
                      "brands": [
                        "SG"
                      ]
                    }
                    URL: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb2 Model: gpt-4o
                    ```json{  "legit_domain": "sg.fr",  "classification": "wellknown",  "reasons": [    "The brand 'SG' is likely referring to Socit Gnrale, a well-known French bank.",    "The legitimate domain for Socit Gnrale is 'sg.fr'.",    "The provided URL 'doscome.cluster029.hosting.ovh.net' does not match the legitimate domain.",    "The URL uses a hosting service domain 'ovh.net', which is often used for hosting various websites and not specific to any brand.",    "The presence of a subdomain and unrelated domain name is suspicious and indicative of phishing.",    "The input field 'Saisissez votre code client' suggests a request for sensitive information, which is common in phishing attempts."  ],  "riskscore": 9}
                    Google indexed: False
                    URL: doscome.cluster029.hosting.ovh.net
                                Brands: SG
                                Input Fields: Saisissez votre code client
                    URL: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb2 Model: claude-3-haiku-20240307
                    ```json
                    {
                      "contains_trigger_text": true,
                      "trigger_text": "Obtenir vos codes",
                      "prominent_button_name": "Valider",
                      "text_input_field_labels": [
                        "Saisissez votre code client"
                      ],
                      "pdf_icon_visible": false,
                      "has_visible_captcha": false,
                      "has_urgent_text": false,
                      "has_visible_qrcode": false
                    }
                    URL: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb2 Model: claude-3-haiku-20240307
                    ```json
                    {
                      "brands": [
                        "SG"
                      ]
                    }
                    URL: http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb2 Model: gpt-4o
                    ```json{  "legit_domain": "sg.fr",  "classification": "wellknown",  "reasons": [    "The brand 'SG' is likely referring to Socit Gnrale, a well-known French bank.",    "The URL 'doscome.cluster029.hosting.ovh.net' does not match the legitimate domain 'sg.fr' associated with Socit Gnrale.",    "The domain 'ovh.net' is a hosting provider, which can be used by anyone to host websites, increasing the risk of phishing.",    "The presence of a subdomain 'doscome.cluster029' is unusual and not typically associated with the official bank's domain.",    "The input field 'Saisissez votre code client' suggests the site is asking for sensitive information, which is common in phishing attempts."  ],  "riskscore": 9}
                    Google indexed: False
                    URL: doscome.cluster029.hosting.ovh.net
                                Brands: SG
                                Input Fields: Saisissez votre code client
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 15:39:27 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.983843365967444
                    Encrypted:false
                    SSDEEP:
                    MD5:241D47FC67606718F565FBD7EF94B905
                    SHA1:11AE00B026BA7D979D0D709D5BD93F6F67E9C8C2
                    SHA-256:7345AD92464DB9FFF27C267F8C8579A8C02381248C274F1271473560AF56401A
                    SHA-512:10176DBD1A418DF3676193DEFDC1C28839C7BEDA0DEE94411C08DB459EB80D3609BF99DD859C761E416F2C04307BDE6A26922BC9C2652A265504BBEC03DB6E82
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....A@.W)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............0.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 15:39:27 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):3.999896801142269
                    Encrypted:false
                    SSDEEP:
                    MD5:A6F2C58EC90C390A3E683C25B115EDA3
                    SHA1:D9CBD9868A8C393FCE56D8A5373230B20E391204
                    SHA-256:7D3AE27B75AAF701049E2AC609B2DA2206DBA3DBD2B193F209E754DA7F55A1C9
                    SHA-512:A9FFF37EA2B07EF659AF5AA0793615500665A55C4D31454AAAFC6214698355BE1E83A9D58E3ED72D72E6FCA0B924489CDEC11ED6BA5A12EA85074BAFBBB3DCF0
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....(.4.W)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............0.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.009481087537191
                    Encrypted:false
                    SSDEEP:
                    MD5:5C9745F7665BCB2E3731FFA24D4000B0
                    SHA1:A779B3D9EE4478D787323DD2A328AB86B151BCD6
                    SHA-256:77D36B857A4BC9E5F26AD38104979DD5CC04C9D3104B09FF55A66BDC4E5E8B0B
                    SHA-512:29A55A53934F913085ACE00CE9EFA16FAAB32EA7DABBB24F9C2B5AE802D3FECD36F9EC26FDD7C955BF131AF211B96FBD3E7042E4E8F05604BE4ABB60C37639FE
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............0.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 15:39:27 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9985785662513673
                    Encrypted:false
                    SSDEEP:
                    MD5:300AF8F1F27892FCA9AAB480F240CDA7
                    SHA1:7EA68B5973BE42A9E393A4AD8717531FC943B9DB
                    SHA-256:A8717A37318F41617BEBF861844813060DDB5B09BE18FCC39F3C0FE9EB34F313
                    SHA-512:E9B02347C587CD941C663BCE0A9D21B023B28B5E97DE960F8160EA6591A1ED525C664248BA1E6E6D0B3375A59C42D2CC85A3E1AC0339F213E9EAD034DAA4A1F8
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....*/.W)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............0.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 15:39:27 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9875529465828685
                    Encrypted:false
                    SSDEEP:
                    MD5:1688812467C6BCBAEFCDEF99D3DBD812
                    SHA1:142023096FCE1DB8A898D081D8D369A030546E72
                    SHA-256:AC0C5D41AE0BF1D25180EF3C9E9E3E7A5489491B4005B8EC569650528CE8BD56
                    SHA-512:2F83A50592B07AE18A6C06A473C4116C5AD59C5BA05A54D7A7BA4F69DD25E7A99B5C6890592E5D1BBFFE1AA9D67BB31662C4F09A969571CFA09E5325979E7D64
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......:.W)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............0.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 15:39:27 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9940115105426712
                    Encrypted:false
                    SSDEEP:
                    MD5:BDFEB9EF5B4009F212D677637CEC8154
                    SHA1:38F342E2275EF07CF24B830763BA288B69C3684A
                    SHA-256:452883170801D73710D3D8348EF620633B7B359FDB1F65E19C36D112D2F35153
                    SHA-512:16FACD617F39A76029B1FBBFAFE34BC572B265EC7ED0037933A9D0035ED7FE9E1BE92FBB2B8D471A23AB7D53E105D1A9237AD86294D06EB5CEF53BE575789E5D
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....f%.W)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............0.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:gzip compressed data, from Unix, original size modulo 2^32 88144
                    Category:dropped
                    Size (bytes):30675
                    Entropy (8bit):7.990337984688712
                    Encrypted:true
                    SSDEEP:
                    MD5:E26795AC1369D6D3FD6E6B165428448F
                    SHA1:29FC3C7E89BFAFA2F759E13BC51C44ADA83F3221
                    SHA-256:FD3A1B4234A1F5D0D1E47881E39A7F49EC05078EE2BF9A8D412B3EFC1D4F762B
                    SHA-512:57CB0CBA41E6E8ACDD39681E0C4844AFBF068CA8A521B9E06A2E1ACB11F536AE094A563E06B2ECA5D0DB2D434547271EBC7F8164CEB9BF4BDC61C45D6AA1ABCB
                    Malicious:false
                    Reputation:unknown
                    Preview:............y{.F./...)D...0[..d....qd;q&..m(&.D..".`.PKD..~.W..h....{...X..VW.^..{..~.N........N.6..,8.....|...*..8....UR...*.u..%...7|:...e:K.29x~.....l...DU.....%}6...._...E.U..$_.....29<..b...*...(.....&.qE..AX..<...W....".;....E.....\$...")..4.S.....;.....Z.....lC..{43."...3.....VWi.l..T...8...T...l7U.}.0.L.....Q.W.UF....K..5..Z..j]^......Jf..V.Q6..w.Tv.n..*.....URT.*.n...(.........*n"w6e.<.^#.[...H.z".A...t.U....d....I..:.m.,zD.ao..b..........t.......^*..1..Ji.~.e...`0+..J^/..."]a1...A..W.@sA.P....,.i.'.t....Y..S'..~......l<Si0.YN.. ^..l~v...~..VqA...&dP$7.mb.l.0.ZSCs2N.....d..Z.q6.e....`>...-.g.y..=u.5..i.6..`..(....Ut...<_.y.......i.?;..Wd...h.z..e.]VW..0.{ ......X...><.....E.?..C..hD......)...N.z.%...z.2.&z.....m..u.....ZI....h...v&J.Lla..Z.p..c...ar:..j....;...&...*.]7......$.e.U..N..Jj,DCLne.F.d..J..UW...x..R....U],..A.3.....&.k...5.{Ti@.2j..V.%6..A...K.y%*X.EY. ...R.e.d...*...1..J..........Im.sx.e...i5...e.i8...l.w.vU...,.,|.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):28
                    Entropy (8bit):4.110577243331642
                    Encrypted:false
                    SSDEEP:
                    MD5:00643FF985D498F79CB85FE142E54821
                    SHA1:F98AC3C1890A6813FF9352273526FE0B8B1D7AB1
                    SHA-256:6F957FC6ADC54EB1965069C672AC60E1B1E352BEE40111E5BB02EAB0467EB329
                    SHA-512:D3FD68933183A0FD1EBFA04CE54EA78D5D9F2706C99412DD7B5D8B127AD007120DE84A9A97D54B411759C005BF54DAA116B9C366CC6FABD05AB5039BE1E5D431
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwlHqmBnVwixrRIFDYUCXJYSBQ10caBc?alt=proto
                    Preview:ChIKBw2FAlyWGgAKBw10caBcGgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:gzip compressed data, from Unix, original size modulo 2^32 576485
                    Category:downloaded
                    Size (bytes):300031
                    Entropy (8bit):7.9970396503807795
                    Encrypted:true
                    SSDEEP:
                    MD5:748C79B263B3CE38FAE01DD1D9A6D12E
                    SHA1:E7C3DA7B54A2DB872C4E9489D17B80B60200FDFC
                    SHA-256:BFDEDAAEEA54E0E66C40860842789B364524F276C95E16596B115DF61F46693B
                    SHA-512:C9AFB2B1A7C3F3CA370E08420318FD93D0DCBDC1DAA3A87F58F558A50EFAFD01845FF9AB4D9246FB42E82DE4153615F076FDC0A2D994F540CC1A16900A1A1FC0
                    Malicious:false
                    Reputation:unknown
                    URL:http://doscome.cluster029.hosting.ovh.net/Sglient/home/ssg-log.php?token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzExNy4wLjAuMCBTYWZhcmkvNTM3LjM2MTU1Ljk0LjI0MS4xODgyMDI0Ok9jdDpNb24=
                    Preview:..........|....Pz.wl]E..<..BN.Ze...3.."L.._...*...I.....w... ....9.."..K.........._.d...W..._.>...u;.....-...W....a...IU../...l....b<....u.K..[./.}.....mO...}.;.5.......]:'.^.'O.M...->..u...?...H......du.n...c/.F.w.o.......z...........|.o.4.....C....we..{.W....u...C....lbL.E..5.9O..?....$..,...._..j.c.....X..V.>....?.n9.C..-/.w..i......>...?.......r.O..9...}.o..g........k..o8......y.'...o...X.K.l....&`L..U....d.~...{...Y:.s...!.y..5\...uC3.i............ ...CQ.....4X.........".V..@.....|.$..K./. ...G............H.a..6F.[=...0E!?/#..Q.@......}.r.....@Yj&.$.oW.....?.0..j.RY..S..A...Fq.xh...@%{...bM...4H..|..[.M_@..P....X...fg.A..T].%r....O ..(1.8V.'..*....~."..La....$.?.....dA......J!ig.>.:...Ru"..[wPJw....`..u..@E..v.T......jM....s\m=...E...^q}nb=7.~..5Zh%.........a.s.....So.('..>J....F:K...t".Ow.K....>.y....'....+$.../.!x......o.WH2..+...[~D.s.(....y3..N....G.n.SX.....O..4<|~w.k...).k..x..;....:...}.s2....X.x..Q.E....d.7$.X.*.m(.u=7.._
                    No static file info