Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWB

Overview

General Information

Sample URL:https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqM
Analysis ID:1544268

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6744 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6896 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,11793902910575699115,2361525898756261869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 5888 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWBk2ohUBXkUSlJZgAwZTovNRKoDYkNTLZ8CHl2MbgckzDrQYy3ikn3MpoZVaqVnLlTKFWgMZoj-gwAE_Tzg3x-ht6opT8svl6_9H41-3zffUivz888MniIQ00MyX80h3pY-nGmzqf6BTnX6yuL-exnR_D3bfNuU35qjc_vhx4tp_p_hpX2U07-mcz3y5OFvg5Tcd" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWBk2ohUBXkUSlJZgAwZTovNRKoDYkNTLZ8CHl2MbgckzDrQYy3ikn3MpoZVaqVnLlTKFWgMZoj-gwAE_Tzg3x-ht6opT8svl6_9H41-3zffUivz888MniIQ00MyX80h3pY-nGmzqf6BTnX6yuL-exnR_D3bfNuU35qjc_vhx4tp_p_hpX2U07-mcz3y5OFvg5TcdHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:55208 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 27MB later: 36MB
Source: global trafficTCP traffic: 192.168.2.16:55200 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:55200 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:55200 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:55200 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:55200 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: global trafficDNS traffic detected: DNS query: email.email.pandadoc.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 55208 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 55206 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55205
Source: unknownNetwork traffic detected: HTTP traffic on port 55202 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55206
Source: unknownNetwork traffic detected: HTTP traffic on port 55204 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55207
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55208
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55201
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55202
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55204
Source: unknownNetwork traffic detected: HTTP traffic on port 55201 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 55207 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 55205 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:55208 version: TLS 1.2
Source: classification engineClassification label: clean1.win@21/7@4/46
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,11793902910575699115,2361525898756261869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWBk2ohUBXkUSlJZgAwZTovNRKoDYkNTLZ8CHl2MbgckzDrQYy3ikn3MpoZVaqVnLlTKFWgMZoj-gwAE_Tzg3x-ht6opT8svl6_9H41-3zffUivz888MniIQ00MyX80h3pY-nGmzqf6BTnX6yuL-exnR_D3bfNuU35qjc_vhx4tp_p_hpX2U07-mcz3y5OFvg5Tcd"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,11793902910575699115,2361525898756261869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWBk2ohUBXkUSlJZgAwZTovNRKoDYkNTLZ8CHl2MbgckzDrQYy3ikn3MpoZVaqVnLlTKFWgMZoj-gwAE_Tzg3x-ht6opT8svl6_9H41-3zffUivz888MniIQ00MyX80h3pY-nGmzqf6BTnX6yuL-exnR_D3bfNuU35qjc_vhx4tp_p_hpX2U07-mcz3y5OFvg5Tcd0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
email.email.pandadoc.net0%VirustotalBrowse
www.google.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
email.email.pandadoc.net
108.138.26.88
truefalseunknown
www.google.com
142.250.186.100
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWBk2ohUBXkUSlJZgAwZTovNRKoDYkNTLZ8CHl2MbgckzDrQYy3ikn3MpoZVaqVnLlTKFWgMZoj-gwAE_Tzg3x-ht6opT8svl6_9H41-3zffUivz888MniIQ00MyX80h3pY-nGmzqf6BTnX6yuL-exnR_D3bfNuU35qjc_vhx4tp_p_hpX2U07-mcz3y5OFvg5Tcdfalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    1.1.1.1
    unknownAustralia
    13335CLOUDFLARENETUSfalse
    34.104.35.123
    unknownUnited States
    15169GOOGLEUSfalse
    239.255.255.250
    unknownReserved
    unknownunknownfalse
    216.58.212.142
    unknownUnited States
    15169GOOGLEUSfalse
    74.125.133.84
    unknownUnited States
    15169GOOGLEUSfalse
    142.250.186.131
    unknownUnited States
    15169GOOGLEUSfalse
    108.138.26.88
    email.email.pandadoc.netUnited States
    16509AMAZON-02USfalse
    142.250.186.100
    www.google.comUnited States
    15169GOOGLEUSfalse
    IP
    192.168.2.16
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1544268
    Start date and time:2024-10-29 07:20:12 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsinteractivecookbook.jbs
    Sample URL:https://email.email.pandadoc.net/c/eJxUkM1u2zoQhZ-G3NmghqQoLbjIzYUKJEhROHWAZBOQnJFNWxIVibJrP31hoOnPbjCYb_Cdg9aX0rcVxxSWnob8HtGOexW2e4T4ErRRr7vdNR2b_zjZwkhRyEqUku9tAAwgXOt9ibqslalI1VQVovaGJEgeLQhQhYCqMFqBXFdlLSG02qAsQKiSKUG9i916dAM6TGE9UOZxfs-TC-R8RzZPC_HO7nMeZybvGDQMGjeOf5CQegbNpz6D5gRMNjkdaWDyf1fWBk2ohUBXkUSlJZgAwZTovNRKoDYkNTLZ8CHl2MbgckzDrQYy3ikn3MpoZVaqVnLlTKFWgMZoj-gwAE_Tzg3x-ht6opT8svl6_9H41-3zffUivz888MniIQ00MyX80h3pY-nGmzqf6BTnX6yuL-exnR_D3bfNuU35qjc_vhx4tp_p_hpX2U07-mcz3y5OFvg5Tcd
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:11
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    Analysis Mode:stream
    Analysis stop reason:Timeout
    Detection:CLEAN
    Classification:clean1.win@21/7@4/46
    • Exclude process from analysis (whitelisted): svchost.exe
    • Excluded IPs from analysis (whitelisted): 142.250.186.131, 216.58.212.142, 74.125.133.84, 34.104.35.123
    • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
    • Not all processes where analyzed, report is missing behavior information
    InputOutput
    URL: Model: claude-3-5-sonnet-latest
    {
        "typosquatting": false,
        "unusual_query_string": false,
        "suspicious_tld": false,
        "ip_in_url": false,
        "long_subdomain": true,
        "malicious_keywords": false,
        "encoded_characters": false,
        "redirection": false,
        "contains_email_address": false,
        "known_domain": true,
        "brand_spoofing_attempt": false,
        "third_party_hosting": true
    }
    URL: URL: https://email.email.pandadoc.net
    URL: Model: claude-3-5-sonnet-latest
    {
        "typosquatting": false,
        "unusual_query_string": false,
        "suspicious_tld": false,
        "ip_in_url": false,
        "long_subdomain": false,
        "malicious_keywords": false,
        "encoded_characters": false,
        "redirection": false,
        "contains_email_address": false,
        "known_domain": true,
        "brand_spoofing_attempt": false,
        "third_party_hosting": false
    }
    URL: URL: https://pandadoc.net
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 05:20:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2673
    Entropy (8bit):3.983206764351825
    Encrypted:false
    SSDEEP:
    MD5:73B38D5620B7F300DB8C74C410FA8136
    SHA1:F0239D7470A70F02D78535996E73B46897F14110
    SHA-256:C086FFFBC53581C1F628FDB870F3EADC4B250CDC6197FAEC84F14927746F98BE
    SHA-512:5CD7E62DD332E0D2C1A8A0744C2455C2327835695F0A32C20E0A4DEC72EDB7A6DF2C67CC91D2F0B6A41E8062BA8353F621ED780B261AD495049C9C028AF2040F
    Malicious:false
    Reputation:unknown
    Preview:L..................F.@.. ...$+.,....s.G..)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y.2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y.2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y.2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y.2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 05:20:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2675
    Entropy (8bit):4.000583358723937
    Encrypted:false
    SSDEEP:
    MD5:09CB76D50137D83CFE1B70BBE3FE7F0E
    SHA1:437E3A662F6109AF98584A6802B86DDA686FCFD0
    SHA-256:1BD42ADFAFF741D0151046BE12D0FBC0C480192BD80C53BC4FEF8ECA9BAB337B
    SHA-512:729FF144883B09D269355BCCE6732AD6F7B6369A37989C1369118CD0AC9E10BAC7005ACF09483FC173F059AAEFDAF8F8F9F4A2B5604EE09A7CDCAD68D0DA45E3
    Malicious:false
    Reputation:unknown
    Preview:L..................F.@.. ...$+.,.....H;..)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y.2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y.2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y.2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y.2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2689
    Entropy (8bit):4.00888266028756
    Encrypted:false
    SSDEEP:
    MD5:08665D0D66F12026E55137C14480CE4B
    SHA1:10AD078DF4645BC0969D94BF7EA3443E4F8CAA30
    SHA-256:15EE675DFF42E46D92CD9DC3D910A1A8C27BF3676737AB4FE24F80AAD39CE0E5
    SHA-512:5658046F78823A6EF01F6C89908C1F03FB3E767FE249F36FE65719F36B27E0EE2F03985D79EC7A9305EF5DE39DE983DF93D9A173FEAC8E7F5CF356B804EE085D
    Malicious:false
    Reputation:unknown
    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y.2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y.2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y.2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 05:20:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):3.9994961856571147
    Encrypted:false
    SSDEEP:
    MD5:EB1EEE1641ED036E960B43509AC83AA8
    SHA1:3771D0CE87C4D5B07C49C1DD4007B7EF17E1FFD2
    SHA-256:D3588202F2E4B03A9EBD1111345C8B211521D44F1468B32DB8BDF803BAFEE703
    SHA-512:AEA9B3185EB125F27EA540705240D4C36151B170F5CABD3C53140EB117F1ED125C7F7404DCF29A608F34D16EE5E25C32B59F94B2AB21393F12305EEE7C12577B
    Malicious:false
    Reputation:unknown
    Preview:L..................F.@.. ...$+.,......5..)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y.2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y.2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y.2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y.2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 05:20:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2677
    Entropy (8bit):3.9874851836519776
    Encrypted:false
    SSDEEP:
    MD5:A577A5B031FD2B4EEA60A32C760B3B68
    SHA1:864A1959264BA6AB81121F9BCB037BD8ECB1374F
    SHA-256:F4101CE0A6E1AE999C5E556B7BA91707D92A2E10D79D9B8A32F997828DAD866E
    SHA-512:634E80ECD2EAEE1ECC906F561C6CC4B4C38804715F8DEBA6047E6C6697B8F4D877E9C7F39A0D0B6FED945B6E8F10E3F3F700B5203AC1BA86EF4C814D5A73EF16
    Malicious:false
    Reputation:unknown
    Preview:L..................F.@.. ...$+.,....,<A..)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y.2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y.2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y.2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y.2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 05:20:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
    Category:dropped
    Size (bytes):2679
    Entropy (8bit):3.9975750956239837
    Encrypted:false
    SSDEEP:
    MD5:4E7C07202EBA5DAB871354CA4BEE066B
    SHA1:2D4BA43D5D16D8F98007A8D8B247EA93CE39BE51
    SHA-256:5017751EC34537CEA506F2C56242B4F68C4FB16BD61C58F2F1727FA785B92130
    SHA-512:F2D7535EB399A2319156D6CDAAC67F61D5D0CFA0C44B6493375B1329D0835D3542F6064743C58B06C59C53A52911F2D296CFBE87B9AA6196923831529300F6E7
    Malicious:false
    Reputation:unknown
    Preview:L..................F.@.. ...$+.,......,..)..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y.2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y.2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y.2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y.2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............o.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
    File Type:ASCII text
    Category:downloaded
    Size (bytes):19
    Entropy (8bit):3.6818808028034042
    Encrypted:false
    SSDEEP:
    MD5:595E88012A6521AAE3E12CBEBE76EB9E
    SHA1:DA3968197E7BF67AA45A77515B52BA2710C5FC34
    SHA-256:B16E15764B8BC06C5C3F9F19BC8B99FA48E7894AA5A6CCDAD65DA49BBF564793
    SHA-512:FD13C580D15CC5E8B87D97EAD633209930E00E85C113C776088E246B47F140EFE99BDF6AB02070677445DB65410F7E62EC23C71182F9F78E9D0E1B9F7FDA0DC3
    Malicious:false
    Reputation:unknown
    URL:https://email.email.pandadoc.net/favicon.ico
    Preview:404 page not found.
    No static file info