Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_dD1leUpoYkdjaU9pSklVekkxTmlKOS5leUowY21GamEybHVaMTkwYjJ0bGJpSTZJalZqWXpoa01UQmxMVEZpTVRNdE5EQTJaQzA1TURVMkxURXlZVFk0WVRSa05EbGhNQ0lzSW1ObGJHd2lPaUpvZEhSd2N6b3ZMM0ZuWW1aM2IzYzJN

Overview

General Information

Sample URL:https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_dD1leUpoYkdjaU9pSklVekkxTmlKOS5leUowY21GamEybHVaMTkwYjJ0bGJpSTZJalZqWXpoa01U
Analysis ID:1552469

Detection

HTMLPhisher
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
HTML body contains low number of good links
HTML body contains password input but no form action
HTML title does not match URL
Invalid T&C link found
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6360 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7008 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1832,i,4733644160233963638,16657044225518523141,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6544 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_dD1leUpoYkdjaU9pSklVekkxTmlKOS5leUowY21GamEybHVaMTkwYjJ0bGJpSTZJalZqWXpoa01UQmxMVEZpTVRNdE5EQTJaQzA1TURVMkxURXlZVFk0WVRSa05EbGhNQ0lzSW1ObGJHd2lPaUpvZEhSd2N6b3ZMM0ZuWW1aM2IzYzJNR1l1WlhobFkzVjBaUzFoY0drdWRYTXRkMlZ6ZEMweUxtRnRZWHB2Ym1GM2N5NWpiMjB2Y0hKdlpDOWhjR2t2Y0docGMyaHBibWRqWVcxd1lXbG5iaUlzSW1OaGJYQmhhV2R1WDNSdmEyVnVJam9pTm1JM05XSTNNRGt0TkRWaVl5MDBOVFpqTFdJeU1HWXRZalJpTXpVeE9UQmxaRFF3SWl3aWRHVnpkRjkwYjJ0bGJpSTZabUZzYzJVc0ltVjRkR1Z5Ym1Gc1gzUnlZV2x1YVc1bklqcG1ZV3h6WlN3aVpHbHlaV04wWDJSbGJHbDJaWEo1SWpwMGNuVmxMQ0pwWVhRaU9qRTNNekV3T0RReE56a3NJbWx6Y3lJNkltaDBkSEJ6T2k4dllYQndMbkJvYVhOb2RHaHlaV0YwTG1OdmJTSXNJbVY0Y0NJNk1UY3pPRGcyTURFM09YMC5qRlY0OGJMNkJuVXNUUWp3ME84MHpaTWZkWXp1X1RiMmoxYTlfYUMwZlhv&p=m&i=NjEwYjE2Y2U0Zjc0MWMwZTk2MmNlZjk5&t=bWhSZnFlc2Z5WlZLRSt2ZE51Wnk0S0FPcng1NStjNWNXYlFKYWNoMVVQUT0=&h=94894c2300ca4179bc6a5fad2b6f7320&s=AVNPUEhUT0NFTkNSWVBUSVbGzig1wPRd_1oljM8LJU60Hq9VlWBTQiABDwLsqafDog" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    Phishing

    barindex
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoLLM: Score: 9 Reasons: The brand 'Google' is well-known and typically associated with the domain 'google.com'., The URL 'www.online-statements.site' does not match the legitimate domain for Google., The domain 'online-statements.site' is generic and not associated with Google., The presence of input fields for 'Email or phone' and 'Password' is typical for phishing sites attempting to capture login credentials., The use of a generic domain name with no clear association to Google is suspicious. DOM: 0.0.pages.csv
    Source: Yara matchFile source: 0.0.pages.csv, type: HTML
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: Number of links: 0
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: <input type="password" .../> found but no <form action="...
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: Title: Sign in - Google Accounts does not match URL
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: Invalid link: Privacy
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: Invalid link: Terms
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: Invalid link: Help
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: <input type="password" .../> found
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: No favicon
    Source: https://staysafe.sophos.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXo&submitted=trueHTTP Parser: No favicon
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: No <meta name="author".. found
    Source: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiNmI3NWI3MDktNDViYy00NTZjLWIyMGYtYjRiMzUxOTBlZDQwIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiZGlyZWN0X2RlbGl2ZXJ5Ijp0cnVlLCJpYXQiOjE3MzEwODQxNzksImlzcyI6Imh0dHBzOi8vYXBwLnBoaXNodGhyZWF0LmNvbSIsImV4cCI6MTczODg2MDE3OX0.jFV48bL6BnUsTQjw0O80zZMfdYzu_Tb2j1a9_aC0fXoHTTP Parser: No <meta name="copyright".. found
    Source: unknownHTTPS traffic detected: 20.190.159.2:443 -> 192.168.2.16:49702 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 95.101.197.164:443 -> 192.168.2.16:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 95.101.197.164:443 -> 192.168.2.16:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49722 version: TLS 1.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.2
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 95.101.197.164
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: global trafficDNS traffic detected: DNS query: eu-west-1.protection.sophos.com
    Source: global trafficDNS traffic detected: DNS query: www.online-statements.site
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: staysafe.sophos.com
    Source: global trafficDNS traffic detected: DNS query: sophos-phish-threat.go-vip.co
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
    Source: unknownHTTPS traffic detected: 20.190.159.2:443 -> 192.168.2.16:49702 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 95.101.197.164:443 -> 192.168.2.16:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 95.101.197.164:443 -> 192.168.2.16:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49722 version: TLS 1.2
    Source: classification engineClassification label: mal56.phis.win@18/6@18/145
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1832,i,4733644160233963638,16657044225518523141,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_dD1leUpoYkdjaU9pSklVekkxTmlKOS5leUowY21GamEybHVaMTkwYjJ0bGJpSTZJalZqWXpoa01UQmxMVEZpTVRNdE5EQTJaQzA1TURVMkxURXlZVFk0WVRSa05EbGhNQ0lzSW1ObGJHd2lPaUpvZEhSd2N6b3ZMM0ZuWW1aM2IzYzJNR1l1WlhobFkzVjBaUzFoY0drdWRYTXRkMlZ6ZEMweUxtRnRZWHB2Ym1GM2N5NWpiMjB2Y0hKdlpDOWhjR2t2Y0docGMyaHBibWRqWVcxd1lXbG5iaUlzSW1OaGJYQmhhV2R1WDNSdmEyVnVJam9pTm1JM05XSTNNRGt0TkRWaVl5MDBOVFpqTFdJeU1HWXRZalJpTXpVeE9UQmxaRFF3SWl3aWRHVnpkRjkwYjJ0bGJpSTZabUZzYzJVc0ltVjRkR1Z5Ym1Gc1gzUnlZV2x1YVc1bklqcG1ZV3h6WlN3aVpHbHlaV04wWDJSbGJHbDJaWEo1SWpwMGNuVmxMQ0pwWVhRaU9qRTNNekV3T0RReE56a3NJbWx6Y3lJNkltaDBkSEJ6T2k4dllYQndMbkJvYVhOb2RHaHlaV0YwTG1OdmJTSXNJbVY0Y0NJNk1UY3pPRGcyTURFM09YMC5qRlY0OGJMNkJuVXNUUWp3ME84MHpaTWZkWXp1X1RiMmoxYTlfYUMwZlhv&p=m&i=NjEwYjE2Y2U0Zjc0MWMwZTk2MmNlZjk5&t=bWhSZnFlc2Z5WlZLRSt2ZE51Wnk0S0FPcng1NStjNWNXYlFKYWNoMVVQUT0=&h=94894c2300ca4179bc6a5fad2b6f7320&s=AVNPUEhUT0NFTkNSWVBUSVbGzig1wPRd_1oljM8LJU60Hq9VlWBTQiABDwLsqafDog"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1832,i,4733644160233963638,16657044225518523141,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    1
    Masquerading
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_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&p=m&i=NjEwYjE2Y2U0Zjc0MWMwZTk2MmNlZjk5&t=bWhSZnFlc2Z5WlZLRSt2ZE51Wnk0S0FPcng1NStjNWNXYlFKYWNoMVVQUT0=&h=94894c2300ca4179bc6a5fad2b6f7320&s=AVNPUEhUT0NFTkNSWVBUSVbGzig1wPRd_1oljM8LJU60Hq9VlWBTQiABDwLsqafDog0%Avira URL Cloudsafe
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    d35tlz0p71apkp.cloudfront.net
    18.239.94.33
    truefalse
      unknown
      sophos-phish-threat.go-vip.co
      192.0.66.2
      truefalse
        unknown
        www.google.com
        142.250.184.228
        truefalse
          high
          staysafe.sophos.com
          192.0.66.203
          truefalse
            unknown
            www.online-statements.site
            63.34.131.219
            truetrue
              unknown
              eu-west-1.protection.sophos.com
              unknown
              unknownfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                63.34.131.219
                www.online-statements.siteUnited States
                16509AMAZON-02UStrue
                142.250.74.202
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.185.78
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.185.206
                unknownUnited States
                15169GOOGLEUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                74.125.133.84
                unknownUnited States
                15169GOOGLEUSfalse
                18.239.94.33
                d35tlz0p71apkp.cloudfront.netUnited States
                16509AMAZON-02USfalse
                192.0.66.2
                sophos-phish-threat.go-vip.coUnited States
                2635AUTOMATTICUSfalse
                142.250.181.227
                unknownUnited States
                15169GOOGLEUSfalse
                192.0.66.203
                staysafe.sophos.comUnited States
                2635AUTOMATTICUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                142.250.184.228
                www.google.comUnited States
                15169GOOGLEUSfalse
                172.217.16.195
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.16
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1552469
                Start date and time:2024-11-08 20:17:49 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_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&p=m&i=NjEwYjE2Y2U0Zjc0MWMwZTk2MmNlZjk5&t=bWhSZnFlc2Z5WlZLRSt2ZE51Wnk0S0FPcng1NStjNWNXYlFKYWNoMVVQUT0=&h=94894c2300ca4179bc6a5fad2b6f7320&s=AVNPUEhUT0NFTkNSWVBUSVbGzig1wPRd_1oljM8LJU60Hq9VlWBTQiABDwLsqafDog
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:13
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal56.phis.win@18/6@18/145
                • Exclude process from analysis (whitelisted): svchost.exe
                • Excluded IPs from analysis (whitelisted): 142.250.181.227, 142.250.185.206, 74.125.133.84, 34.104.35.123
                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: https://eu-west-1.protection.sophos.com/?d=online-statements.site&u=aHR0cHM6Ly93d3cub25saW5lLXN0YXRlbWVudHMuc2l0ZS9zaWduaW4_dD1leUpoYkdjaU9pSklVekkxTmlKOS5leUowY21GamEybHVaMTkwYjJ0bGJpSTZJalZqWXpoa01UQmxMVEZpTVRNdE5EQTJaQzA1TURVMkxURXlZVFk0WVRSa05EbGhNQ0lzSW1ObGJHd2lPaUpvZEhSd2N6b3ZMM0ZuWW1aM2IzYzJNR1l1WlhobFkzVjBaUzFoY0drdWRYTXRkMlZ6ZEMweUxtRnRZWHB2Ym1GM2N5NWpiMjB2Y0hKdlpDOWhjR2t2Y0docGMyaHBibWRqWVcxd1lXbG5iaUlzSW1OaGJYQmhhV2R1WDNSdmEyVnVJam9pTm1JM05XSTNNRGt0TkRWaVl5MDBOVFpqTFdJeU1HWXRZalJpTXpVeE9UQmxaRFF3SWl3aWRHVnpkRjkwYjJ0bGJpSTZabUZzYzJVc0ltVjRkR1Z5Ym1Gc1gzUnlZV2x1YVc1bklqcG1ZV3h6WlN3aVpHbHlaV04wWDJSbGJHbDJaWEo1SWpwMGNuVmxMQ0pwWVhRaU9qRTNNekV3T0RReE56a3NJbWx6Y3lJNkltaDBkSEJ6T2k4dllYQndMbkJvYVhOb2RHaHlaV0YwTG1OdmJTSXNJbVY0Y0NJNk1UY3pPRGcyTURFM09YMC5qRlY0OGJMNkJuVXNUUWp3ME84MHpaTWZkWXp1X1RiMmoxYTlfYUMwZlhv&p=m&i=NjEwYjE2Y2U0Zjc0MWMwZTk2MmNlZjk5&t=bWhSZnFlc2Z5WlZLRSt2ZE51Wnk0S0FPcng1NStjNWNXYlFKYWNoMVVQUT0=&h=94894c2300ca4179bc6a5fad2b6f7320&s=AVNPUEhUT0NFTkNSWVBUSVbGzig1wPRd_1oljM8L
                InputOutput
                URL: Model: claude-3-5-sonnet-latest
                {
                    "typosquatting": false,
                    "unusual_query_string": false,
                    "suspicious_tld": false,
                    "ip_in_url": false,
                    "long_subdomain": true,
                    "malicious_keywords": false,
                    "encoded_characters": false,
                    "redirection": false,
                    "contains_email_address": false,
                    "known_domain": true,
                    "brand_spoofing_attempt": false,
                    "third_party_hosting": false
                }
                URL: URL: https://eu-west-1.protection.sophos.com
                URL: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYW Model: claude-3-haiku-20240307
                ```json
                {
                  "contains_trigger_text": true,
                  "trigger_text": "Sign in with your Google Account",
                  "prominent_button_name": "Sign in",
                  "text_input_field_labels": [
                    "Email or phone",
                    "Password"
                  ],
                  "pdf_icon_visible": false,
                  "has_visible_captcha": false,
                  "has_urgent_text": false,
                  "has_visible_qrcode": false
                }
                URL: Model: claude-3-5-sonnet-latest
                {
                    "typosquatting": false,
                    "unusual_query_string": false,
                    "suspicious_tld": true,
                    "ip_in_url": false,
                    "long_subdomain": false,
                    "malicious_keywords": true,
                    "encoded_characters": false,
                    "redirection": false,
                    "contains_email_address": false,
                    "known_domain": false,
                    "brand_spoofing_attempt": false,
                    "third_party_hosting": true
                }
                URL: URL: https://www.online-statements.site
                URL: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYW Model: claude-3-haiku-20240307
                ```json
                {
                  "brands": [
                    "Google"
                  ]
                }
                URL: https://www.online-statements.site/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYW Model: gpt-4o
                ```json{  "legit_domain": "google.com",  "classification": "wellknown",  "reasons": [    "The brand 'Google' is well-known and typically associated with the domain 'google.com'.",    "The URL 'www.online-statements.site' does not match the legitimate domain for Google.",    "The domain 'online-statements.site' is generic and not associated with Google.",    "The presence of input fields for 'Email or phone' and 'Password' is typical for phishing sites attempting to capture login credentials.",    "The use of a generic domain name with no clear association to Google is suspicious."  ],  "riskscore": 9}
                Google indexed: False
                URL: www.online-statements.site
                            Brands: Google
                            Input Fields: Email or phone, Password
                URL: https://staysafe.sophos.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsI Model: claude-3-haiku-20240307
                ```json
                {
                  "contains_trigger_text": true,
                  "trigger_text": "Go to training",
                  "prominent_button_name": "Go to training",
                  "text_input_field_labels": "unknown",
                  "pdf_icon_visible": false,
                  "has_visible_captcha": false,
                  "has_urgent_text": true,
                  "has_visible_qrcode": false
                }
                URL: Model: claude-3-5-sonnet-latest
                {
                    "typosquatting": false,
                    "unusual_query_string": false,
                    "suspicious_tld": false,
                    "ip_in_url": false,
                    "long_subdomain": false,
                    "malicious_keywords": false,
                    "encoded_characters": false,
                    "redirection": false,
                    "contains_email_address": false,
                    "known_domain": true,
                    "brand_spoofing_attempt": false,
                    "third_party_hosting": false
                }
                URL: URL: https://staysafe.sophos.com
                URL: https://staysafe.sophos.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6IjVjYzhkMTBlLTFiMTMtNDA2ZC05MDU2LTEyYTY4YTRkNDlhMCIsImNlbGwiOiJodHRwczovL3FnYmZ3b3c2MGYuZXhlY3V0ZS1hcGkudXMtd2VzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsI Model: claude-3-haiku-20240307
                ```json
                {
                  "brands": [
                    "Sophos"
                  ]
                }
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 8 18:18:23 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2673
                Entropy (8bit):3.9796791418335364
                Encrypted:false
                SSDEEP:
                MD5:3BB993C64C092EE262CCDA8598FCD743
                SHA1:825164BC25A9D7A51F9BBBD34C7014F8093C9210
                SHA-256:FAAD7B0507AC44E622DF5731E5E3FB1951D368DE638A4D90DA9959B8987E7213
                SHA-512:A44EEDBF022C196746E2ACEBFD7AECC5843FEFE43CDA261725E65DB3161FF2031BB94691D24D179242C3114EB12F1E7934902E153807E26CB3CF1F35E19CBB15
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.........2..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IhYA.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VhYK.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VhYK.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VhYK............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VhYL............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............U.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 8 18:18:23 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2675
                Entropy (8bit):3.994164474401185
                Encrypted:false
                SSDEEP:
                MD5:76BB1EDDE6B22788DD99C659CE7BBF5F
                SHA1:A5B38F9192D1C6B20341D1A0686F6F9427E024AF
                SHA-256:9A6F58109A5719486A5CA067DC3E740F0C77D3A80DF09A2C5EBD64B551D052F2
                SHA-512:D5BB87F632F5E70FF1886DE1477887CD929F5D42335465D601629AFF5D306D0BC3EA2D318ED358DC02D0F6008C7CE444717343ACA149665A01CAFBC8374447D9
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....W....2..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IhYA.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VhYK.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VhYK.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VhYK............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VhYL............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............U.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2689
                Entropy (8bit):4.003683888568283
                Encrypted:false
                SSDEEP:
                MD5:390CEDB2C179CECEFF8247C71E549708
                SHA1:5D5C94A0818D81063160198F71EE7D5C3B706A67
                SHA-256:3DABB127E7AD9F1F382EDC0EF77B61BD90D3998B0DAE1918E511205E81F060CC
                SHA-512:F25D050A3A27C8C0A61A3CA1293363C15A4B249957A81DD1724038740337620C3493F3217648594808D385026B81F557CF2D934C9FCD2093E36162D975E89F8C
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IhYA.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VhYK.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VhYK.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VhYK............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............U.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 8 18:18:23 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.9910371446109902
                Encrypted:false
                SSDEEP:
                MD5:53842660F7AC82DA8096F4561C19EF3E
                SHA1:B48CB30CB43CE2E8F072D3C0D9E10EC07A705DC3
                SHA-256:10883A74E7E3A711EDB8DABEBE240EEF92204FA74EB1DC2F425D36882B5A261B
                SHA-512:0AB9F4D3CB77349E6FB6890E70FB1F7971A59CA21AE2B5CC05C9450126B66ABBDADED84CD5E07A4534E66CB64F4ECA122F33B92C4B205973860CF176DE2C1EBA
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....@=...2..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IhYA.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VhYK.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VhYK.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VhYK............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VhYL............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............U.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 8 18:18:23 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.981064814133079
                Encrypted:false
                SSDEEP:
                MD5:8E4843D1703FD2F40B2207AEF42CE7D2
                SHA1:EC35EB2A469FB516F0408A9AFC17DD78C4342882
                SHA-256:DB689173F281212D64C24AA96D91ACE8826DFFBDB17716A238BB9827B9C0A28F
                SHA-512:440331B22B380165DD3014199A8F56C31E275F088F3D90122EF1425026E3984D422F0B6A246237E85F319E74170C0480ACE813DE3CB09930C3B3DFE6FBA4BBAF
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.......2..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IhYA.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VhYK.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VhYK.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VhYK............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VhYL............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............U.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 8 18:18:23 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):3.9915298032357542
                Encrypted:false
                SSDEEP:
                MD5:ED97CD56A1C28697D036A4EA7CC9FC8E
                SHA1:A03709CF0659B2C1C139EA75DDDB66C000BFD36C
                SHA-256:2F662469CA55E77CBF9C3938BE2514F4B1E339E7EEE0659810273041C2968F85
                SHA-512:E35CCB0CEF03AEBC90D22EEFECE8779D5D0FEC5BAC735823678C1BA755370BBC242972DAFF7C5D61772D140DF5820E55B5C403C32549A1E65BA22940BED2CF99
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,........2..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IhYA.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VhYK.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VhYK.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VhYK............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VhYL............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............U.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                No static file info