Windows
Analysis Report
FW Important Exploit Has Been Identified In Your Account Steps to Resolve.msg
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 6820 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\FW Imp ortant Exp loit Has B een Identi fied In Yo ur Account Steps to Resolve.ms g" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 7132 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "8C5 62E3F-F48F -464C-8BAF -90F194864 796" "65EF BF38-C141- 4B59-8CC6- A3B0A1E223 98" "6820" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 6936 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// eu-west-1. protection .sophos.co m/?d=sales force-site s.com&u=aH R0cHM6Ly9z YWFzLWFnaW xpdHktMTMy NC5teS5zYW xlc2ZvcmNl LXNpdGVzLm NvbS9zdXBw b3J0&p=m&i =NWY4Y2M5M DRiZjMzNDk wZTA5YjI2N jRl&t=UGw4 bitJbmtBTm ZjbVE2eWZV RW9xTzFvem pXNk9IREsr RERPRmVuNk NzST0=&h=c faba86bf26 f4cab8d057 b35fbb98b3 b&s=AVNPUE hUT0NFTkNS WVBUSVZeg5 PtcYAYZSdi S2wrkwnZbI Z-RJoxZeHP Gn_HACYMjg MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 544 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2152 --fi eld-trial- handle=174 8,i,115693 8078917712 3916,14124 4521111159 69553,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Phishing |
---|
Source: | LLM: | ||
Source: | LLM: |
Source: | Matcher: | ||
Source: | Matcher: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | File read: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Persistence and Installation Behavior |
---|
Source: | LLM: | ||
Source: | LLM: |
Source: | LLM: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Key value created or modified: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 2 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | 13 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
jsdelivr.map.fastly.net | 151.101.65.229 | true | false | high | |
a.nel.cloudflare.com | 35.190.80.1 | true | false | high | |
d35tlz0p71apkp.cloudfront.net | 18.173.205.68 | true | false | unknown | |
account.metaforsystemcheck.com | 104.26.7.129 | true | true | unknown | |
cdnjs.cloudflare.com | 104.17.24.14 | true | false | high | |
challenges.cloudflare.com | 104.18.94.41 | true | false | high | |
www.google.com | 142.250.184.228 | true | false | high | |
cdn.gtranslate.net | 104.26.13.42 | true | false | high | |
na235-ia7.ia7.r.salesforce.com | 136.146.32.120 | true | false | unknown | |
ipv4.imgur.map.fastly.net | 199.232.196.193 | true | false | high | |
eu-west-1.protection.sophos.com | unknown | unknown | false | high | |
cdn.jsdelivr.net | unknown | unknown | false | high | |
saas-agility-1324.my.salesforce-sites.com | unknown | unknown | false | unknown | |
i.imgur.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.18.94.41 | challenges.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false | |
199.232.196.193 | ipv4.imgur.map.fastly.net | United States | 54113 | FASTLYUS | false | |
20.189.173.12 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
104.26.7.129 | account.metaforsystemcheck.com | United States | 13335 | CLOUDFLARENETUS | true | |
52.111.231.26 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
18.173.205.68 | d35tlz0p71apkp.cloudfront.net | United States | 3 | MIT-GATEWAYSUS | false | |
104.26.13.42 | cdn.gtranslate.net | United States | 13335 | CLOUDFLARENETUS | false | |
136.146.32.120 | na235-ia7.ia7.r.salesforce.com | United States | 14340 | SALESFORCEUS | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false | |
142.250.184.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
104.17.24.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
104.18.186.31 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
74.125.71.84 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.65.229 | jsdelivr.map.fastly.net | United States | 54113 | FASTLYUS | false | |
104.18.95.41 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
2.19.126.151 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
52.109.28.47 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
172.217.18.106 | unknown | United States | 15169 | GOOGLEUS | false | |
52.109.28.46 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.186.142 | unknown | United States | 15169 | GOOGLEUS | false | |
184.28.90.27 | unknown | United States | 16625 | AKAMAI-ASUS | false | |
172.217.16.195 | unknown | United States | 15169 | GOOGLEUS | false | |
104.17.25.14 | unknown | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1555123 |
Start date and time: | 2024-11-13 13:37:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | FW Important Exploit Has Been Identified In Your Account Steps to Resolve.msg |
Detection: | MAL |
Classification: | mal60.phis.winMSG@23/45@36/184 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 52.109.28.46
- Excluded domains from analysis (whitelisted): config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, officeclient.microsoft.com, europe.configsvc1.live.com.akadns.net, uks-azsc-config.officeapps.live.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: FW Important Exploit Has Been Identified In Your Account Steps to Resolve.msg
Input | Output |
---|---|
URL: Model: claude-3-5-sonnet-latest | { "explanation": [ "The email claims to be from Salesforce/Meta but uses urgency and threats of permanent restrictions to create pressure", "The links in the email are obscured and redirect through suspicious domains (salesforce-sites.com) rather than official Meta domains", "There are inconsistencies in branding - mixing Salesforce, Meta and 'facelo ook' in suspicious ways" ], "phishing": true, "confidence": 9 } |
{ "date": "Wed, 13 Nov 2024 13:19:15 +0100", "subject": "FW: Important: Exploit Has Been Identified In Your Account Steps to Resolve", "communications": [ " \n\n \n\n", "From: Business Suite <noreply@salesforce.com> \nSent: 13 November 2024 11:58\nTo: Emily Edwards <Emily.Edwards@cardfactory.co.uk>\nSubject: Important: Exploit Has Been Identified In Your Account Steps to Resolve\n\n \n\nWe wanted to inform you about some recent activity on your account that may not fully adhere to our guidelines. It appears an exploit has been identified that might be impacting specific functions wit \n\nCAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security.\n\nsophospsmartbannerend \n\n\t \t\n We wanted to inform you about some recent activity on your account that may not fully adhere to our guidelines. It appears an exploit has been identified that might be impacting specific functions within the Meta Business Suite. As a result, temporary limitations have been placed on your account. \n\n \n\n\t\n \n\nfacelo ook \n\n\t\n\t\n\t\n \n\n \n\n\t\n \n\n\t\n\t\nTicket ID: FB-42P-378-KLM-TRQ\n\nDear Emily Edwards,,\n\nWe wanted to inform you about some recent activity on your account that may not fully adhere to our guidelines. It appears an exploit has been identified that might be impacting specific functions within the Meta Business Suite. As a result, temporary limitations have been placed on your account. \n\nNext Steps: \n\n*\tInitiate the System Check: Please submit an appeal to start a system check, allowing us to investigate and potentially lift the restrictions on your account.\n*\tLive Chat Assistance: Our team is available via live chat to guide you through the review process and answer any questions.\n\nPlease be aware that appeals should be submitted by November 13, 2024. After this date, the restrictions may become permanent, and further appeals may not be accepted.\n\n\t\nSubmit an appeal <https://eu-west-1.protection.sophos.com?d=salesforce-sites.com&u=aHR0cHM6Ly9zYWFzLWFnaWxpdHktMTMyNC5teS5zYWxlc2ZvcmNlLXNpdGVzLmNvbS9zdXBwb3J0&p=m&i=NWY4Y2M5MDRiZjMzNDkwZTA5YjI2NjRl&t=UGw4bitJbmtBTmZjbVE2eWZVRW9xTzFvempXNk9IREsrRERPRmVuNkNzST0=&h=cfaba86bf26f4cab8d057b35fbb98b3b&s=AVNPUEhUT0NFTkNSWVBUSVZeg5PtcYAYZSdiS2wrkwnZbIZ-RJoxZeHPGn_HACYMjg> \n\n\t\nIf you need further assistance, please don't hesitate to contact our support team <https://eu-west-1.protection.sophos.com?d=salesforce-sites.com&u=aHR0cHM6Ly9zYWFzLWFnaWxpdHktMTMyNC5teS5zYWxlc2ZvcmNlLXNpdGVzLmNvbS9zdXBwb3J0&p=m&i=NWY4Y2M5MDRiZjMzNDkwZTA5YjI2NjRl&t=UGw4bitJbmtBTmZjbVE2eWZVRW9xTzFvempXNk9IREsrRERPRmVuNkNzST0=&h=cfaba86bf26f4cab8d057b35fbb98b3b&s=AVNPUEhUT0NFTkNSWVBUSVZeg5PtcYAYZSdiS2wrkwnZbIZ-RJoxZeHPGn_HACYMjg> .\n\n\t\n\t\n\t\n\t\n\t\t\t\n \n\n\t\t\n \n\n \t\n \n\n \n\n\t\n \n\nCopyright 2024 Meta Ltd. All rights reserved. We are located at 1601 Willow Road, Menlo Park, CA 94025 .\n\n\t\n\t\n\t\n\t\t\n\n\n\n \n\n" ], "from": "Emily Edwards <Emily.Edwards@cardfactory.co.uk>", "to": "Gaganpreet Gandhi <Gaganpreet.Gandhi@cardfactory.co.uk>", "attachements": [ "~WRD0001.jpg" ] } | |
URL: Email Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Initiate the System Check: Please submit an appeal to start a system check, allowing us to investigate and potentially lift the restrictions on your account.", "prominent_button_name": "Submit an appeal", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": true, "has_visible_qrcode": false } |
URL: Email Model: claude-3-haiku-20240307 | ```json { "brands": [ "facebook" ] } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Verifying you are human. This may take a few seconds.", "prominent_button_name": "unknown", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: Model: claude-3-5-sonnet-latest | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": true, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": true, "brand_spoofing_attempt": false, "third_party_hosting": true } |
URL: https://saas-agility-1324.my.salesforce-sites.com | |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "brands": [ "Cloudflare" ] } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Verifying you are human. This may take a few seconds.", "prominent_button_name": "unknown", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Verify you are human by completing the action below.", "prominent_button_name": "Verify you are human", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "brands": [ "Cloudflare" ] } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "brands": [ "Cloudflare" ] } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Enter the ticket ID you've received in the email.", "prominent_button_name": "Create Ticket", "text_input_field_labels": [ "First name", "Last name", "Business email", "Ticket ID" ], "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Enter the ticket ID you've received in the email.", "prominent_button_name": "Continue", "text_input_field_labels": [ "Business email", "Ticket ID" ], "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "brands": [ "Meta" ] } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: claude-3-haiku-20240307 | ```json { "brands": [ "Meta" ] } |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: gpt-4o | ```json{ "legit_domain": "meta.com", "classification": "wellknown", "reasons": [ "The brand 'Meta' is well-known and associated with the legitimate domain 'meta.com'.", "The URL 'account.metaforsystemcheck.com' does not match the legitimate domain 'meta.com'.", "The domain 'metaforsystemcheck.com' includes 'meta' as a substring, which is a common tactic in phishing to create confusion.", "The presence of 'account' as a subdomain is often used in phishing attempts to mimic login or account management pages.", "The URL structure suggests a potential phishing attempt due to the inclusion of 'meta' in a non-legitimate domain." ], "riskscore": 9} Google indexed: False |
URL: account.metaforsystemcheck.com Brands: Meta Input Fields: Business email, Ticket ID | |
URL: https://account.metaforsystemcheck.com/?__cf_chl_tk=Zga._v9oP0gZJuIuU3XMmQUGpDRKwAoU9PZ8pGqixdw-1731497986-1.0.1.1-wPgjYkAm4vVTpZWJ_lFIHqYQzT6gg4UBsONgzeRgQPE Model: gpt-4o | ```json{ "legit_domain": "meta.com", "classification": "wellknown", "reasons": [ "The brand 'Meta' is well-known and is associated with the legitimate domain 'meta.com'.", "The URL 'account.metaforsystemcheck.com' does not match the legitimate domain 'meta.com'.", "The domain 'metaforsystemcheck.com' includes the word 'meta', which could be an attempt to mimic the legitimate brand.", "The presence of additional words in the domain name, such as 'forsystemcheck', is a common tactic used in phishing to create a sense of legitimacy.", "The URL structure and domain do not align with any known legitimate subdomains or services provided by Meta." ], "riskscore": 9} Google indexed: False |
URL: account.metaforsystemcheck.com Brands: Meta Input Fields: First name, Last name, Business email, Ticket ID | |
URL: Model: claude-3-5-sonnet-latest | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": true, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: https://salesforce-sites.com |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 231348 |
Entropy (8bit): | 4.396653951615408 |
Encrypted: | false |
SSDEEP: | |
MD5: | AC95C80FC2E3284877384711ABC32ACC |
SHA1: | CFD79966823A38534969DDC64DCA97E3AB951A90 |
SHA-256: | 3A3B03B5B0925F91DD05FFE16A5E3DAC888FC052094BB80A8B0A1ED7DF2279D7 |
SHA-512: | D691701DA81A55CECFC09B9535CC4398622735A8AE335AC5690DAFAC025F5BD0B59CE17E00606C44931B5607F082EA368743A763C4CF3312FD3B1ADF77BC31A2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1869 |
Entropy (8bit): | 5.089607518789864 |
Encrypted: | false |
SSDEEP: | |
MD5: | F4924344564BF8A5BD3C6F17F57BE14F |
SHA1: | C683A22D23F8CF043760EB6D1BA3C33ED512A59C |
SHA-256: | 613EF019F69C114F7315454680AA680EABB17690F757B925A3CCA061AC03FE27 |
SHA-512: | A022114E40D87D993D07538DC731F0D14BC558870E030F9687F3CD47077FB7B6F247B10F81940C337183273FB7ABB55676D3EB91AE367D2FD7874406D7C2F60D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 521377 |
Entropy (8bit): | 4.9084889265453135 |
Encrypted: | false |
SSDEEP: | |
MD5: | C37972CBD8748E2CA6DA205839B16444 |
SHA1: | 9834B46ACF560146DD7EE9086DB6019FBAC13B4E |
SHA-256: | D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7 |
SHA-512: | 02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\FontCache\4\PreviewFont\flat_officeFontsPreview_4_40.ttf
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 773040 |
Entropy (8bit): | 6.55939673749297 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4296A064B917926682E7EED650D4A745 |
SHA1: | 3953A6AA9100F652A6CA533C2E05895E52343718 |
SHA-256: | E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083 |
SHA-512: | A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 322260 |
Entropy (8bit): | 4.000299760592446 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC90D669144261B198DEAD45AA266572 |
SHA1: | EF164048A8BC8BD3A015CF63E78BDAC720071305 |
SHA-256: | 89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 |
SHA-512: | 16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 10 |
Entropy (8bit): | 2.8464393446710154 |
Encrypted: | false |
SSDEEP: | |
MD5: | AC7A7FA48B14565CBE88891FA41C3711 |
SHA1: | 29906971F2127DB9838733846486C6877EC69E41 |
SHA-256: | 8BBAAA2784E3F984C4248F5351FF993C53907D1CE6399B800DAA2510663F07F1 |
SHA-512: | D0E8AC521085D825468544BEF7F24B03880E65A5F1A332EFC308AB0A16436D6C4F20BDE5F4C657E123898B9C29B20981388DDC335264958FE189A3B9DB4E3041 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\5A760FE5-2C27-4F20-89CC-E60DEA210834
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 180288 |
Entropy (8bit): | 5.2910001654963725 |
Encrypted: | false |
SSDEEP: | |
MD5: | 19C50557EB06CC3E5676B84F3AFAFACD |
SHA1: | 4C8CA61BA546FF5C80F4E3A4A2D98F4C0E84FC05 |
SHA-256: | 778C0A3AC7A5099EFEA2D2B4137BEE2916FB5AE11E43AE85F9E238129400D734 |
SHA-512: | DF735E21775E1453A0FB39BA16C0FF460F62CDB56F4B9B587664D005AE71D3689729A5C9B057E7D004021056A650AF4482E4377451A0D9542966B02EAA40604A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4616 |
Entropy (8bit): | 0.13700485453793962 |
Encrypted: | false |
SSDEEP: | |
MD5: | F3EF2B9241225EAC97AF0F292DCCDC8C |
SHA1: | 42FEBED0F4C3A273669FE2E22553E889B69DD466 |
SHA-256: | EB5BA7409EA1BFF62C842BC472155F93A92C5A4ECE2AFA5494A24B3D4D55BF21 |
SHA-512: | 2365A3265F9278848D1CC569C09A7DFEC297F0A417B947C91648CF17604AA59E952D7CB944361D1C0891C173EC77FB31C3706D28C3A1FAA9139381A0C71198DD |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 823 |
Entropy (8bit): | 6.383036735600367 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2C1B060229A914F2A90A8C7E3BE6EB40 |
SHA1: | 03D8FB85556EDF397D8AFCAFC0B13F11ECBDE50C |
SHA-256: | CB0628092DDEA96BB040221B5C793DBBB792A67D0621BDFBA170C07374D85801 |
SHA-512: | B69BB43B94BE309FBE7266F0DA6EF49667F171DA1EAE9019CACC717AC132BA673B45C895A6ECAA08880A8B1474A884B0225F688EF8EC6A56C9104EF89C12CD06 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 5.949125862393289 |
Encrypted: | false |
SSDEEP: | |
MD5: | ED3C1C40B68BA4F40DB15529D5443DEC |
SHA1: | 831AF99BB64A04617E0A42EA898756F9E0E0BCCA |
SHA-256: | 039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A |
SHA-512: | C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | C561F115A197E27807E3E52E0A7A05CB |
SHA1: | 585CB1E38699E20891BD17FE0BC84E417637B350 |
SHA-256: | 385D47431C5F45B2C9252F83E1DD19B8A66D403A1F94FE8E47B1708F2990DC34 |
SHA-512: | 91F48AF1B8DDC2C74431C544E45CE7C120BAE77E5C846E2091723F24191413BDA4FCF28EA6C94AAB96BB898C20DB57DA6D58F1FF0F2A31AC5076A1FB9B8F09BE |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 2.699513850319966 |
Encrypted: | false |
SSDEEP: | |
MD5: | C5A12EA2F9C2D2A79155C1BC161C350C |
SHA1: | 75004B4B6C6C4EE37BE7C3FD7EE4AF4A531A1B1A |
SHA-256: | 61EC0DAA23CBC92167446DADEFB919D86E592A31EBBD0AB56E64148EBF82152D |
SHA-512: | B3D5AF7C4A9CB09D27F0522671503654D06891740C36D3089BB5CB21E46AB235B0FA3DC2585A383B9F89F5C6DAE78F49F72B0AD58E6862DE39F440C4D6FF460B |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9814713494399734 |
Encrypted: | false |
SSDEEP: | |
MD5: | A24A8A2F7FDA50E31BC75493D8D806FF |
SHA1: | 80C498F89AB54E57C017A3C419AAED3F1C0A7D0D |
SHA-256: | 71E9DB37888D18E415A67972206E3B81D601954F11B24FD6AB644B7E47A29E55 |
SHA-512: | EC2D56E194FCD9F2EF0E888A38C5F1EE5C9CD5C70D47E56D26B15F5D7C60FD9038126799FF6F5BCF215765B484E634A3A033EF16613C437921B4D89C1DD037D2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.994957595848658 |
Encrypted: | false |
SSDEEP: | |
MD5: | CBA048EE545014FEF281AA098313C949 |
SHA1: | B19E1B53B0AAAB026F16B946576D4C283E946BAB |
SHA-256: | 01090CC0F897130A3A3B3F10ED44B13DBC47381E6E3FF64D0CEF2CE6051CE19A |
SHA-512: | 78F48E40674EFADB7B92168C5A121C886BE98348D345D0DD0988BFE6DC1B95A3B16581972B815F8C58EA30FCBF0677868F3E66A2EFE6C287E3261B3AD7F72FF4 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.0032246277998444 |
Encrypted: | false |
SSDEEP: | |
MD5: | 59A2F55757670837A86A424B813F4523 |
SHA1: | D5140C2684BDFB041DF34D2BB9508761CF34CB71 |
SHA-256: | BA276180761CA61BAC6553C212FB4054110C4B20E1975410BB10CDAC8F3E7601 |
SHA-512: | 9B3C01C4DADC555E19CC8BAC1C75FA2D42D0C922A5EF4BDD74DDFC6B9D788A779292EE7B74F435A3FC04E4E99C5523223F1CF1B98B1E1337F2EF72F4F5D51AA9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9944400865367804 |
Encrypted: | false |
SSDEEP: | |
MD5: | 747C909949E57CBFC3CDC19B77B5DD52 |
SHA1: | 2F4FC51C6043FA507AA581E2E93E1F797A6D7540 |
SHA-256: | EE062A8C5B7D27F029EE5BDC69079E6C94808007594A039E94E5B08B6B3CA954 |
SHA-512: | 9DA333E5543FA511B352719FA9CA4B174BA83E41A116FD311D574146008135D0F23AA7C1FB648A27006A0C8EBA1AF48A0D57368CFB74E4240FEE3906E9FA5B75 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9827333689457656 |
Encrypted: | false |
SSDEEP: | |
MD5: | F2071A86BE16BAFC764A288F5A68214B |
SHA1: | 28ECFD68DFC3BFDD86C9B53EB169228AA5EA7CFE |
SHA-256: | F0857796521080523119DA0989C5531075214322241CAFB11221B994D575200E |
SHA-512: | 38CFB8FD21278F22B8F4B35F7B6566424BCDDC01F7EEB805A7FB33ED7E601CA6F76221E4FA7795698DB4EF0721941C790121C56E8AF4544393C2C4CE6F989F8A |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9889139443868977 |
Encrypted: | false |
SSDEEP: | |
MD5: | 02EDE0B046F9903BA2BDFAD998522E86 |
SHA1: | 4536D691625A404C1B53EF95829FB7B881C97163 |
SHA-256: | 1E65216DE872AC89CB8DD4B1ABCF179F8D4DA684F8E71CE9011C3827914B1EBF |
SHA-512: | 9429A62FA8DB8BDC06218891500286464C8B5A073D6E3D36E37ECC7AA323CCE427E19A2055AA5C5F37F1FED233359851D6EADFD68CBDC0A0E0CD44752C59C850 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 48072 |
Entropy (8bit): | 5.125359556406337 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2BF0D0F71A3E905CAD779DD9E585DB25 |
SHA1: | 530AEB93F927531C9BAFBD64415EE9E5EF580FC8 |
SHA-256: | 289E7B81FEDB81DC4F639D186183E024E0B6A2F307CE6DC895E1207E96887519 |
SHA-512: | 667F12D68E96D2E570F9C6D997EDAEF8B3129BC00A6591A4FE67BBBC779FCA4A1721E7D7B6BD4C28E6A987AAAD47D22697B92700EEAA01A6266F3674E8A05059 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/sCSS/62.0/sprites/1729589050000/Theme3/default/gc/zen-componentsCompatible.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 61 |
Entropy (8bit): | 3.990210155325004 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9246CCA8FC3C00F50035F28E9F6B7F7D |
SHA1: | 3AA538440F70873B574F40CD793060F53EC17A5D |
SHA-256: | C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84 |
SHA-512: | A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B |
Malicious: | false |
Reputation: | unknown |
URL: | https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80420 |
Entropy (8bit): | 5.182949713414269 |
Encrypted: | false |
SSDEEP: | |
MD5: | B75AE000439862B6A97D2129C85680E8 |
SHA1: | 90D15036EF48FCB336A135BAE812B45669F19044 |
SHA-256: | 9520018FA5D81F4E4DC9D06AFB576F90CBBABA209CFCC6CB60E1464647F7890B |
SHA-512: | 8BD7047C9C14C158843C529D0B57A7CF86511818FC610A3A401C854C5F766171E2EF0682AB27B1BD10FBE52E4D553B12893BFBACA5AA1BD639785C6646C3A7D0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12946 |
Entropy (8bit): | 5.317561275813796 |
Encrypted: | false |
SSDEEP: | |
MD5: | 33EA9CBD598F719E64B4656911D8C251 |
SHA1: | 88819E74199062E6F0FCBB899FDA98F54B2D4230 |
SHA-256: | 46A506883C5840F278AFF40BD2CF1BEC0C9089E89A8471AAA72680A871304AAB |
SHA-512: | F2E4091E6BDA55C88CFFEFD9C575B2C17283C22503CE64BD3426111F93CBCDD7B0B7485A3E8AEFDC7A467A894030190D1DC5C9713A25DCFBD4C6E3D756702064 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 292 |
Entropy (8bit): | 5.2157278646291685 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2A0745502DE55E7861FC389F7E5570E3 |
SHA1: | 144C66E37BF0FC1D416508D3DFF3332B1B985144 |
SHA-256: | 81D260CF9CE62A432EEF70100B0F6D0BF6630AE7415842F6D9095E015DBCCDA9 |
SHA-512: | CB2C5B1F4CCF0B4D7A686274EA2B989D99DE55381049825911C58DEF2639A669FFF2C81F0695F61A214C86EB41219130BB6E016DE3BB91D144BC749038E429AE |
Malicious: | false |
Reputation: | unknown |
URL: | https://account.metaforsystemcheck.com/rsrc.php/yH/r/c_1vdG88uNh.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 47672 |
Entropy (8bit): | 5.401921124762015 |
Encrypted: | false |
SSDEEP: | |
MD5: | B804BCD42117B1BBE45326212AF85105 |
SHA1: | 7B4175AAF0B7E45E03390F50CB8ED93185017014 |
SHA-256: | B7595C3D2E94DF7416308FA2CCF5AE8832137C76D2E9A8B02E6ED2CB2D92E2F7 |
SHA-512: | 9A4F038F9010DDCCF5E0FAF97102465EF7BA27B33F55C4B86D167C41096DB1E76C8212A5E36565F0447C4F57340A10DB07BB9AE26982DFFF92C411B5B1F1FB97 |
Malicious: | false |
Reputation: | unknown |
URL: | https://challenges.cloudflare.com/turnstile/v0/b/22755d9a86c9/api.js?onload=clJo2&render=explicit |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 232674 |
Entropy (8bit): | 4.952968153857371 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6E45BDDB63624A9A53B9006C44D38A81 |
SHA1: | B0D7121BDA71B07942A2B68D1D2BA352813FF5AB |
SHA-256: | BE353D9CD92FE82ED47BDFCD64EE722073C4B940D1F869EE6B5005AD5A640759 |
SHA-512: | 8B84AF001BD792EBA7AC695ECC8652A923FD47DCB5FC14CE5AA6FCE773B8B7254474AA0A9229942CA65C2882BC009BFB19D358185FD1EF810654D9375D530DE8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/jslibrary/jslabels/1731356768000/en_US.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5129 |
Entropy (8bit): | 5.328131598538213 |
Encrypted: | false |
SSDEEP: | |
MD5: | F35C856F52DBA59920E8DB2C09D7C77E |
SHA1: | A8541A90392265A4F541005DAA5B3F3F5D819086 |
SHA-256: | 2756628C1D9D5D1190E1936E3AA826429ED211C65B9667E7F7713AE7D5976355 |
SHA-512: | 2A798F76ABE0CFC4E99D55E3F32C7A16D3BF6342D52B4E3340562CB38698252977A9D85DF88C3725F00932BBF289C095FBEE50B41B8D65190CB7A55AAD83BFA4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 194901 |
Entropy (8bit): | 5.014294143940012 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3F30C2C47D7D23C7A994DB0C862D45A5 |
SHA1: | 7791DD1F3173A0D62CC39C21D2AD71FC8DAD0E72 |
SHA-256: | C0BCF7898FDC3B87BABCA678CD19A8E3EF570E931C80A3AFBFFCC453738C951A |
SHA-512: | 49B891FDEBACA612A8315557CAC4CA1BFED5B1E5A28BE63715D1EBB741292A0A53A1979E9A1A8779978B58B849BADCFFDAEB76570D6E4048F631B445F9354150 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdn.jsdelivr.net/npm/bootstrap@5.2.3/dist/css/bootstrap.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 26609 |
Entropy (8bit): | 5.1798915041849485 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9574EF2F28A3322D64DD229EDF857D3E |
SHA1: | F2C09A00D582D2A03D6D1320AA5688EB087387FA |
SHA-256: | BBB4B32C2A0C64792CA923928138453F21FD235EC20E0532BAB61E64A34B1503 |
SHA-512: | 18EEBBAE0E650B468FF02F20A7F677E66F9BFEA063A315370EA5EBA65202A8E1C45CBEA2189EE262EE423B0E3F0FC8844D206469E4739C77EAB4F88CC1401AF6 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/sCSS/62.0/sprites/1729589050000/Theme3/default/gc/setup.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3146 |
Entropy (8bit): | 5.583974074163684 |
Encrypted: | false |
SSDEEP: | |
MD5: | 04F1DE15D6DC5E13AECE1445B1162D58 |
SHA1: | C316C22E7B6117BAAF23065570A17005F7D2A118 |
SHA-256: | 162A48A89746944D3BA05BF21BDA05A16A227F552015B39AF6AD25BCC371A46F |
SHA-512: | FA5A6FF91002A385C5FA27150516E809846FC788509B59DA9966E7469624BAED6745E5865CB4272223838B3201B4CEEB896B3A70072E46A6E58518F939451355 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/jslibrary/1698336664252/sfdc/NetworkTracking.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 92476 |
Entropy (8bit): | 5.153518633144914 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0039EB47AEC454FA14CE168301F4A3CF |
SHA1: | 4843ABA7F0A22F7CDC7A034108AAA57444ACD4BE |
SHA-256: | 31AD7F6D85F342D961C7D835FB74FED6C7DAB2214B8BA8C6ED1C21065F8710AE |
SHA-512: | A57AAA7BC9F517DDB85992A32DD9A84F0A64CD0B3D0B2BA9C2DE71F8A39F3C544EDE7206993C622205BB15C1114B2615ED03F628291F8181E85CBF3BF4690715 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/sCSS/62.0/sprites/1729589050000/Theme3/default/gc/extended.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 52 |
Entropy (8bit): | 4.265262978081656 |
Encrypted: | false |
SSDEEP: | |
MD5: | FC4ECFCED885DEE049298E258275E5A8 |
SHA1: | 838B7C8408BD019095FAEAD850959EBF4256AA5B |
SHA-256: | CB4A549C083500D8252BE6A5DED75D250A2443A05F4A84090EF4181C734D4558 |
SHA-512: | 4CFD29725BEE09E40B12927CBAE40EF9239D6655D673C6AC81BF2DF59B9EBE86670D376195A7C1E142DCA0622FC20744D15E9DD623FC660F48F75F5D53E2314D |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISJQkHPeIWeihSnxIFDe-_jXMSBQ0AoAvKEgUNeG8SGRIFDTUOShw=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 93123 |
Entropy (8bit): | 5.246392421058244 |
Encrypted: | false |
SSDEEP: | |
MD5: | 30AA9A243117C9EEB6D1E5F2922B577A |
SHA1: | 46A5EB29D22D6F6B5E03D97183AB7A706C4977F8 |
SHA-256: | 0929261E5C70596146702BE8449DF3E3CC446D2DCF40B86368A3E341CA16311F |
SHA-512: | D4131025A7AC820BDCD4E5CCCF806B4C5CD6D3965067C5BB606588D1615B25706ED7937FEF0667DDCA7BFDF8A16A60A72B91CFBE10BDC0D1388B25D42E54A262 |
Malicious: | false |
Reputation: | unknown |
URL: | https://account.metaforsystemcheck.com/assets/YNN7mTKzEpW.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 883118 |
Entropy (8bit): | 5.513528453346374 |
Encrypted: | false |
SSDEEP: | |
MD5: | F4C8D0C8D72FA7C213FFF99829D1A731 |
SHA1: | 1CBBEA50E724CE053B0DDCF47A45F54071B80C82 |
SHA-256: | 5DA32D76A740C420B76BBB09641E68A9FD8F77002A86287FDDD9674AE5A73126 |
SHA-512: | CE8C810B2A42F364177BF1B52611BA8A2C80540D80D1F4D6A84D8DA72B3F4FDEA9F864C24143F215582D39C3845B712F0ED915B324DAE55AF0209EDD603F512E |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/jslibrary/1721157840252/sfdc/main.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8053 |
Entropy (8bit): | 5.758125742745622 |
Encrypted: | false |
SSDEEP: | |
MD5: | 49B5B5F678495A04602F5EA36044995B |
SHA1: | CC1A0C371B049168BBD79702FC4D203E587EF2AD |
SHA-256: | CDACC2ED3FD9370EE345574B84C90799AE804EF310C90DCBAC58AF597944CB0F |
SHA-512: | 5AD08FCBF05DE8E8FE5E94A0C1943300A279F1ECBB6EA460C6B0C57093BD8E98A0B60548E543BB03E891A8F21C75C918C6317CDCD0BD8BB8BDE6FE6D0208456D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4173 |
Entropy (8bit): | 7.93376413131873 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2133E7DF99C4C9D85428E1D36795BB71 |
SHA1: | 0946389CFB083D0A3DA3198AE577B39DBDB6E2A2 |
SHA-256: | 338933D20FB355A783ABE08ECAC0CD15F19209749402A95CCC9FBC109BC9AF26 |
SHA-512: | 053BC555BED6145F295124EE6F49D58B23970CF6713F3587ED3DE7F6D7AFBDCDB84B04A2AE71FF409B0520F4B153A4A10C4A34095CDA4E7F64B852979A3A013B |
Malicious: | false |
Reputation: | unknown |
URL: | https://i.imgur.com/iYMe8MR.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1385 |
Entropy (8bit): | 5.317481285246997 |
Encrypted: | false |
SSDEEP: | |
MD5: | CCD2F285B62CB74170797BE357B5669F |
SHA1: | 68E668F6B43B9A87B87017A5A8DB45671D550490 |
SHA-256: | 5830F6B53E1EA91ABD5DE97EF219269702F413575CFE0DD6149712D68D7D61EB |
SHA-512: | 583069C4E0BCC29DAEF3D246E3B86474C84EBFEAD84B62CBB86963EE73748AD33D610309C2AAE7769B165C9003F965316FC8C27581FA23BFBFCE6B29F7A5E408 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/static/111213/js/perf/stub.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1723978 |
Entropy (8bit): | 5.048992184432433 |
Encrypted: | false |
SSDEEP: | |
MD5: | FD7475BAF9E2F6C089222046145678E6 |
SHA1: | CF6B8BBD7CBDA0ACE74DE0616A927A20B834B024 |
SHA-256: | 33A3298FF547D4A27BA03BF4246398D0400AAA9836FAFE22B8F933FE0DC1E4DA |
SHA-512: | B96130121B34D918271537A864330ABD3E90A1F771506722C4254A36F985C810DA25579560F73E558ADB05E662353DC34978205548C0C40296518F70B5BEC3F5 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/sCSS/62.0/sprites/1728653548000/Theme3/gc/dStandard.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 8118 |
Entropy (8bit): | 5.762940193919639 |
Encrypted: | false |
SSDEEP: | |
MD5: | DED4400BA5197D65C566797C065CFF11 |
SHA1: | 9AE28A1B18FCAEA3FADD29E8EFFC6EF3295A970B |
SHA-256: | 55A2EAA8C0445AEBA0EC5EADD4F5CC5F5CB240A024D52AA222649E59730853BC |
SHA-512: | 1237BF77F77EB45EB942ACE8FC57FBE5D36AF86D7AF9F1119A0AE9FF933E1F3393A3CBF9BFA2F11E63429EE4D5A304977B1A47415F7134E9628E4277126873E4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://account.metaforsystemcheck.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/main.js? |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 89942 |
Entropy (8bit): | 5.290841420152801 |
Encrypted: | false |
SSDEEP: | |
MD5: | E3CCB7FB2A471B100E7ED8183C55EF25 |
SHA1: | 0801A72AEB865769B6051770BBC5F9485882F998 |
SHA-256: | DA4AD864A87FFCF71C851B5DF87F95CB242867F7B711CAE4C6133CC9CC0048F0 |
SHA-512: | B561E5BAD167B86D02EA7411969BEB121138429906D679F630E50C5A651E45E3E5E1EDC0922D1507A5B5BF7A0B8C5B5DD2154EB5143D3C7A527CDEAEEBF41791 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.2/jquery.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 212782 |
Entropy (8bit): | 5.1729897129933 |
Encrypted: | false |
SSDEEP: | |
MD5: | D5BABE902EEE783C57F8394AE44CC339 |
SHA1: | 6A256A1DEAE73F51364F431CA2C14BDF5BC6803C |
SHA-256: | BDD0048782D95D74B18DC9C0F1D742E15EEBE72C157773961592BDB2D737EF5A |
SHA-512: | 45C44A30E7538523BC8238FD24DBD9AE46680E9AB9576D1B32CCB31AA6A296B79283A99F03CE562DD7F4E1C795D66C165F070913A9D99A8F1E85936ECA63353A |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/sCSS/62.0/sprites/1729589050000/Theme3/default/gc/common.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 10168 |
Entropy (8bit): | 7.41804729567533 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4E70FD17402CB2EC6D4DDD18AF827C74 |
SHA1: | 4F596E7C03C3AEDBD2476893B915AE7257711098 |
SHA-256: | 8570DA32A63B2F7DBA8618E78BB58CBEA15AB15415CD406D7053ECAB993C58D5 |
SHA-512: | D20B95DB1928CFDDD2816F0EEA8C4696BEE72BC9D0CA2990DC803DA23C2F6C96C3813A812CFFFB1E9FAF915620DADDC92BEC2960C5F0C69EDCCA6872814B26BC |
Malicious: | false |
Reputation: | unknown |
URL: | https://account.metaforsystemcheck.com/assets/unidentified-avatar.jfif |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61 |
Entropy (8bit): | 4.002585360278503 |
Encrypted: | false |
SSDEEP: | |
MD5: | 52962C9586004E36A10981336CB9E07D |
SHA1: | E88EED84A04FA5E02A23C6753D9219E472EB4EC3 |
SHA-256: | AD90A5D023A801A5233EC92330130B6488D1BA721574F7CA298FF3979E1ABBED |
SHA-512: | 3E1D1E414CA83FE6543F7502FC854A4C40A868367582A3505E0F677F4F0700AEF7025F23FEE2BAC2400480F286CED52353E8817243C789735392FAE2CCABF78F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5430 |
Entropy (8bit): | 2.6916960685487825 |
Encrypted: | false |
SSDEEP: | |
MD5: | CCDA8DF05E9A37B3131AFD4D451B44EC |
SHA1: | ED9D0F9C4224FBD4C768BE237B4B59F27F1B718C |
SHA-256: | 92842FC6C2F66B46F69458C14621FC2ECA5D6C02D7937F9124FE8A3A9A55BC91 |
SHA-512: | A91F53C07B327C35864FE903ACFE30AFE2DE3C26FDCE1BDBF65842598B3A7B2FB19E54DE27495519BF1E2A2BF7358561DA16E931324E5B1112DA4FE7EFE4BC7E |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 27843 |
Entropy (8bit): | 5.161136919592181 |
Encrypted: | false |
SSDEEP: | |
MD5: | 250B3D262BAB3158387ABBAC304624DD |
SHA1: | 671B9113D85C1DB92CDC49AB86CBB219C3EE7E10 |
SHA-256: | 4B0E585671847C76AD8257094DD40605A80DA5AC07EA7B0749426DED2C7D1C51 |
SHA-512: | 751E790059E918742827F32983012CA8E858E591643FFDB62F946104EDBE7CB3C0AB4E6B0F68C4C2793D33A95423CFAEAA86650027B981E18BFD81B3197A2AC1 |
Malicious: | false |
Reputation: | unknown |
URL: | https://saas-agility-1324.my.salesforce-sites.com/support/sCSS/62.0/sprites/1729589050000/Theme3/default/gc/elements.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20957 |
Entropy (8bit): | 7.61399329769288 |
Encrypted: | false |
SSDEEP: | |
MD5: | B305FE14483001BEA71478C6AA34B475 |
SHA1: | 380AC028CD9BA7E070D90FACC525008246802F12 |
SHA-256: | C6C0FA14823C5530831C3D2C97458899708B03F83BF8C7F6DDEB64408D3BE0E6 |
SHA-512: | BBF625086924DD2399C95D2D46500D0CB1E5A495D5A675E21DDBE2DE31610859B1B18242B941B174ACB8639AFB6F1EC2CC02ACF4D8BDC434A22380D3AFC91FBA |
Malicious: | false |
Reputation: | unknown |
URL: | https://account.metaforsystemcheck.com/assets/metabanner.jpg |
Preview: |
File type: | |
Entropy (8bit): | 4.2140990531006715 |
TrID: |
|
File name: | FW Important Exploit Has Been Identified In Your Account Steps to Resolve.msg |
File size: | 114'176 bytes |
MD5: | 22e77deb8baeb67268d991959f158e72 |
SHA1: | 0a407b68cbeed426c55927eef8af0c4aaf921b97 |
SHA256: | 60720452c31b7d192c93fe968f7b8bed1f27cc5c733bd778402affa91bf1cae6 |
SHA512: | 1f063a1ee3da51612ec6b090677c41502b919f5c132220d77f479816d3fc6d86ac6b8827d8a079aa9976c76b391223805a7abe0a982f57f3df4d75d932adabe6 |
SSDEEP: | 1536:t75tsogSgLxtxurPccRWqWvWFWX+xWxzxuuNW5W6a0cSAi:t75tsBrC7Al0jui |
TLSH: | 41B3242435E90E39F3779F714FE390AB8526FC52AD14969F3195730E0A729409CE2B3A |
File Content Preview: | ........................>...................................!.................................................................................................................................................................................................. |
Subject: | FW: Important: Exploit Has Been Identified In Your Account Steps to Resolve |
From: | Emily Edwards <Emily.Edwards@cardfactory.co.uk> |
To: | Gaganpreet Gandhi <Gaganpreet.Gandhi@cardfactory.co.uk> |
Cc: | |
BCC: | |
Date: | Wed, 13 Nov 2024 13:19:15 +0100 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
Received | from AS8PR03MB6693.eurprd03.prod.outlook.com |
12 | 19:15 +0000 |
Authentication-Results | dkim=none (message not signed) |
by DU0PR03MB8193.eurprd03.prod.outlook.com (2603 | 10a6:10:322::10) with |
2024 12 | 19:15 +0000 |
([fe80 | :9cc4:5e6d:c5bd:a397%7]) with mapi id 15.20.8137.027; Wed, 13 Nov 2024 |
Content-Type | application/ms-tnef; name="winmail.dat" |
Content-Transfer-Encoding | binary |
From | Emily Edwards <Emily.Edwards@cardfactory.co.uk> |
To | Gaganpreet Gandhi <Gaganpreet.Gandhi@cardfactory.co.uk> |
Subject | =?utf-8?B?Rlc6IEltcG9ydGFudDogRXhwbG9pdCBIYXMgQmVlbiBJZGVudGlmaWVkIElu?= |
Thread-Topic | =?utf-8?B?SW1wb3J0YW50OiBFeHBsb2l0IEhhcyBCZWVuIElkZW50aWZpZWQgSW4gWW91?= |
Thread-Index | AQHbNcNZ932ZcPe5SEKjVDraxUuaBLK1INoA |
Date | Wed, 13 Nov 2024 12:19:15 +0000 |
Message-ID | <AS8PR03MB66930B821F90BF6465E91159A05A2@AS8PR03MB6693.eurprd03.prod.outlook.com> |
References | <dEP9_000000000000000000000000000000000000000000000SMW18400Gcwhuzk9TnCDa21p3Y9_7A@sfdc.net> |
In-Reply-To | <dEP9_000000000000000000000000000000000000000000000SMW18400Gcwhuzk9TnCDa21p3Y9_7A@sfdc.net> |
Accept-Language | en-US |
Content-Language | en-US |
X-MS-Has-Attach | yes |
X-MS-Exchange-Organization-SCL | 1 |
X-MS-TNEF-Correlator | <AS8PR03MB66930B821F90BF6465E91159A05A2@AS8PR03MB6693.eurprd03.prod.outlook.com> |
MIME-Version | 1.0 |
X-MS-Exchange-Organization-MessageDirectionality | Originating |
X-MS-Exchange-Organization-AuthSource | AS8PR03MB6693.eurprd03.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Internal |
X-MS-Exchange-Organization-AuthMechanism | 04 |
X-MS-Exchange-Organization-Network-Message-Id | b774e764-9a92-4471-b775-08dd03dd63c9 |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | AS8PR03MB6693:EE_|DU0PR03MB8193:EE_|PAVPR03MB10180:EE_ |
Return-Path | Emily.Edwards@cardfactory.co.uk |
X-MS-Exchange-Organization-ExpirationStartTime | 13 Nov 2024 12:19:15.6324 |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Office365-Filtering-Correlation-Id | b774e764-9a92-4471-b775-08dd03dd63c9 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|366016|8096899003|41050700001; |
X-Forefront-Antispam-Report | CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR03MB6693.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(8096899003)(41050700001);DIR:INT; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 13 Nov 2024 12:19:15.2945 |
X-MS-Exchange-CrossTenant-FromEntityHeader | Hosted |
X-MS-Exchange-CrossTenant-Id | 7956b84e-0c99-46b5-81c6-28689cfa7221 |
X-MS-Exchange-CrossTenant-AuthSource | AS8PR03MB6693.eurprd03.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Internal |
X-MS-Exchange-CrossTenant-Network-Message-Id | b774e764-9a92-4471-b775-08dd03dd63c9 |
X-MS-Exchange-CrossTenant-MailboxType | HOSTED |
X-MS-Exchange-CrossTenant-UserPrincipalName | kUidL8L9VQhPS4g9/7sTy7iblIO7I0Cjmg9KzSxNflG7iQM0ovyd7/RyUDl4xuz3Q32j+ef2uT8iAi/EuSd+VgqUh7Tbjiy6G0190yVw0Ns= |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | DU0PR03MB8193 |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:02.5257663 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8137.022 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(425001)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | 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 |
date | Wed, 13 Nov 2024 13:19:15 +0100 |
Icon Hash: | c4e1928eacb280a2 |