Windows
Analysis Report
https://techweb.stryker.com/Stretcher/1115/1308/Maintenance/1115-409-002AG.pdf
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 2536 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 5888 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2156 --fi eld-trial- handle=194 0,i,146677 9873230828 2556,18847 8229881703 5745,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 5992 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://techw eb.stryker .com/Stret cher/1115/ 1308/Maint enance/111 5-409-002A G.pdf" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • System Summary
- • Boot Survival
- • Malware Analysis System Evasion
- • Anti Debugging
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.67 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.67 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
34.104.35.123 | unknown | United States | 15169 | GOOGLEUS | false | |
74.125.206.84 | unknown | United States | 15169 | GOOGLEUS | false | |
23.99.177.105 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.164 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.184.238 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.8 |
192.168.2.16 |
192.168.2.9 |
192.168.2.4 |
192.168.2.6 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1555816 |
Start date and time: | 2024-11-14 14:15:54 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 10s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://techweb.stryker.com/Stretcher/1115/1308/Maintenance/1115-409-002AG.pdf |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@28/12@0/16 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, SIHClient.exe, Sgr mBroker.exe, conhost.exe, svch ost.exe - Not all processes where analyz
ed, report is missing behavior information - Skipping network analysis sinc
e amount of network traffic is too extensive - VT rate limit hit for: https:
//techweb.stryker.com/Stretche r/1115/1308/Maintenance/1115-4 09-002AG.pdf
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.977166485152468 |
Encrypted: | false |
SSDEEP: | 48:8tdajT+OfqfHVUidAKZdA1FehwiZUklqehzxy+3:8y/D2xy |
MD5: | 3F0276DD3D3A3B4EAFE13DD6228D1EC5 |
SHA1: | 6ABB847136E4BCFF4DF6910C98094E7F6A2D435D |
SHA-256: | 2C4E7C9DA119E0388BEA811894F725A53C3DE0F8307FB22AA4A9670A1A36A5F4 |
SHA-512: | ADD9BDE554D02E31F719997ACF766C188BB6BCFA08EFCDCE2E273F5D9E3CAF997A0FBF1D26441138E3A64BC7ADA27554DC97B21628452BB0CF2C60013CC88EF0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9958332868638977 |
Encrypted: | false |
SSDEEP: | 48:8/dajT+OfqfHVUidAKZdA1seh/iZUkAQkqehmxy+2:8M/N9Qhxy |
MD5: | 6AEE61D3D3CE0F4931FA79E24E209225 |
SHA1: | C04C163166EC10F85CBDD4D25AA0F4795536ACE4 |
SHA-256: | EBEDC94290E7585F1C8705A6D097746678F191672C8AF476BD26CDE49852068D |
SHA-512: | B1798D5EE7AE71D4C98C44200E5E35A9D4F828008835D64D30E51AD67BFA515DD3E84ACB67E604AA9EEEC5D177E8E1AFCE4B463241AE16BE221A737BD9C630C7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.004276571923431 |
Encrypted: | false |
SSDEEP: | 48:8tdajT+OfAHVUidAKZdA14meh7sFiZUkmgqeh7sExy+BX:8y/PnKxy |
MD5: | 041258056D6B830255285CF271054A53 |
SHA1: | 46E33EED9A51092BFB4F940376E03041391F06C0 |
SHA-256: | 56026B03E10E817EB316F5A9EC1C32A87BDFE27FFFE0A6BA1E6A6CD7D44890C4 |
SHA-512: | 828D9FAD278DAFC4F3E2EFC005A21BC646DD5B0743BACA6BB6728B9211A8F9E16B89A189A42D0FC4EA6A1A3C10480A829BD95C6D4E430E3FAAAE9D050EEF8321 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9946905508552577 |
Encrypted: | false |
SSDEEP: | 48:85pdajT+OfqfHVUidAKZdA1TehDiZUkwqehixy+R:8w/+8xy |
MD5: | 7976DAD5E5E49047D659E9B0899E4191 |
SHA1: | DF4CBAB836392DF13E5F6969574D9E12B861A8B4 |
SHA-256: | 30659F535D2CABB4AE91B548D0C223605E1D85746DD187865556F34AD2C5045F |
SHA-512: | 9254CB3F8E7D6910B388F1F5CEE5C43184238DA520D3985810CA8A51B7A178AE044A34AC048F424873011E85DFE81636EFAC4E39F8EC2199A01ECF294BF8976C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.981974697367606 |
Encrypted: | false |
SSDEEP: | 48:8VdajT+OfqfHVUidAKZdA1dehBiZUk1W1qehYxy+C:8q/u94xy |
MD5: | A2DCFBE58F7D77F8DF925493088DE6CB |
SHA1: | D55AEA1FB36DE7C37535C25DAD571043C21A7101 |
SHA-256: | 8EEF598F3D8598AFCC5151F8EF2B92B6343182A420B5CA97F87E988B9FDD7E87 |
SHA-512: | D2CACDA84F8764B7BE2274EAB6AF588F4124FA156F6FFB4B414DD5DD6106AE8A39531F5BBE2E9D38BD317184019A0CA04110D49AD5BFE224B7C269CE7B2F64A1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9919913136625778 |
Encrypted: | false |
SSDEEP: | 48:8kdajT+OfqfHVUidAKZdA1duTeehOuTbbiZUk5OjqehOuTbKxy+yT+:8p/ETfTbxWOvTbKxy7T |
MD5: | D5514F160D57073FB290870B6AC29412 |
SHA1: | D1289B66CE692C6B57A50C3B989096A2A7FA42BC |
SHA-256: | D4613CEAB74C6AE92B11BE5840DB40EDCD97E00F85339D36A7B94AA5ADD1DD8D |
SHA-512: | D1BBF139D925C380B9BEF17C5C23672F9F7213A7A085D15D921FDB6E65BB45F3F578DC0F226F8D158CCBF0CFFDACE8B4E4F837A468E7F657EA8DCFECB8406DF3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 230701602 |
Entropy (8bit): | 7.996585408984784 |
Encrypted: | true |
SSDEEP: | 3145728:xo7Bose0vrV0+zP4cd4KWahwK2b9Kn5mOhBt6tueEhLzXWCbwjcsq66ANt:KjjV0+EfKWahBCU/XTrb1wosqs |
MD5: | B4192DB5C33E7548E76F565C1753D6C3 |
SHA1: | 0E9E618E7B3D17985D1D866822DEEC07580C9299 |
SHA-256: | 2956F95AE028538EC9B4D8637F4E319CD2AA7598F35096B3AE431EEA346D1F82 |
SHA-512: | 20E86078B9B141081A955CA8BC24DBB4408653A7F9F6373D2FF725A6F78B100743C9CB0B95A6A3BB2875B7304EB091544262C2AC1B29AC217E4557EA2A3148CE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15603 |
Entropy (8bit): | 7.944434780971562 |
Encrypted: | false |
SSDEEP: | 384:jt+WLM7QArSZNTdzInnXsbioN/wPACIz71xpNd3VPqBaNRhjkVy06IPr:jtlLM7QArkTdzIn87N/LCQ1VRqMNDjk/ |
MD5: | 99E8173C2461A2BE1F0CBBEFA3536E2C |
SHA1: | CCF8F7A32D36E8CE9A4D772A852C122E1AC50028 |
SHA-256: | 7D88ED17855CC566CE7F3526DB51A9C25561D3213DEC093CDE42A5C4F2754333 |
SHA-512: | 17639E7DBC13D12636250F809041C07E4C0656F66C18440D59AF07A650E80B3769BCAEB786E55EBB1373B4EB534430F10A13E93742D1F148E6F54C2723BAA9F2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 230701602 |
Entropy (8bit): | 7.996585408984784 |
Encrypted: | true |
SSDEEP: | 3145728:xo7Bose0vrV0+zP4cd4KWahwK2b9Kn5mOhBt6tueEhLzXWCbwjcsq66ANt:KjjV0+EfKWahBCU/XTrb1wosqs |
MD5: | B4192DB5C33E7548E76F565C1753D6C3 |
SHA1: | 0E9E618E7B3D17985D1D866822DEEC07580C9299 |
SHA-256: | 2956F95AE028538EC9B4D8637F4E319CD2AA7598F35096B3AE431EEA346D1F82 |
SHA-512: | 20E86078B9B141081A955CA8BC24DBB4408653A7F9F6373D2FF725A6F78B100743C9CB0B95A6A3BB2875B7304EB091544262C2AC1B29AC217E4557EA2A3148CE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 230701602 |
Entropy (8bit): | 7.996585408984784 |
Encrypted: | true |
SSDEEP: | 3145728:xo7Bose0vrV0+zP4cd4KWahwK2b9Kn5mOhBt6tueEhLzXWCbwjcsq66ANt:KjjV0+EfKWahBCU/XTrb1wosqs |
MD5: | B4192DB5C33E7548E76F565C1753D6C3 |
SHA1: | 0E9E618E7B3D17985D1D866822DEEC07580C9299 |
SHA-256: | 2956F95AE028538EC9B4D8637F4E319CD2AA7598F35096B3AE431EEA346D1F82 |
SHA-512: | 20E86078B9B141081A955CA8BC24DBB4408653A7F9F6373D2FF725A6F78B100743C9CB0B95A6A3BB2875B7304EB091544262C2AC1B29AC217E4557EA2A3148CE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 14937 |
Entropy (8bit): | 4.335367062500441 |
Encrypted: | false |
SSDEEP: | 96:S1/t6WgLyf0mufxNH+aHTwlycNJLVjwyQ6iVRjVdlM6FcKya0O/N/h+fkXU4t207:S1/EtWduVdcRdA9FZ5U4BU+uQi2kW |
MD5: | DE5EE159CB664474D047D4463F241359 |
SHA1: | AE1B1DBBFAAE5A55D71720D17A76A15878C32259 |
SHA-256: | 5B3B8F23471B71AD2BB584830673A564AF8EF46F0BFAF97D12116CDFD869AC25 |
SHA-512: | A17A6A25657F75229FCD051F9646A7193E8DCF57AC73C076276FB1EA4DE8B6F3A94840A8F8F7FFB00B3737FA5B8FEA4783A81198611AC35FF0BE0D18FE1A5BEC |
Malicious: | false |
Reputation: | low |
URL: | https://techweb.stryker.com/favicon.ico |
Preview: |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 08:16:23 |
Start date: | 14/11/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f9810000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 08:16:23 |
Start date: | 14/11/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f9810000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 08:16:24 |
Start date: | 14/11/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f9810000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |