Edit tour
Windows
Analysis Report
http://propdfhub.com
Overview
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Suricata IDS alerts for network traffic
AI detected landing page (webpage, office document or email)
AI detected suspicious URL
Checks for available system drives (often done to infect USB drives)
Creates files inside the system directory
Deletes files inside the Windows folder
Downloads executable code via HTTP
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
HTML page contains hidden javascript code
Queries the volume information (name, serial number etc) of a device
Sigma detected: Msiexec Initiated Connection
Stores files to the Windows start menu directory
Classification
- System is w10x64_ra
- chrome.exe (PID: 7052 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6340 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2200 --fi eld-trial- handle=196 4,i,105823 2915464528 8296,11736 5620352232 87704,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - msiexec.exe (PID: 3552 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Download s\ProPDFHu b.msi" MD5: E5DA170027542E25EDE42FC54C929077)
- chrome.exe (PID: 6204 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://propdf hub.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- msiexec.exe (PID: 3284 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 2080 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 04C9E4F 57D0D1C329 05015F5BA7 61C6B C MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 1476 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 1B86E0D 7ED7E00C71 33AD0225C9 2F308 MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
⊘No yara matches
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T11:42:52.739694+0100 | 2829202 | 1 | A Network Trojan was detected | 192.168.2.16 | 49793 | 18.161.97.120 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Networking |
---|
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |