Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Invoice_R6GPN23V_TransactionSuccess.html.html

Overview

General Information

Sample name:Invoice_R6GPN23V_TransactionSuccess.html.html
Analysis ID:1587275
MD5:c37b2957b028d2fac8f507c4fb5bcc91
SHA1:57a86aad0db43b176d4e27532d2c68961e95c5d2
SHA256:7c9196dca6bf5ef53c7f52d9748f64a60f824cb4e93f5594bd026c39f2c0c102

Detection

HTMLPhisher
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish45
AI detected suspicious Javascript
HTML IFrame injector detected
HTML Script injector detected
HTML document with suspicious name
HTML file submission containing password form
HTML page contains obfuscated javascript
Detected non-DNS traffic on DNS port
HTML body contains password input but no form action
HTML page contains hidden javascript code
Invalid 'forgot password' link found
Invalid 'sign-in options' or 'sign-up' link found
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7008 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Invoice_R6GPN23V_TransactionSuccess.html.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6256 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1964,i,101277068821323310,73840539321765976,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
1.3.pages.csvJoeSecurity_HtmlPhish_45Yara detected HtmlPhish_45Joe Security
    1.1.pages.csvJoeSecurity_HtmlPhish_45Yara detected HtmlPhish_45Joe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlJoe Sandbox AI: Score: 10 Reasons: HTML file with login form DOM: 1.3.pages.csv
      Source: Yara matchFile source: 1.3.pages.csv, type: HTML
      Source: Yara matchFile source: 1.1.pages.csv, type: HTML
      Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_Tra... The script demonstrates several high-risk behaviors, including the use of dynamically generated URLs with obfuscated parameters, and the loading of content from a potentially suspicious domain. While the script appears to have a legitimate purpose of displaying a progress bar and loading an iframe, the way it is implemented raises security concerns.
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: New IFrame, src: https://DYp7vU08qJ.abbassare-colesterolo.info:8443/impact?4Iq82tzdL2KJO1Pa=alex@zav.sh
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: New script tag found
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: New script tag found
      Source: https://dyp7vu08qj.abbassare-colesterolo.info:8443/impact?4Iq82tzdL2KJO1Pa=alex@zav.shHTTP Parser: function _0x3684(_0x22b152,_0x1bdcfa){var _0x41d1c6=_0x13ca();return _0x3684=function(_0x4bab88,_0x
      Source: https://dyp7vu08qj.abbassare-colesterolo.info:8443/impact#alex@zav.shHTTP Parser: function _0x3684(_0x22b152,_0x1bdcfa){var _0x41d1c6=_0x13ca();return _0x3684=function(_0x4bab88,_0x
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: Base64 decoded: https://3kxi2uz.port-terra.fr/app/godag.php
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: Invalid link: Forgot my password
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: Invalid link: Create one!
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: <input type="password" .../> found
      Source: Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No <meta name="copyright".. found
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: No <meta name="copyright".. found
      Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.16:49708 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.16:49709 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49737 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:64404 version: TLS 1.2
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: global trafficTCP traffic: 192.168.2.16:64402 -> 162.159.36.2:53
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: dyp7vu08qj.abbassare-colesterolo.info
      Source: global trafficDNS traffic detected: DNS query: _8443._https.dyp7vu08qj.abbassare-colesterolo.info
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 64404 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 64409 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 64406 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64406
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64409
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64404
      Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.16:49708 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.16:49709 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49737 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:64404 version: TLS 1.2

      System Summary

      barindex
      Source: Name includes: Invoice_R6GPN23V_TransactionSuccess.html.htmlInitial sample: invoice
      Source: classification engineClassification label: mal80.phis.winHTML@15/6@20/209
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Invoice_R6GPN23V_TransactionSuccess.html.html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1964,i,101277068821323310,73840539321765976,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1964,i,101277068821323310,73840539321765976,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk

      Stealing of Sensitive Information

      barindex
      Source: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmlHTTP Parser: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.html
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      Browser Extensions
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Registry Run Keys / Startup Folder
      1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Invoice_R6GPN23V_TransactionSuccess.html.html0%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.html0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      code.jquery.com
      151.101.130.137
      truefalse
        high
        cdnjs.cloudflare.com
        104.17.25.14
        truefalse
          high
          sni1gl.wpc.omegacdn.net
          152.199.21.175
          truefalse
            high
            maxcdn.bootstrapcdn.com
            104.18.10.207
            truefalse
              high
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                www.google.com
                172.217.16.196
                truefalse
                  high
                  s-part-0032.t-0009.t-msedge.net
                  13.107.246.60
                  truefalse
                    high
                    dyp7vu08qj.abbassare-colesterolo.info
                    172.67.177.182
                    truefalse
                      unknown
                      aadcdn.msftauth.net
                      unknown
                      unknownfalse
                        high
                        _8443._https.dyp7vu08qj.abbassare-colesterolo.info
                        unknown
                        unknownfalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.htmltrue
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          142.250.186.35
                          unknownUnited States
                          15169GOOGLEUSfalse
                          104.17.24.14
                          unknownUnited States
                          13335CLOUDFLARENETUSfalse
                          1.1.1.1
                          unknownAustralia
                          13335CLOUDFLARENETUSfalse
                          104.18.10.207
                          maxcdn.bootstrapcdn.comUnited States
                          13335CLOUDFLARENETUSfalse
                          172.217.16.138
                          unknownUnited States
                          15169GOOGLEUSfalse
                          13.107.246.45
                          s-part-0017.t-0009.t-msedge.netUnited States
                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          74.125.71.84
                          unknownUnited States
                          15169GOOGLEUSfalse
                          142.250.185.110
                          unknownUnited States
                          15169GOOGLEUSfalse
                          13.107.246.60
                          s-part-0032.t-0009.t-msedge.netUnited States
                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          151.101.130.137
                          code.jquery.comUnited States
                          54113FASTLYUSfalse
                          142.250.181.227
                          unknownUnited States
                          15169GOOGLEUSfalse
                          239.255.255.250
                          unknownReserved
                          unknownunknownfalse
                          172.67.177.182
                          dyp7vu08qj.abbassare-colesterolo.infoUnited States
                          13335CLOUDFLARENETUSfalse
                          152.199.21.175
                          sni1gl.wpc.omegacdn.netUnited States
                          15133EDGECASTUSfalse
                          142.250.186.142
                          unknownUnited States
                          15169GOOGLEUSfalse
                          172.217.16.196
                          www.google.comUnited States
                          15169GOOGLEUSfalse
                          104.17.25.14
                          cdnjs.cloudflare.comUnited States
                          13335CLOUDFLARENETUSfalse
                          142.250.184.234
                          unknownUnited States
                          15169GOOGLEUSfalse
                          IP
                          192.168.2.16
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1587275
                          Start date and time:2025-01-10 02:28:13 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:14
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • EGA enabled
                          Analysis Mode:stream
                          Analysis stop reason:Timeout
                          Sample name:Invoice_R6GPN23V_TransactionSuccess.html.html
                          Detection:MAL
                          Classification:mal80.phis.winHTML@15/6@20/209
                          Cookbook Comments:
                          • Found application associated with file extension: .html
                          • Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 88.221.110.91, 142.250.186.35, 142.250.185.110, 74.125.71.84, 142.250.186.174, 172.217.16.206
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, redirector.gvt1.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com
                          • Not all processes where analyzed, report is missing behavior information
                          • VT rate limit hit for: file:///C:/Users/user/Desktop/Invoice_R6GPN23V_TransactionSuccess.html.html
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 00:28:45 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2673
                          Entropy (8bit):3.9908591812928
                          Encrypted:false
                          SSDEEP:
                          MD5:1CF045910DA33388ECB5C1C215BF08D8
                          SHA1:4D263608956855E426D70DEECA40E2A8EFFED2B2
                          SHA-256:64D3B412818651DAD21B835BF8283EDA6A6A6617833B38DC31C67E4C44281815
                          SHA-512:AE5A11A33088FB5F07C09D5F9AE91492CC4D5D380B0B96B935B3B0D5A09ACB171B9C53DDADA9F980CDF1A02C4B583BB2E8DAFBAF9258FECBF5F8AFF193F18F97
                          Malicious:false
                          Reputation:unknown
                          Preview:L..................F.@.. ...$+.,......i..b..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I*Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V*Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V*Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V*Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 00:28:44 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2675
                          Entropy (8bit):4.009545754283492
                          Encrypted:false
                          SSDEEP:
                          MD5:38047E4C5F18DD78357054FE476D3D6E
                          SHA1:F84A890907ADA6E91DAA7D547F5E202F4D2253C8
                          SHA-256:BC5DAE69584D3B737B23712B70FFA2F0D52BD211B231CC06610ABCD5083CB9FB
                          SHA-512:F1859F5ADF25210DF45D974D39BD27FE876402C60A2C8543DA28039E4C73B33A59EF2E78B3C323C8CC86F4E88EE69C3775FF4C9DB402B4BA11F6E9D18766C9F2
                          Malicious:false
                          Reputation:unknown
                          Preview:L..................F.@.. ...$+.,.....I]..b..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I*Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V*Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V*Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V*Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2689
                          Entropy (8bit):4.015179936155111
                          Encrypted:false
                          SSDEEP:
                          MD5:0A0270BC6B1DFECF4F330D82A3711DC8
                          SHA1:BD368CC21AC13B134DF05F9AF2CA73D3F2EC3D22
                          SHA-256:CDCCDC9B245CD3D2EAE0C94DC6AEC252239E3495935C4F5EE2B2C92AC09D50AF
                          SHA-512:02190CB068519CBB9FCB407E4D0F1E8C86786E4E83EBDB0A3CD1C39A22AAB461FFFE903C418FC339254A4CFBCEEBB6F1467141AC080E4F45B5D6C23638BC4437
                          Malicious:false
                          Reputation:unknown
                          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I*Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V*Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V*Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 00:28:44 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2677
                          Entropy (8bit):4.007099252703467
                          Encrypted:false
                          SSDEEP:
                          MD5:0CA64FD3F33338EDE6A4DA6B00B28915
                          SHA1:D75F92664A1F835D670057C201776F76AC77206A
                          SHA-256:98DA0A0BEB4093F1EB9863EC90F5D3E49C373F0B51C1190C2A248E6852F2725D
                          SHA-512:14A86531B4E80DBFB022424E94B68659A817C2BA65C5BF49B655DDF4888E03BE45E156A864575DFE5E53188FEFDF1D3DA256651D682AC3D6FF721C013A2FB009
                          Malicious:false
                          Reputation:unknown
                          Preview:L..................F.@.. ...$+.,......X..b..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I*Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V*Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V*Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V*Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 00:28:44 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2677
                          Entropy (8bit):3.9941329309103675
                          Encrypted:false
                          SSDEEP:
                          MD5:E1CBA8BDE9A7F9862809C19D2F89F684
                          SHA1:7280AD36B37F718FE7184B91ACD88EDD06D1AB5C
                          SHA-256:0CDBE8A2CB22AC98283237F46AC90E17D93BB0C0BCBCF65B12FA8B7BB14A807C
                          SHA-512:C91025B95E400A4B240430291EC5060D05650C59125CE770C107D8BCE68BF97BBEAD0C34D2B0F71096D05CD3569FBD3C2E8857B99DC3B9020035F79BF66900FA
                          Malicious:false
                          Reputation:unknown
                          Preview:L..................F.@.. ...$+.,....Qdc..b..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I*Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V*Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V*Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V*Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 00:28:44 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                          Category:dropped
                          Size (bytes):2679
                          Entropy (8bit):4.0039462262673995
                          Encrypted:false
                          SSDEEP:
                          MD5:157B6988F9967725C12BAFC7265D23B6
                          SHA1:CF29CD6FA791203A8C9CD2EE1EE36FD6D87FDF4B
                          SHA-256:3B3DC5ED4C1AD89C5B5D08ABF127FC8678E8FC802B96FB1333A78150BA5D8D62
                          SHA-512:B3E23E468CBE1D822124B54CD80A6DA23841D533E52E4D95593FA9B78DCAE2FAA8D9558EF8A81DDEEE83DD881FF646DCC9258A4D26AEB0D194914EEF81E6DB47
                          Malicious:false
                          Reputation:unknown
                          Preview:L..................F.@.. ...$+.,....W.P..b..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I*Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V*Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V*Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V*Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                          File type:HTML document, ASCII text, with CRLF line terminators
                          Entropy (8bit):4.269587506520907
                          TrID:
                          • HyperText Markup Language (15015/1) 20.56%
                          • HyperText Markup Language (12001/1) 16.44%
                          • HyperText Markup Language (12001/1) 16.44%
                          • HyperText Markup Language (11501/1) 15.75%
                          • HyperText Markup Language (11501/1) 15.75%
                          File name:Invoice_R6GPN23V_TransactionSuccess.html.html
                          File size:5'805 bytes
                          MD5:c37b2957b028d2fac8f507c4fb5bcc91
                          SHA1:57a86aad0db43b176d4e27532d2c68961e95c5d2
                          SHA256:7c9196dca6bf5ef53c7f52d9748f64a60f824cb4e93f5594bd026c39f2c0c102
                          SHA512:2ff3814ed4a5972b30c113b6d1598eb1e0c451ff4f026bf81167751c920906afeed183bad77a4daf127e73c292f5e0f18c5e860165c0ea282285698b8e6fb490
                          SSDEEP:96:rn497bMjDaGfmtS8xEOSna/Ddl0ia/imipib:rn497qaGfmtxRSsDci6imipib
                          TLSH:41C10F1A5A5100594173D3B85FA3520CFB6185276742829E7FEC62568FF6B40C8E3FDC
                          File Content Preview:<!DOCTYPE html>..<html lang="en">..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="description" content="Enhanced lo
                          Icon Hash:173149cccc490307