Windows
Analysis Report
https://pub-290e9228bc824ffb99ba933687a27ad7.r2.dev/repo.html
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- chrome.exe (PID: 400 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6820 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2208 --fi eld-trial- handle=194 8,i,157874 7428992116 6710,17762 2786350215 97138,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6460 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://pub-2 90e9228bc8 24ffb99ba9 33687a27ad 7.r2.dev/r epo.html" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | File source: | ||
Source: | File source: |
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | Directory created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 3 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
code.jquery.com | 151.101.194.137 | true | false | high | |
pub-290e9228bc824ffb99ba933687a27ad7.r2.dev | 162.159.140.237 | true | true | unknown | |
www.google.com | 216.58.212.132 | true | false | high | |
cdn.icon-icons.com | 104.26.12.212 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.159.140.237 | pub-290e9228bc824ffb99ba933687a27ad7.r2.dev | United States | 13335 | CLOUDFLARENETUS | true | |
216.58.212.132 | www.google.com | United States | 15169 | GOOGLEUS | false | |
104.26.12.212 | cdn.icon-icons.com | United States | 13335 | CLOUDFLARENETUS | false | |
151.101.2.137 | unknown | United States | 54113 | FASTLYUS | false | |
172.67.72.210 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
64.233.167.84 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.185.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.163 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.194.137 | code.jquery.com | United States | 54113 | FASTLYUS | false | |
172.217.18.10 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.16.195 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.16 |
192.168.2.10 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587462 |
Start date and time: | 2025-01-10 11:54:16 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://pub-290e9228bc824ffb99ba933687a27ad7.r2.dev/repo.html |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal64.phis.win@16/11@12/115 |
- Exclude process from analysis (whitelisted): svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.16.195, 142.250.185.174, 64.233.167.84, 142.250.186.78, 172.217.16.206, 172.217.18.10, 142.250.186.138, 216.58.212.138, 142.250.181.234, 142.250.185.202, 216.58.206.42, 142.250.186.106, 172.217.16.202, 142.250.74.202, 142.250.185.234, 142.250.186.170, 142.250.184.202, 142.250.186.42, 142.250.185.138, 142.250.186.74, 142.250.185.106, 84.201.210.39
- Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, content-autofill.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: https://pub-290e9228bc824ffb99ba933687a27ad7.r2.dev/repo.html
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9889271231004435 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8464D0C80F11FA8B9FC4FF50375AF649 |
SHA1: | 0BC6D883034D2D9F1CC37CE356277B3F846CFB12 |
SHA-256: | 544A5C34716AE6F1F0BC6458EFF73F319014F7DB7DECC3F6AFEF208FEB13B834 |
SHA-512: | 16C33B72AE82CB37D78F23C9156308ED985959435294F5DAA2D74B87B388E3ACABFDD1300E222E8C92EE9A9762B3D4AD5A1C11813D68832C9AC233F8C20C9FAE |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.002537660117404 |
Encrypted: | false |
SSDEEP: | |
MD5: | 42214313214125D2888F8E5992C418B5 |
SHA1: | 3CF40D72A0B01CDDC0C023450929A0D2081F7E5E |
SHA-256: | 21747024A7AD321AD897A6CEEE458389CD954EE83B366C88C742134000F19CE3 |
SHA-512: | 3A1323BA65065D6D4946771DF6DAA7DBE846BB1EEE84F5F46A09C2569D041BD4F275E4E50DFF7E7592C3ABEB2C23D9C5767F42539AA5526BB6BFA6256B6B42A0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.014912955698429 |
Encrypted: | false |
SSDEEP: | |
MD5: | BE31B240BD3753C1FE7481500C5B0C28 |
SHA1: | 22A09A8F76356920A8D062798AEEB0BBB49F9911 |
SHA-256: | 3E84DA5B385FE4ECD584CFFA0C0F47FE2030B4D79D0528F2A8C8B7E9966C0397 |
SHA-512: | E4D792F33190BE4BAE816E168ADB9A74517104F7DEAA4E60A77F24B3F63F8A3B07A482813C83E79A982A3477CAE08C825603CEB1922448F673210BC93D1ABFE6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.000554969728006 |
Encrypted: | false |
SSDEEP: | |
MD5: | 86048BAF7C1C74A927B522A926BA2D4F |
SHA1: | D62C7262BD68F075527BAAB75753CF80F887129F |
SHA-256: | AB412816504E8A841F888A73BE2CA5F1C7C768A7C9F0B2A6BD744E1308241C61 |
SHA-512: | BF893B9A760F5409922600AE19125560DD97AEAD54863ED7094C620A92D9D6D7CBB954C8977B67E88818854597226ADAD45510A8C061EB3955FA8D12C16F76F0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.99017814937918 |
Encrypted: | false |
SSDEEP: | |
MD5: | 060389BD48FA84140F85009F1EC38BA6 |
SHA1: | DC6BDD5E1B0E3EEF8CEB81EB864FBDD1CE3FBCBC |
SHA-256: | E1B77D3EA653A410546D109B1AACE03FE58FD91B94A1F00676F9B704F11BA547 |
SHA-512: | 06529FB03F88F1BF5F70B3081C2D5859D6EA52DDF1576390CFAB96143D4F43FD71FE3DFF60505DFD563835DD8D2FCD8F7EB993D28CC6E643DAC69BF52C73BACE |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.002555284049065 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3B3712D7EE4CF8EA53E9C9421035D5A5 |
SHA1: | 33AE4D1AC5DE7B096D905BD14CA25CEFB86C6D77 |
SHA-256: | C07A92FC63105690B356FF930F288C77DAB7394034928F95BB236F988A818C14 |
SHA-512: | 5D432C22BE92EF09079A9411D2E12486D7CE026AA7B1F17F422930642ADFBD0A0836D23810A153BF6EE2DD0383B411982DADB390D17D3DA300B78ED4AFF88E37 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89501 |
Entropy (8bit): | 5.289893677458563 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8FB8FEE4FCC3CC86FF6C724154C49C42 |
SHA1: | B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4 |
SHA-256: | FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E |
SHA-512: | F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 525002 |
Entropy (8bit): | 6.033306230250027 |
Encrypted: | false |
SSDEEP: | |
MD5: | 41932332574AF9A16DDD1FFC98CE7339 |
SHA1: | 3F374B8B9E8D2E0034ED3331D7FD07EFFB31D307 |
SHA-256: | 9F05F7571B5AD06DC611E7FDE582CB3748926E45B23F497ACAA126FD1878784A |
SHA-512: | 7A1E199E99F2E3A365C319EE507143A7D7D5F3971892188A3D3594FFD6197D769B003CD93A932172D386F6CFE08A405F3A8461ACE435015E9874F68922CE0425 |
Malicious: | false |
Reputation: | unknown |
URL: | https://pub-290e9228bc824ffb99ba933687a27ad7.r2.dev/repo.html |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 14457 |
Entropy (8bit): | 7.724590627564223 |
Encrypted: | false |
SSDEEP: | |
MD5: | BE0737BB80699F91D5F504291578B8C6 |
SHA1: | 46228FBD9B5FBD9189D7D788A814AACDA6B81C03 |
SHA-256: | DAFEDD8328C04F89812F478F15CDD702056E8CC59EFBCB9133D0E4FE2FC46FD0 |
SHA-512: | CCCC8F6162043A59AD315B9E66E7245E131D3831F518A5514417542C165C3127ABED1125FAA25B20964BDCC04C7EB826A33918CF745901D2B329B09ACC8679AD |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdn.icon-icons.com/icons2/886/PNG/512/file-expand_Pdf_icon-icons.com_68956.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 28 |
Entropy (8bit): | 4.066108939837481 |
Encrypted: | false |
SSDEEP: | |
MD5: | 941333316D1A8BEF5A53F630725D32B4 |
SHA1: | A6F5054A42DDE9015C8F7B24FDFC1F4191D73BB0 |
SHA-256: | F162092ECFA8BC0045E2DC23961E45FEB576812D502CD07DCD193E856453F8FE |
SHA-512: | 7E87E811E7C548112FD1590AF481089B3E0D7D9E29AD202C723AC3D2F06AEA41577E4FBAD573948C2BD177F2F6B077904F37CD516B0A2E35194ED983608A10E5 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwkLIZBEg1MNyRIFDamYCo0SBQ1gSAjf?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11352 |
Entropy (8bit): | 7.729942514997727 |
Encrypted: | false |
SSDEEP: | |
MD5: | A624F545DE54B4A2C079CCDAE0369BE3 |
SHA1: | 470A60ED2283732663D4171C2E34A4C4D8F852E5 |
SHA-256: | EC12702E0DB9DA81DE336E211C13DE7EB26D58EBA8A20D9A880076EBAF982E13 |
SHA-512: | 9FD8E840DCC7898A0BE1C6FB56C746EBBE4B79C76A3E45D8890F55A1A5E96CFCE9136DF982AFC027301562BBF65F672E04276774762B3D65C60E91EC78EC8967 |
Malicious: | false |
Reputation: | unknown |
Preview: |