Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch

Overview

General Information

Sample URL:http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch
Analysis ID:1587481
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
AI detected suspicious Javascript
AI detected suspicious URL
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Sigma detected: Cloudflared Tunnels Related DNS Requests
Stores files to the Windows start menu directory
URL contains potential PII (phishing indication)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6232 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 5400 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2040,i,6323865353010830042,17785194740937891124,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 5492 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
Source: DNS queryAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Image: C:\Program Files\Google\Chrome\Application\chrome.exe, QueryName: receipt-friendship-efficient-xl.trycloudflare.com
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chJoe Sandbox AI: Score: 9 Reasons: The URL does not match the legitimate domain name associated with Microsoft, which is microsoft.com., The URL contains suspicious elements such as misspellings and extra characters (e.g., 'mlcrosoft' instead of 'microsoft')., The domain extension '.pages.dev' is unusual for a Microsoft service., The URL includes multiple words that are not typically associated with Microsoft's legitimate services (e.g., 'activeappsdirectorysystemsdevelop')., The presence of multiple concatenated words and the absence of a clear brand association in the domain name are common phishing indicators. DOM: 0.4.pages.csv
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chJoe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is a well-known global technology company., The legitimate domain for Microsoft services is 'microsoft.com'., The provided URL 'loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev' does not match the legitimate domain., The URL contains misspellings and extra words that are not associated with Microsoft's legitimate domain., The use of 'pages.dev' as a domain extension is unusual for Microsoft and suggests a potential phishing attempt., The URL structure is complex and includes multiple concatenated words, which is a common tactic in phishing URLs. DOM: 0.5.pages.csv
Source: 1.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://loginmlcrosoftonlineofficactiveappsdirecto... The provided JavaScript snippet exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. While some of the behaviors may have legitimate purposes, the overall implementation raises significant security concerns. The use of double base64 decoding, the presence of anti-DevTools protection, and the prevention of common user interactions (right-click, content selection) further contribute to the high-risk assessment.
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: http://loginmicrosoftonline.Bdo.scoremasters.gr
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: http://loginmicrosoftonline.Bdo.scoremasters.gr
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: Number of links: 0
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: Base64 decoded: aHR0cHM6Ly9yZWNlaXB0LWZyaWVuZHNoaXAtZWZmaWNpZW50LXhsLnRyeWNsb3VkZmxhcmUuY29t
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: Title: Sign in to your account does not match URL
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chSample URL: PII: christian.wernli@bdo.ch
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: <input type="password" .../> found
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: No favicon
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: No favicon
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: No <meta name="author".. found
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: No <meta name="author".. found
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: No <meta name="copyright".. found
Source: https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.18:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.18:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.160.22:443 -> 192.168.2.18:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.221:443 -> 192.168.2.18:49755 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 18MB later: 27MB
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.22
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.22
Source: global trafficHTTP traffic detected: GET /cache/cdn?email=christian.wernli@bdo.ch HTTP/1.1Host: loginmicrosoftonline.bdo.scoremasters.grConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cache/cdn/?email=christian.wernli@bdo.ch HTTP/1.1Host: loginmicrosoftonline.bdo.scoremasters.grConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: loginmicrosoftonline.bdo.scoremasters.gr
Source: global trafficDNS traffic detected: DNS query: loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: receipt-friendship-efficient-xl.trycloudflare.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.18:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.18:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.160.22:443 -> 192.168.2.18:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.221:443 -> 192.168.2.18:49755 version: TLS 1.2
Source: classification engineClassification label: mal56.phis.win@20/4@20/82
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2040,i,6323865353010830042,17785194740937891124,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2040,i,6323865353010830042,17785194740937891124,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://loginmicrosoftonline.bdo.scoremasters.gr/cache/cdn/?email=christian.wernli@bdo.ch0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev
104.21.112.1
truetrue
    unknown
    challenges.cloudflare.com
    104.18.94.41
    truefalse
      high
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        high
        sni1gl.wpc.omegacdn.net
        152.199.21.175
        truefalse
          high
          s-part-0017.t-0009.fb-t-msedge.net
          13.107.253.45
          truefalse
            high
            www.google.com
            216.58.212.132
            truefalse
              high
              loginmicrosoftonline.bdo.scoremasters.gr
              157.90.95.18
              truefalse
                unknown
                receipt-friendship-efficient-xl.trycloudflare.com
                104.16.231.132
                truefalse
                  unknown
                  aadcdn.msftauth.net
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://loginmicrosoftonline.bdo.scoremasters.gr/cache/cdn/?email=christian.wernli@bdo.chfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://loginmicrosoftonline.bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.chfalse
                      unknown
                      https://loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.dev/#181f545b23e24bbc998bb5278a6ee3?email=christian.wernli%40bdo.chtrue
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        142.250.184.195
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.250.186.170
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.250.74.206
                        unknownUnited States
                        15169GOOGLEUSfalse
                        216.58.212.132
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        13.107.246.45
                        s-part-0017.t-0009.t-msedge.netUnited States
                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        157.90.95.18
                        loginmicrosoftonline.bdo.scoremasters.grUnited States
                        766REDIRISRedIRISAutonomousSystemESfalse
                        104.18.94.41
                        challenges.cloudflare.comUnited States
                        13335CLOUDFLARENETUSfalse
                        13.107.253.45
                        s-part-0017.t-0009.fb-t-msedge.netUnited States
                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        104.16.231.132
                        receipt-friendship-efficient-xl.trycloudflare.comUnited States
                        13335CLOUDFLARENETUSfalse
                        142.250.185.170
                        unknownUnited States
                        15169GOOGLEUSfalse
                        104.21.112.1
                        loginmlcrosoftonlineofficactiveappsdirectorysystemsdevelop.pages.devUnited States
                        13335CLOUDFLARENETUStrue
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        152.199.21.175
                        sni1gl.wpc.omegacdn.netUnited States
                        15133EDGECASTUSfalse
                        142.250.184.227
                        unknownUnited States
                        15169GOOGLEUSfalse
                        66.102.1.84
                        unknownUnited States
                        15169GOOGLEUSfalse
                        IP
                        192.168.2.18
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1587481
                        Start date and time:2025-01-10 12:46:10 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Sample URL:http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:15
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal56.phis.win@20/4@20/82
                        • Exclude process from analysis (whitelisted): SIHClient.exe, SgrmBroker.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 142.250.184.227, 142.250.74.206, 66.102.1.84
                        • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: http://loginmicrosoftonline.Bdo.scoremasters.gr/cache/cdn?email=christian.wernli@bdo.ch
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 10:46:55 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):3.9806922889540197
                        Encrypted:false
                        SSDEEP:
                        MD5:EB8DF2C25FEE2E280ED7039D6E185C6E
                        SHA1:43F7E2260975E3F37613E29207FF6D432420A171
                        SHA-256:40C153C2BB8835BF8E2928AE96D285CAB851631F5009066E83755495DC2B915F
                        SHA-512:C32C754A09B34A348FDE305FC56565DFD494C49DDB469E488868309C6722AD06751C43327C193314C6CF207248CDBAD2813ADA5BB3119FDD34D33F2176828B10
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....R.YUc......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.]....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.]....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.]....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.]...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.].....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............J.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 10:46:55 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):4.000014285809127
                        Encrypted:false
                        SSDEEP:
                        MD5:25FD34846A75958BDF4D64C21BF74B62
                        SHA1:F7346FE11834EFBC6081D7E4E5ADE50ED7C47488
                        SHA-256:AE807C4DFE77966467D72C119F94746D23C126FB93F41DC7279CDE3219D8437F
                        SHA-512:D6332545371606F07525902EA5CAC24D89E4C8E9DBECD67FA00EC4F520C31F5A5CE81747CAC8B6FB6C6F50431D43EBBD44D1D39F53CF134285651E62660A2A28
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.......YUc......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.]....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.]....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.]....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.]...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.].....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............J.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 10:46:55 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):3.9972685459129966
                        Encrypted:false
                        SSDEEP:
                        MD5:080FD2FAF262717AC004DF64ABC789D2
                        SHA1:A9B606D88086A35B46175E17B0FE899D9D3FA23A
                        SHA-256:6AEBE5E14880EBAD56724263F562F41E8492F2A56FA9AE38B523BD79C9621C89
                        SHA-512:64A8F3B802265CDFDE5E2FF7898AFE15F5B0E4EEC8EBE79FCFFECD9F47F4D25F80626896FD0EEDF2A555FC7545C34C41590BCEBBFAAA1EADDB755E0EBF631BC2
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....7..XUc......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.]....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.]....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.]....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.]...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.].....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............J.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 10:46:55 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):3.985650378330081
                        Encrypted:false
                        SSDEEP:
                        MD5:0BF4AFA2BADF722373BD89CFCD5F836D
                        SHA1:5A97156AAE725734685184A555275B3164AAADB5
                        SHA-256:90D1CE42F3F407D32C0559E81DA0033C3F8D0B4096131F10025738E813C7B518
                        SHA-512:BE2C42567B2D5377CBF3F9A121973CE5DCFA813E4E487B7FA1783907478688D4409ADBF6823046D8A95BF278F78C6C4F7A29AFA88205C08470C403406DFA3330
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.......YUc......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.]....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.]....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.]....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.]...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.].....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............J.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        No static file info