Windows
Analysis Report
http://api.tnapplications.com
Overview
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 1472 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6836 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2204 --fi eld-trial- handle=196 8,i,110316 8790746327 9402,58369 4287545324 7089,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 6408 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://api.tn applicatio ns.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.186.100 | true | false | high | |
aa34fc5871ed549c7b1e6d7c2ef3aabf-721668311.us-east-1.elb.amazonaws.com | 44.195.244.192 | true | false | unknown | |
tnapplications.com | 172.67.204.194 | true | false | unknown | |
api.tnapplications.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.99 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.78 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.78 | unknown | United States | 15169 | GOOGLEUS | false | |
44.195.244.192 | aa34fc5871ed549c7b1e6d7c2ef3aabf-721668311.us-east-1.elb.amazonaws.com | United States | 14618 | AMAZON-AESUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
34.230.164.91 | unknown | United States | 14618 | AMAZON-AESUS | false | |
142.251.168.84 | unknown | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
104.21.44.231 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
172.67.204.194 | tnapplications.com | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.185.195 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.100 | www.google.com | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1598685 |
Start date and time: | 2025-01-24 16:20:56 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://api.tnapplications.com |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@19/10@10/99 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.185.99, 14 2.250.186.78, 142.251.168.84, 216.58.212.174, 142.250.186.14 2, 142.250.184.238 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, re director.gvt1.com, clientservi ces.googleapis.com, clients.l. google.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: http:/
/api.tnapplications.com
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.992571212874961 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4ED2F5A5CB7450105841B5D99108E0CF |
SHA1: | C57200A2B60F6150CE25F5DEA69E2CA1A30916FB |
SHA-256: | B31C5652F32F1424A0BB7833561455EB038D4B57253470F183DBA4839230E3CB |
SHA-512: | 19457E9A6F9B6FC8923BA0B3D77FAA2B372B953E51B5DCF4B097BDFBEB82B1D03A111056BE7994A4087AACF13A68ED10092D54EDF362F706C6904DC2427D33D2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.008246364607918 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7CF43498A151CD2794CA9F883897394C |
SHA1: | 8622FD6B17CB904B1D390D3C04797D0C1D86D9E0 |
SHA-256: | 3D5F5E5DDEF7C4828D2D8F4052EE79538756CE7DCE85CA20938D9B2CA775D235 |
SHA-512: | BB49F775D2EF78B511A99B64A90860F26623068D91EF8434D0A422A3B48EE913C44C708F5256A58ED069268AB5A96950CF845E924E4B02499985B5AF8751507F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.017081020992437 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4B9E5D244863CF0B04CB722DAC527526 |
SHA1: | 604832FE7011CD39B4E2607CAE56F152931F30D3 |
SHA-256: | 4C108A856D2E8B4EB730B03372BB162A9CC09D95CA53EF0BB9A93EF3598C8B84 |
SHA-512: | 863E1A09945AC306960674299DCA42F55420052C5C10A3F1386FD47594DFCA8B49C5271610878B756F657FF2B26F27500C7E03B19DC1074A0D96976CCFDCE2BC |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.008093669427754 |
Encrypted: | false |
SSDEEP: | |
MD5: | F0FA0FBDCECA970F8A99CD6B14F80788 |
SHA1: | 711E860F89F728065B8F221C7F1D650EEECCA31E |
SHA-256: | A4838E0C24D0E8E214576F7A28F58455AB82BF9CA9397D9B417280011D81FEAF |
SHA-512: | 2BB3128BEDF7976E01BFBB40E4D1650DAEEF93629977FC671D60D38D789DFD2DD998271CC7EC002F440D53B231E4134B5FAC9FACDA56CEE378E9B43925981DC9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9953520670756864 |
Encrypted: | false |
SSDEEP: | |
MD5: | D0E87114D6577A743794B6243CAC87FF |
SHA1: | 5377ED5DA512C6B925FFFEFDAAA07285F94CBE10 |
SHA-256: | 6DE9FC7D56B16F52C60849A911D9BD3CD7EBBBE9BE570F77D9A13A6FCE282427 |
SHA-512: | E71EF8F5A0F1275184CB52FEDEBD2C83386BEEA4AC4868DF6030928C24BD58FE7CD322F31D230F04E9DC312C54D4E21590349E6FB2748A54AD50188353F6D343 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.006084450262447 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F328ECBED5402C5C0BAC51156F815F8 |
SHA1: | 6ACD53CED23F07B1FF55D3819DA6C96D9700FE3B |
SHA-256: | CAE8EAD0DECF81AED46DE27AAA698411EB9BD0D4F45C2709C2A21ECB16F8D09B |
SHA-512: | B643E59E782E032C693C8544651F8962ECA9452940077388F90294153CD4071C52F0C068296DB8972209B211BCFB39E385A679CCE6E9A05DDF6E8DC378A196A6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 769 |
Entropy (8bit): | 6.889257057050565 |
Encrypted: | false |
SSDEEP: | |
MD5: | 045459995AF63DDB3C3FF2EAB81448EC |
SHA1: | 434BA048889059C2C43CAA37C58E53BD3468520A |
SHA-256: | C18A4B706BF4FA02B06FDB74E1461C6B222944CC39DB2B6B90745B5F1007AD08 |
SHA-512: | 905FC01D1DC23FCFC3283E15600161D45178BA25450A16717D17963F514222CC31461C6B22439B52CC8534BAC9EE44E5DDC2F32937455C568A51B37FB3095E04 |
Malicious: | false |
Reputation: | unknown |
URL: | https://tnapplications.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 803 |
Entropy (8bit): | 5.185010394978804 |
Encrypted: | false |
SSDEEP: | |
MD5: | 74EEBF8BD693AE71AF60570F88811C96 |
SHA1: | 64268A7FD44789532DA49F681476A1C11DDF5C0E |
SHA-256: | BF1740890ED0E391FAA8DB574494BC727F9A0366590EB0562A3A323133508A59 |
SHA-512: | BE24471DE5C10DB7D58A86E11845E4AB1C99A9554F54E9CBA5486A4235B69F4B4A9035A472C1F7CB3B4EC489D0D55AB8CA313D701C052BCC6D11067D26706955 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 138 |
Entropy (8bit): | 4.643957609701194 |
Encrypted: | false |
SSDEEP: | |
MD5: | 849D233AA1DE9B8BE70786BBD5D13CCC |
SHA1: | 67DAC5437670359AC3B171270630A1EB8F4C8EBF |
SHA-256: | 973160D1E67CB5189AD2381441E6AC6B29F58798FA06F3A85DFD25FA78D48C38 |
SHA-512: | C2A14CB227741510066EABBEA53CDFB51E53BBFDF4DC30926112632E7911B54C20216032546D8AEA07943B56C52F4B65BC6EED6A13C67ADB6464086553715A77 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=tnapplications.com&oit=3&cp=0&pgcl=4&gs_rn=42&psi=XLL4dtsepuNJ6Zbj&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1012 |
Entropy (8bit): | 5.757251769123214 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6299BCD39418FDC8231ED3F73E4C2D10 |
SHA1: | DB7C6FF9AC85A77FD16154A0FF282FC228FB1152 |
SHA-256: | 91FACFF1ABCC2998484EBA93DD819EB1320214CD6CA063AA2177188B0FCCC527 |
SHA-512: | B32812E3B79873E9469D976574593F1AF013E4AB2D2684189068E61F82A31652265B93885E7D8B87BC14E3BAFFCC03F43B8EFF071A627FC7DFDFEEA70D6E1411 |
Malicious: | false |
Reputation: | unknown |
URL: | https://tnapplications.com/ThankYou.aspx?source=P |
Preview: |