Windows
Analysis Report
https://mail.webaccess-alerts.net/u/amo3z6ccodm9/login.srf/64a4e3/c86acddf-fba6-4ce4-ae40-3fcb0bfadca2
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 3656 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 4796 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2004,i ,382076459 1954156103 ,709443685 2025531885 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version --mojo-pla tform-chan nel-handle =2236 /pre fetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 6408 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://mail. webaccess- alerts.net /u/amo3z6c codm9/logi n.srf/64a4 e3/c86acdd f-fba6-4ce 4-ae40-3fc b0bfadca2" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • AV Detection
- • Phishing
- • Compliance
- • Networking
- • System Summary
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | File deleted: |
Source: | Classification label: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | Directory created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 12 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 File Deletion | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.80.100 | true | false | high | |
mail.webaccess-alerts.net | 100.24.100.138 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true | unknown | ||
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.80.14 | unknown | United States | 15169 | GOOGLEUS | false | |
64.233.180.84 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.250.80.100 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.80.42 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.81.227 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.41.14 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.65.206 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.81.234 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.176.195 | unknown | United States | 15169 | GOOGLEUS | false | |
54.83.101.48 | unknown | United States | 14618 | AMAZON-AESUS | false | |
142.251.41.3 | unknown | United States | 15169 | GOOGLEUS | false | |
100.24.100.138 | mail.webaccess-alerts.net | United States | 14618 | AMAZON-AESUS | false | |
142.251.35.163 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.17 |
192.168.2.16 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1648133 |
Start date and time: | 2025-03-25 15:20:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://mail.webaccess-alerts.net/u/amo3z6ccodm9/login.srf/64a4e3/c86acddf-fba6-4ce4-ae40-3fcb0bfadca2 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.win@22/9@6/147 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.251.41.14, 142 .250.81.227, 142.250.80.14, 64 .233.180.84, 142.250.81.238, 1 42.250.80.42, 142.250.80.46, 1 42.250.176.195, 142.250.81.234 , 142.250.80.10, 142.251.32.10 6, 142.250.65.170, 142.250.80. 106, 142.251.35.170, 142.251.4 0.234, 142.250.72.106, 142.250 .65.202, 172.217.165.138, 142. 250.176.202, 142.251.41.10, 14 2.250.80.74, 142.250.65.234, 1 42.251.40.202, 142.251.35.174 - Excluded domains from analysis
(whitelisted): fonts.googleap is.com, clients2.google.com, a ccounts.google.com, redirector .gvt1.com, content-autofill.go ogleapis.com, fonts.gstatic.co m, clientservices.googleapis.c om, clients.l.google.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - Some HTTPS proxied raw data pa
ckets have been limited to 10 per session. Please view the P CAPs for the complete data. - VT rate limit hit for: https:
//mail.webaccess-alerts.net/u/ amo3z6ccodm9/login.srf/64a4e3/ c86acddf-fba6-4ce4-ae40-3fcb0b fadca2
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 18290 |
Entropy (8bit): | 5.153424553011024 |
Encrypted: | false |
SSDEEP: | |
MD5: | CDE1906F54D9EA8C69BE1488FAD61743 |
SHA1: | BC35BA9B37E3E293EF57036210F5A71AC0E7001B |
SHA-256: | 51829C6361406BBE6BBC441E575D760FB1EE39891A7729878B7D3304D4C1399C |
SHA-512: | 9F151A3215239F5F1D0FE80920DD57683E9F445C604B9500E4D4D9FD3F6577F5521030B0F72FE04331F4F4DFAA1A6543486939F420AA391D0476EF9BAC9F8071 |
Malicious: | false |
Reputation: | unknown |
URL: | https://mail.webaccess-alerts.net/system/content_files/uploads/26b/ad3/4b-/original/content-data-entry-boilerplate.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 15567 |
Entropy (8bit): | 4.64605372301667 |
Encrypted: | false |
SSDEEP: | |
MD5: | E5B29DC5F05D09F0C754424FEAC17B93 |
SHA1: | DA79E8FDF2DBAB47A86879354339D8884CD9A75E |
SHA-256: | E85ED67D64BA21766E6AB30B7FD8C59DFBAAD329A5D3902F9B99A893863E237E |
SHA-512: | F29D035B1BDD25775744484A904E227602FFD1043B9D3A20B2C4B998013E5BF769750C3A0B5D7DFB32F7CF9BEDA383146309C460C1F6E95CF092B8189F81E93F |
Malicious: | false |
Reputation: | unknown |
URL: | https://mail.webaccess-alerts.net/system/content_files/uploads/1cc/f07/72-/original/static-education-l10n.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 12355 |
Entropy (8bit): | 5.474192254690416 |
Encrypted: | false |
SSDEEP: | |
MD5: | 58C019E044248EF665027BD9A0436D5B |
SHA1: | 6561F47456E237186F453E44BA1009B1FA5C9B5D |
SHA-256: | DBA26811CDDA7E7F16F5898C63160CC0D24EDD28D5069D4FB0661E98B5B2CAA8 |
SHA-512: | 27BCD46A7CF3A5835B5535D90B42091302120B1815AB2D5A9457C08EDB2F79817CBC0728ED25B8AE84332B40A81FA45B96B73825B85C1CBE1E8D1D7919A5247A |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;700&display=swap |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2299 |
Entropy (8bit): | 7.887245828776056 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3F4A417E4B9AAB1499C09C8190BB7624 |
SHA1: | 457178C6488FA85407B0B0094F1A2208D4B4FB73 |
SHA-256: | CB12D174C70D4DA8C56DD54138E8CCE0812341D60B746AB8A1A3AC02908FA978 |
SHA-512: | 5905EFB27044143E2485E4096A27C314E44F9512D8834F550BC0DD5947EF70D89EF639283A4DD60CBC92ED854FC26F99DC7AC8FBC8AD2F180504FAAF17A05A80 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1157967 |
Entropy (8bit): | 7.9973627209212905 |
Encrypted: | true |
SSDEEP: | |
MD5: | 8364D2B76F19793C5407C733E2BA8A2E |
SHA1: | AB1C1A81C7EDD471E0EF17A572592F68134E6D87 |
SHA-256: | 0AF82E1261A2AF07E89CC1943F4E2D578879101D7FC76461194F56187E022D46 |
SHA-512: | 18F8170D7C26357A5FC3C61A5AEF654EF88F483128FB5ACED54116B1CB882037EB8BEA3D1E485AB5E1ADBDA8C2641379AA47774CB50E7254887EA9169F937AD5 |
Malicious: | false |
Reputation: | unknown |
URL: | https://mail.webaccess-alerts.net/system/content_images/uploads/e8e/2a9/8c-/original/mountain-bg-min.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 87533 |
Entropy (8bit): | 5.262536918435756 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2C872DBE60F4BA70FB85356113D8B35E |
SHA1: | EE48592D1FFF952FCF06CE0B666ED4785493AFDC |
SHA-256: | FC9A93DD241F6B045CBFF0481CF4E1901BECD0E12FB45166A8F17F95823F0B1A |
SHA-512: | BF6089ED4698CB8270A8B0C8AD9508FF886A7A842278E98064D5C1790CA3A36D5D69D9F047EF196882554FC104DA2C88EB5395F1EE8CF0F3F6FF8869408350FE |
Malicious: | false |
Reputation: | unknown |
URL: | https://mail.webaccess-alerts.net/system/content_files/uploads/5b8/ee7/1e-/original/jquery-latest.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7030 |
Entropy (8bit): | 4.966053726234169 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3FE00905DF926AC65FB23B73AB235FE9 |
SHA1: | 470BE5CF71FD1FEEC011D19C9AED047E24489F16 |
SHA-256: | BA5CCE3AB58617EB4340C792BA864DE65B5E518FFF84A7B1C1B1D5D0CC3E7D20 |
SHA-512: | 7ADF4664AF48AA144A440F7D62CDA4C83D8213DD1C32686BFA6FEB1853AA9FC0057575B1B081C095E7ECD80B80026283DA4709C75218AE2AB90B9ED52789DB9A |
Malicious: | false |
Reputation: | unknown |
URL: | https://mail.webaccess-alerts.net/system/content_files/uploads/592/f93/20-/original/account-security-alert-alternate-styles.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 52236 |
Entropy (8bit): | 7.977477172324493 |
Encrypted: | false |
SSDEEP: | |
MD5: | CD9388CFC3E10EB3BA3F86C2780ECBFB |
SHA1: | 745A31638847D5752D781613F84EE2EAC6914E55 |
SHA-256: | EAD43A27C91F528F879F5CCC4A212BF4FFBE3160D56A9BD2D7D0142206BE6556 |
SHA-512: | 6A244D2D615304170FA06B4CB40DF11F5698A7B483E7494A28587A6F4A04B7ED4507BECFB1FBDC1F28E7B75760061BFD4F108E3F357407596213DE4009203571 |
Malicious: | false |
Reputation: | unknown |
URL: | https://mail.webaccess-alerts.net/system/content_images/uploads/8e7/2c9/94-/original/account-security-alert-favicon.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 748 |
Entropy (8bit): | 3.9063169922279872 |
Encrypted: | false |
SSDEEP: | |
MD5: | 19DCAB11FD9CFCCB950B0210A35429EB |
SHA1: | 782AF9E6051E1D46D931DC774827934A114F38D0 |
SHA-256: | 5FB97E386E794AE45CD3DC12A5B89FB78104E89169D7071248755FA76A0FFEDB |
SHA-512: | F16911F60B05F91799C34A3E7AF0DE655647C9C7DBB5568852D75649F3A632E5F6F91F294A9E7A1E29EEE5F04003FEE511D93C765FA492B236C74B9966593C72 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChRDaHJvbWUvMTM0LjAuNjk5OC4zNhLEAwkEepmK7wDJ1xIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6EgUN541ADhIFDc5BTHoSBQ3njUAOEgUNzkFMehIFDeeNQA4SBQ3OQUx6IY5c0GrYI8i5?alt=proto |
Preview: |