Windows
Analysis Report
34209QB_EFT_Payment_Statemt25.svg
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 928 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized --sin gle-argume nt C:\User s\user\Des ktop\34209 QB_EFT_Pay ment_State mt25.svg MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5648 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1936,i ,125138634 2824676899 6,81723628 6191967229 0,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion --var iations-se ed-version --mojo-pl atform-cha nnel-handl e=2216 /pr efetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HangulCharacter | Yara detected Obfuscation Via HangulCharacter | Joe Security | ||
JoeSecurity_InvisibleJS | Yara detected Invisible JS | Joe Security |
- • AV Detection
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Phishing |
---|
Source: | File source: |
Source: | File source: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 4 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 5 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
2% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
a.nel.cloudflare.com | 35.190.80.1 | true | false | high | |
code.jquery.com | 151.101.194.137 | true | false | high | |
zak9.rnltvipi.es | 104.21.65.232 | true | false | unknown | |
www.google.com | 142.250.65.228 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true |
| unknown | |
false | high | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
64.233.180.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.65.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.250.65.238 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.3 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.80.110 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.194.137 | code.jquery.com | United States | 54113 | FASTLYUS | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false | |
104.21.65.232 | zak9.rnltvipi.es | United States | 13335 | CLOUDFLARENETUS | false | |
142.251.40.138 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1648168 |
Start date and time: | 2025-03-25 16:00:48 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | 34209QB_EFT_Payment_Statemt25.svg |
Detection: | MAL |
Classification: | mal64.phis.winSVG@16/3@8/33 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.80.110, 14 2.250.80.3, 142.250.65.238, 64 .233.180.84, 142.251.40.110, 1 42.251.40.138, 142.251.32.106, 142.251.35.170, 142.251.40.10 6, 142.251.40.202, 142.250.80. 10, 142.251.40.234, 142.251.41 .10, 142.250.80.106, 142.250.6 4.106, 142.250.72.106, 142.250 .64.74, 142.250.176.202, 142.2 51.40.170, 142.250.80.42, 142. 250.80.74 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, re director.gvt1.com, content-aut ofill.googleapis.com, clientse rvices.googleapis.com, clients .l.google.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - Some HTTPS proxied raw data pa
ckets have been limited to 10 per session. Please view the P CAPs for the complete data. - VT rate limit hit for: zak9.r
nltvipi.es
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 910875 |
Entropy (8bit): | 3.1130263442021526 |
Encrypted: | false |
SSDEEP: | |
MD5: | E79D9A828D847FAA7BA00A6E42C632EF |
SHA1: | 129433E47F5CC3A4FBC71E1781CC06C880287ABE |
SHA-256: | B4FF5FC9EBC11492C82F2088CD4A58512D696D559561285E47C02790CEE22C35 |
SHA-512: | F8F6F5D45C664F9C4F92011CF0F96FBE6203B9B549DD3FE221F143D4E83BAFD07444A17DA5B048BABB389BA63F3DB14AAC065F0723597BFD6EF3B97B7E41F6D8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://zak9.rnltvipi.es/ebY7FU/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.5 |
Encrypted: | false |
SSDEEP: | |
MD5: | F1C9C44E663E7E62582E3F5B236C1C72 |
SHA1: | E142F3A0C2D1CDF175A5C3AF43AD66FEFE208B1F |
SHA-256: | D843E67FBFA1F5CB0024062861EE26860C5A866F80755CF39B3465459A8538B9 |
SHA-512: | 19FE62CB9D884BB3424C51DD15E74EB22E5A639BABF8398BACEBB781862296FA0D7AEE39C88CB9C7AF5791FD58830AC3433F5C6BD94B1BA3912AB33151E93452 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChRDaHJvbWUvMTM0LjAuNjk5OC4zNhIZCZCsGd--W9-hEgUNNzCpMCEyusk5Ewit8A==?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 89501 |
Entropy (8bit): | 5.289893677458563 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8FB8FEE4FCC3CC86FF6C724154C49C42 |
SHA1: | B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4 |
SHA-256: | FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E |
SHA-512: | F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31 |
Malicious: | false |
Reputation: | unknown |
URL: | https://code.jquery.com/jquery-3.6.0.min.js |
Preview: |
File type: | |
Entropy (8bit): | 3.6979602934055515 |
TrID: |
|
File name: | 34209QB_EFT_Payment_Statemt25.svg |
File size: | 1'172 bytes |
MD5: | 83f71712cfc6b15893aa00b9c653aac4 |
SHA1: | 4a2f80f14fd7c69d974f778a83b7a9b3a531c70b |
SHA256: | 19595d0dde03b7ba477a7788e5c4d268a2cefb43178232affbd4c52d3512ef16 |
SHA512: | 7122adbd78be4f9a13b7915e760b87cb56bc3c6e734794fb1fbed3d6d73e28582c0d98e067044fb02d7e3f866807be2411ecd9ed30b317dd53fcfebacd40f405 |
SSDEEP: | 12:F/LX4okR+I+3AYqcTJnyNHJcRLcTCevbqQWpaKG318qAn8WRXCa12jATOFskA8g7:lLnAYH4NyRgkE31DA8kqjA2XMyXe |
TLSH: | 4D21003F56DE021E75B1EB54C1F01083B965BF5B7518AD4C11EA0B0C80A2ED2B8D6B2F |
File Content Preview: | <.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.8.". .s.t.a.n.d.a.l.o.n.e.=.".n.o.".?.>.....<.s.v.g. .x.m.l.n.s.=.".h.t.t.p.:././.w.w.w...w.3...o.r.g./.2.0.0.0./.s.v.g.". .w.i.d.t.h.=.".4.0.0.". .h.e.i.g.h.t.=.".2.5.0.".>.....<.s.c.r.i |
Icon Hash: | 173149cccc490307 |