Windows
Analysis Report
3675918948.svg
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w11x64_office
chrome.exe (PID: 3480 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized --sin gle-argume nt C:\User s\user\Des ktop\36759 18948.svg MD5: DBE43C1D0092437B88CFF7BD9ABC336C) chrome.exe (PID: 4852 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1876,i ,539190515 3750944750 ,249244126 7075752191 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version= 20250316-1 80048.7760 00 --mojo- platform-c hannel-han dle=2148 / prefetch:1 1 MD5: DBE43C1D0092437B88CFF7BD9ABC336C)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_JavaScriptembeddedinSVG | Yara detected JavaScript embedded in SVG | Joe Security | ||
JoeSecurity_HtmlPhish_80 | Yara detected HtmlPhish_80 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_suspendedwebpage | Yara detected suspended webpage | Joe Security |
- • AV Detection
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Phishing |
---|
Source: | File source: |
Source: | Joe Sandbox AI: |
Source: | File source: |
Source: | File source: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: |
Source: | File deleted: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 File Deletion | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Extra Window Memory Injection | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.251.40.164 | true | false | high | |
use.fontawesome.com.cdn.cloudflare.net | 104.21.27.152 | true | false | high | |
mv0d36bqzc.moydovv.com | 157.20.182.225 | true | false | high | |
use.fontawesome.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.251.40.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.251.40.110 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
142.251.35.170 | unknown | United States | 15169 | GOOGLEUS | false | |
104.21.27.152 | use.fontawesome.com.cdn.cloudflare.net | United States | 13335 | CLOUDFLARENETUS | false | |
142.251.40.99 | unknown | United States | 15169 | GOOGLEUS | false | |
172.253.63.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.251.40.238 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.176.206 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.165.131 | unknown | United States | 15169 | GOOGLEUS | false | |
157.20.182.225 | mv0d36bqzc.moydovv.com | unknown | 24297 | FCNUniversityPublicCorporationOsakaJP | false |
IP |
---|
192.168.2.24 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1648169 |
Start date and time: | 2025-03-25 16:03:46 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | 3675918948.svg |
Detection: | MAL |
Classification: | mal64.phis.winSVG@21/3@12/105 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe - Excluded IPs from analysis (wh
itelisted): 172.64.149.23, 104 .18.38.233 - Excluded domains from analysis
(whitelisted): crt.comodoca.c om.cdn.cloudflare.net, crt.com odoca.com - Not all processes where analyz
ed, report is missing behavior information - Some HTTPS proxied raw data pa
ckets have been limited to 10 per session. Please view the P CAPs for the complete data. - VT rate limit hit for: https:
//mv0d36bqzc.moydovv.com/KhtuV 3RTaB6imopbC9dJ4OHVCGLlFu5JWYE f1sBrVU3X7OKlMqV2s3Y0wlTaEIojB pppSzfMxqDqbLVvyjTlAzLmkcdIMCx bisnt1UjyerZX7ALvtL0yQI66r5rLj mtwICTvJTmlkK7pIwDPtccC8kT5qOU FBmx0Lz4F9foURrQay9ad2nmxfnG7a n8gEvZpFSWnkh2G/fY8prBzS9a3KBD c9o1u7SPHyGue2OX72pfpQTXGbhnGi 7fzXWwFUKJUWLNxgDYjsfm0EQeeGrD iCDSPOgHCikqdafUGO9ZDRuqbH27dg Vs4OzdnardWz7ljKbXBT7mQuzRgA7p enlNHlFvhtjzJbhBjQqUWHozzwC44H I7EJsAByrw4lZqnLoDLkXQjZdRKVoN sE3n2A/accountspayable@atomicd ata.com - VT rate limit hit for: https:
//mv0d36bqzc.moydovv.com/favic on.ico
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 38784 |
Entropy (8bit): | 7.994206374899187 |
Encrypted: | true |
SSDEEP: | |
MD5: | F9B85C9463AF7103B9B24BBBF09A06ED |
SHA1: | D28D7222BCBEB8EA701A771E85F7EFE006E62FB1 |
SHA-256: | 62554277D07B20C6BFAE7C6267B3198B4846F604A37D4085BF9F54C392210B56 |
SHA-512: | EC17DAE646A87852E4703148CD67826D375964459D200814A29BBF13D0EC4C9F949E57D36FDFB1624AFB68E4750AB82D923BCBC4C433BEB97C3111FC6B144869 |
Malicious: | false |
Reputation: | unknown |
URL: | https://use.fontawesome.com/releases/v5.0.6/webfonts/fa-solid-900.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7775 |
Entropy (8bit): | 5.6474925641963525 |
Encrypted: | false |
SSDEEP: | |
MD5: | 78E28F00F212239EE6026695961CA7B3 |
SHA1: | 49C5E2B408CD32B6BCE941C00C26A72198103FE9 |
SHA-256: | 5046A3022155471752452F3BF700B9C649242460386E00A4004ED4DF7EFBB021 |
SHA-512: | 5755D58357310361DA3240B85F75B4736C09D539C3C161D48CD8C0120000427799C9F820DE189ADF2DE5E7081D3647C61AC45227F26036CED6DD3EE3238BA8DE |
Malicious: | false |
Reputation: | unknown |
URL: | https://mv0d36bqzc.moydovv.com/cgi-sys/suspendedpage.cgi |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 34734 |
Entropy (8bit): | 4.756523829846464 |
Encrypted: | false |
SSDEEP: | |
MD5: | 42EAA52604673B64D6B356C2FD7F87E3 |
SHA1: | 6B59CB703B2D4A7A2691F13008062B46A6BC7FDB |
SHA-256: | ED0F122470C4D13D86BBABDC38046D743D0228204A56D786D2E17BD83FD358CE |
SHA-512: | CF0DD57CD2115E3AD421066DD86BD2C7BDCD33A6A0A3F7CFD1A19F4E88D274E333FC3C4FFB9E25B2A0BB72B2E63636D141E2D0F48B99C1CFE1F7F7D74F7CA69B |
Malicious: | false |
Reputation: | unknown |
URL: | https://use.fontawesome.com/releases/v5.0.6/css/all.css |
Preview: |
File type: | |
Entropy (8bit): | 5.644215118320286 |
TrID: | |
File name: | 3675918948.svg |
File size: | 4'138 bytes |
MD5: | dbaae308e8c6a211e508d40c854e36cf |
SHA1: | f4c14bb8e104ce350fee0949cf26cc96b377e014 |
SHA256: | eed7c65ba26c89b99cc4a3bc4ed8dbc8ed0bda2ff8ce46e57b6c9b7ba4ab0ce4 |
SHA512: | 38384de37170f9513c792008c80cc177fb215593e1b57ef73d9b90093b0d698451049e68aa6caca9f882ae4756eff41f38bbdba3fffd78fd89c65ce2c7571186 |
SSDEEP: | 96:A451Zh5qEvErTFwh4vdQ6cgdxgC5rOdvhHqIhY15u:AkewEShPSxgCSht |
TLSH: | DA8166604D5F4E1C237440D39CCE18C9CADAE3436FC1AB89BA4FE9A49B6953E10CA4CD |
File Content Preview: | The explorer composed a beautiful painting in the desert. -->.<svg xmlns="http://www.w3.org/2000/svg" width="100%" height="100%">. The child painted a curious thought while sailing across the seas. -->. <foreignObject width="100%" heig |
Icon Hash: | 173149cccc490307 |