Windows
Analysis Report
https://yhp1b2pb.r.us-east-1.awstrack.me/L0/https:%2F%2Furldefense.proofpoint.com%2Fv2%2Furl%3Fu=https-3A__clicks.aweber.com_y_ct_-3Fl-3D20T4b-26m-3Di5KdL66hTnHZVC9-26b-3D70UUZrQPSuEJP3o-5FsRFMWw%26d=DwMFAw%26c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM%26r=5B1_R__KW843kwBcy22_MQ%26m=iWFlITfTdqAlHl
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 532 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6804 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1836,i ,100190453 4935448621 6,10117860 5866387207 04,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction --va riations-s eed-versio n --mojo-p latform-ch annel-hand le=1516 /p refetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 6280 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://yhp1b 2pb.r.us-e ast-1.awst rack.me/L0 /https:%2F %2Furldefe nse.proofp oint.com%2 Fv2%2Furl% 3Fu=https- 3A__clicks .aweber.co m_y_ct_-3F l-3D20T4b- 26m-3Di5Kd L66hTnHZVC 9-26b-3D70 UUZrQPSuEJ P3o-5FsRFM Ww%26d=DwM FAw%26c=eu GZstcaTDll vimEN8b7jX rwqOf-v5A_ CdpgnVfiiM M%26r=5B1_ R__KW843kw Bcy22_MQ%2 6m=iWFlITf TdqAlHlfy5 82cvlK7YKh UhnUXugBqm ivlvehJJGL thS87aN--t 3MkxomM%26 s=fJKM5uLh Q8UU_E3zYE Nggf9UT_yn 0JPSThh9XT IoxJE%26e= /1/0100019 65ee0fd07- 52725c71-8 e12-46f5-9 5d1-eeae8d d89ea9-000 000/c3IwZT 6L-ZyuTWqX Q08M-7hJCW Q=423" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | HTTP traffic: | ||
Source: | HTTP traffic: | ||
Source: | HTTP traffic: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
urldefense.com | 54.213.143.44 | true | false | high | |
www.google.com | 192.178.49.164 | true | false | high | |
clicks.aweber.com | 172.64.151.51 | true | false | unknown | |
baconredirects-elb-1w79jy7i6g0wf-1154668140.us-east-1.elb.amazonaws.com | 34.199.126.55 | true | false | high | |
cremationauthority.co.za | 154.0.167.140 | true | false | unknown | |
yhp1b2pb.r.us-east-1.awstrack.me | unknown | unknown | false | high | |
urldefense.proofpoint.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | unknown | ||
false |
| unknown | |
false |
| unknown | |
false | high | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
74.125.137.84 | unknown | United States | 15169 | GOOGLEUS | false | |
192.178.49.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
154.0.167.140 | cremationauthority.co.za | South Africa | 37611 | AfrihostZA | false | |
192.178.49.195 | unknown | United States | 15169 | GOOGLEUS | false | |
192.178.49.174 | unknown | United States | 15169 | GOOGLEUS | false | |
54.213.143.44 | urldefense.com | United States | 16509 | AMAZON-02US | false | |
172.64.151.51 | clicks.aweber.com | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.68.238 | unknown | United States | 15169 | GOOGLEUS | false | |
34.199.126.55 | baconredirects-elb-1w79jy7i6g0wf-1154668140.us-east-1.elb.amazonaws.com | United States | 14618 | AMAZON-AESUS | false |
IP |
---|
192.168.2.18 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1672171 |
Start date and time: | 2025-04-23 16:41:12 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://yhp1b2pb.r.us-east-1.awstrack.me/L0/https:%2F%2Furldefense.proofpoint.com%2Fv2%2Furl%3Fu=https-3A__clicks.aweber.com_y_ct_-3Fl-3D20T4b-26m-3Di5KdL66hTnHZVC9-26b-3D70UUZrQPSuEJP3o-5FsRFMWw%26d=DwMFAw%26c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM%26r=5B1_R__KW843kwBcy22_MQ%26m=iWFlITfTdqAlHlfy582cvlK7YKhUhnUXugBqmivlvehJJGLthS87aN--t3MkxomM%26s=fJKM5uLhQ8UU_E3zYENggf9UT_yn0JPSThh9XTIoxJE%26e=/1/010001965ee0fd07-52725c71-8e12-46f5-95d1-eeae8dd89ea9-000000/c3IwZT6L-ZyuTWqXQ08M-7hJCWQ=423 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@23/2@10/119 |
- Exclude process from analysis
(whitelisted): SgrmBroker.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.68.238, 19 2.178.49.195, 192.178.49.174, 74.125.137.84, 184.29.183.29 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, clients2.google.com, accou nts.google.com, clientservices .googleapis.com, clients.l.goo gle.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//yhp1b2pb.r.us-east-1.awstrac k.me/L0/https:%2F%2Furldefense .proofpoint.com%2Fv2%2Furl%3Fu =https-3A__clicks.aweber.com_y _ct_-3Fl-3D20T4b-26m-3Di5KdL66 hTnHZVC9-26b-3D70UUZrQPSuEJP3o -5FsRFMWw%26d=DwMFAw%26c=euGZs tcaTDllvimEN8b7jXrwqOf-v5A_Cdp gnVfiiMM%26r=5B1_R__KW843kwBcy 22_MQ%26m=iWFlITfTdqAlHlfy582c vlK7YKhUhnUXugBqmivlvehJJGLthS 87aN--t3MkxomM%26s=fJKM5uLhQ8U U_E3zYENggf9UT_yn0JPSThh9XTIox JE%26e=/1/010001965ee0fd07-527 25c71-8e12-46f5-95d1-eeae8dd89 ea9-000000/c3IwZT6L-ZyuTWqXQ08 M-7hJCWQ=423
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 315 |
Entropy (8bit): | 5.0572271090563765 |
Encrypted: | false |
SSDEEP: | |
MD5: | A34AC19F4AFAE63ADC5D2F7BC970C07F |
SHA1: | A82190FC530C265AA40A045C21770D967F4767B8 |
SHA-256: | D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3 |
SHA-512: | 42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cremationauthority.co.za/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3654 |
Entropy (8bit): | 5.843070882306156 |
Encrypted: | false |
SSDEEP: | |
MD5: | 93D558475C5F307F67929A8E636C5889 |
SHA1: | 2534FCB56AD96C7379E0B5719A8DCFDCF872C556 |
SHA-256: | 9E41DA0C77CA2D147238C681D22079CC5111CCCC581DE2DE53C4AB721F629F66 |
SHA-512: | 1FC9A07BCE34355F5BFCA0C6C95C97C5119846B8E92D2ABE70E6E1BEE610B00E2B4C2CAFA5FF54C10714FDD03855822C1897D3FF00DF61970A3787C46F0E3EDA |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE |
Preview: |