Windows
Analysis Report
https://www2.pcrecruiter.net/rest/uiapi/campaigns/redirect?pcrCKey=PRXHA43HFYUIVUTVMVEZHECXITCQ2XUZOJP4XQX25XXHVJBMSE4MOSI3T6RNRM3NCRLTUY3FZYKKMP3I5Q2ASX3NCDE53IRTHOLE4VFHVBQRAEYBMK565X5YAALRCXJUMJ3B5TACOBUY62V2X3OCWETLOMBV56SNMR263X6XFNJ664YRX4MPUMPPOWQ3PCTAMMEWUIF7MYRZ4OPVVQUR3JXXDAP2MOTYVZZDGKS52
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6324 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6552 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=1948,i ,930470073 5862092733 ,237407560 5740702115 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version --mojo-pla tform-chan nel-handle =2248 /pre fetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 3944 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://www2. pcrecruite r.net/rest /uiapi/cam paigns/red irect?pcrC Key=PRXHA4 3HFYUIVUTV MVEZHECXIT CQ2XUZOJP4 XQX25XXHVJ BMSE4MOSI3 T6RNRM3NCR LTUY3FZYKK MP3I5Q2ASX 3NCDE53IRT HOLE4VFHVB QRAEYBMK56 5X5YAALRCX JUMJ3B5TAC OBUY62V2X3 OCWETLOMBV 56SNMR263X 6XFNJ664YR X4MPUMPPOW Q3PCTAMMEW UIF7MYRZ4O PVVQUR3JXX DAP2MOTYVZ ZDGKS525HX 4HCL75CHHQ Z6GNDZ3UMZ 5PTRQZU7QQ L7MMVOBEZP 4TQWRFMHUS ZTXUS6PLN5 55HKKEUAE6 BBAEEKKH3B 7HB6QF6UO6 AV6AKBMR73 V4V7PWT6NX C7VHYDOSAE EUC5XI7VCP YJ7SSXLN6X NAGH2CRQYP LGUHIUUZQR SZQYH7E5QI 5TTFAQUBMD VQ2FK46I6X 4LZUYPPDZH CZSCTSJNBT HOHYY4PTE2 DAK65RVRHU QVVYAITEJF ADJAMHOTN5 NPXKXQ%3D% 3D%3D%3D" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www2.pcrecruiter.net | 68.171.3.30 | true | false | unknown | |
www.pcrecruiter.net | 68.171.3.30 | true | false | unknown | |
www.google.com | 142.250.69.4 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false | unknown | ||
false | unknown | ||
false |
| unknown | |
false | unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.69.4 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.68.234 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
192.178.49.174 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.141.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.68.227 | unknown | United States | 15169 | GOOGLEUS | false | |
68.171.3.30 | www2.pcrecruiter.net | United States | 26722 | MAIN-SEQUENCE-TECHNOLOGIESUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1676244 |
Start date and time: | 2025-04-28 14:16:44 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://www2.pcrecruiter.net/rest/uiapi/campaigns/redirect?pcrCKey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|
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.win@18/9@8/22 |
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded IPs from analysis (wh
itelisted): 192.178.49.174, 14 2.250.68.227, 142.250.141.84 - Excluded domains from analysis
(whitelisted): clients2.googl e.com, accounts.google.com, cl ientservices.googleapis.com, c lients.l.google.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: https:
//www2.pcrecruiter.net/rest/ui api/campaigns/redirect?pcrCKey =PRXHA43HFYUIVUTVMVEZHECXITCQ2 XUZOJP4XQX25XXHVJBMSE4MOSI3T6R NRM3NCRLTUY3FZYKKMP3I5Q2ASX3NC DE53IRTHOLE4VFHVBQRAEYBMK565X5 YAALRCXJUMJ3B5TACOBUY62V2X3OCW ETLOMBV56SNMR263X6XFNJ664YRX4M PUMPPOWQ3PCTAMMEWUIF7MYRZ4OPVV QUR3JXXDAP2MOTYVZZDGKS525HX4HC L75CHHQZ6GNDZ3UMZ5PTRQZU7QQL7M MVOBEZP4TQWRFMHUSZTXUS6PLN555H KKEUAE6BBAEEKKH3B7HB6QF6UO6AV6 AKBMR73V4V7PWT6NXC7VHYDOSAEEUC 5XI7VCPYJ7SSXLN6XNAGH2CRQYPLGU HIUUZQRSZQYH7E5QI5TTFAQUBMDVQ2 FK46I6X4LZUYPPDZHCZSCTSJNBTHOH YY4PTE2DAK65RVRHUQVVYAITEJFADJ AMHOTN5NPXKXQ%3D%3D%3D%3D
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 55801 |
Entropy (8bit): | 5.224680777765472 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7979C5EFF6C67C4987C3A23072E78C6D |
SHA1: | 2B51ABFC2D0DA06AE503AC6471FCC9DA4E54B171 |
SHA-256: | CDA8BD1F782A5F50D5693DD07EF8430937604A68EBF6839CAF8C67D249A21DBA |
SHA-512: | 5423970C3135294A8E5F3B2726BB68DF716DF17B9F181FAF4B667CFD0A2805AA8CB7401AA8A75A4008AA75D57C3825D4DA91F1323572DB5C8DDE390C4DB0FF3C |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/pcrimg/inc/helper.js?ver=202504221429580 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.75 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3A07E5DB1DB81BEFD8FF7B59F5492FF5 |
SHA1: | BE28333EB52E74B210C81967103DBB54F31CE4A6 |
SHA-256: | AF9AF4904A0850E2C924AEB10B478DCEFAB5FC2B47D60FDE3D0F7459D1736531 |
SHA-512: | FF97F7A46BFE0781BBAEDEB552C8FB8DB3E1B62AFC5BE0FD34EE9C8F39D67BA632D93A4AE8F68CA2064F9A932DEF2A65FA7C7BE5682A724EA341E17DDD1A82C8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChRDaHJvbWUvMTM0LjAuNjk5OC4zNhIZCZ0B862WnLKIEgUNeEu4QiEuHQPLHn0ihA==?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 21102 |
Entropy (8bit): | 5.227405591686104 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9ED01E722E2741B56235A6A523295663 |
SHA1: | 32C296367387D5BCE84A415D073AA5F8B50459F9 |
SHA-256: | 8A96D17B2F4CCA9446B86C3EBB52DC58AC6E503F6D9B52793E80B10FE583B15A |
SHA-512: | C396C1CBD0253D63F8755DB83ECE5C4A0E6E66ACBDD6E02FBB4A3781A1B14EA7C0B417C1EB89868890EF3EA100023158DA908C7E03A147679753DCCF0AFB23CC |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/pcrimg/inc/web2.css?ver=202504221429580 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7974 |
Entropy (8bit): | 6.745382153961718 |
Encrypted: | false |
SSDEEP: | |
MD5: | F2D0C0EC979540D333E991EC26E6F970 |
SHA1: | F0FA31EBC9C8B2427DF4879F1FD17978960F27F4 |
SHA-256: | 0ACB75409FF7BAE0546051232AAB0C13ABE0EAE8152C51E52EAD8008514A3664 |
SHA-512: | 17F88358A48C6FEB4C5CC8FCEC3A49F164101346177511091FA6F21B015CFBBBE8F1F44BF95D90D2EC91B2E3E88CE428F8D601E1FD7D66B568994C1029F379A4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.pcrecruiter.net/PCR.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 44310 |
Entropy (8bit): | 4.7826311925609435 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7BBEE77AC6C983C9C5F7D93C6EAF7DF3 |
SHA1: | 19B2B9CF8A3FF54EC112BF944A4B1BCAA52FEA22 |
SHA-256: | B9A0EFFFB3977C0E64F6A93864922EEAFFDBE28751979692F26FD904602CEAD4 |
SHA-512: | 3D93AE5DB0697EA2806571B35E158E93434E7AAFFE51FE4CE22C3EFCF02640D2FBAFDC3C34C4B388178C64626511DC431DC9B02DE0D06168D4F7FB7A5A1C3C31 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/pcrimg/inc/dropdowns.js?ver=202504221429580 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 35133 |
Entropy (8bit): | 4.8832279849768465 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0CF252CCB75E7CD97893491A9CEA4456 |
SHA1: | E2917148DBEB722437BBC6F56FCB3D48184C9B87 |
SHA-256: | C5E9B64BB0732BD6299777A4E0F43FBA444575A0D2D11966047444B4D1DEF944 |
SHA-512: | 7D141F870A2E66EF88D20768CB1BB5B52FBD8FF42AFC06A3D2BA5E09EC1DFC4F2863A6EBEA84D7A6124DE2B9DC55D14D42BA392C714314D5A973503DB652E2EB |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/rest/uiapi/css/fonticons/default?ver=202504221429580 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 249 |
Entropy (8bit): | 4.984897285264533 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5BB8E5F7DA6527E8035A95AFDB0D2E77 |
SHA1: | 899667BD2F93F634620039A312C88601139835FC |
SHA-256: | CE530C27D8C3CF53BE12164D0B46966C83ABBE862B1F497505C8A9AFAFC6FB04 |
SHA-512: | BF7AB75965C32544B28654EA6CE584C8B35453D9C3F4AEC5BB3BE5F6822DEECF44ADA16FCCF42C5656DAD31E741B35C83A75AB1B99E6EA3A7670180EC8D11A9E |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/pcrimg/inc/helperendext.js?ver=202504221429580 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3635 |
Entropy (8bit): | 5.504837114376599 |
Encrypted: | false |
SSDEEP: | |
MD5: | ECFAAD03DF8C93CE92A82CF8169611B4 |
SHA1: | 49CFD0512CC29203074D20622BE8A658ED2B6CDC |
SHA-256: | 7EE7CEB89AA261212DF5882D08FA19A21F6C7AFEFF11767D072B4F4347052415 |
SHA-512: | 195586EA74003A15ED3090760AAD3B9E8BC2A184B8895775EF6CD5A0BD1307652D2AF74E5D54F8C38420E5C5C721C951FF16FBD79A7925B5E065441BC70B7089 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/pcrbin/letter.aspx?i1=&i2=REMOVAL&i3=lbailey%40pike.com&caid=134586340221653&bulkcategory=512&pcr-id=fG5wc2cuP2KgoyT35oVRHGSSKAi3VISTrGeAXAMvHu18FKuTzIB7nXt5rc81zNQ5zSkn%2BFA%3D |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3066 |
Entropy (8bit): | 5.523083720528307 |
Encrypted: | false |
SSDEEP: | |
MD5: | C5AE97F5699E8BB66799AD6CDB44613E |
SHA1: | 97D887E03C01F44317C3801EECC919DBD6A7E93D |
SHA-256: | AFAACBDF131DEE8C4A46F619FF550F7037D4938D3AF3D34F8A9E2E1D954FCE3B |
SHA-512: | BDA3850AE2AE038E8A5873D28BF0448FD2B7A4ADD6C000C67A56F104639286CB6C371293771E213E4130AB9925C86009494B963A312983CB7D670254B78835D2 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www2.pcrecruiter.net/pcrbin/letter.exe |
Preview: |