Windows
Analysis Report
https://www.google.com/url?q=https://peopletracks.com&source=gmail&ust=1745796031529000&usg=AOvVaw1jJU4a8Ea6iwBKSpUK2c3M#eJydkM1vgkAQxf+X7bWF/WS3nlrTCGmMRpsocpthIfgBQUSx2/R/73Lq3cMc3svML+/ND7FkQnQUodDkmRReMC2VZvSVSm9U3uAAWknKaamE4lTmCgUrrRYUtUQY7/bjGuWKSh5xIZmUJuK7DzPjNH7TRkhttJHif15A4BEQLDZYVw7ywFE
Overview
General Information
Detection
Score: | 20 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 6928 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 6228 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2044,i ,130950312 9746489019 5,14447929 3010125451 55,262144 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionHintsFe tching,Opt imizationT argetPredi ction --va riations-s eed-versio n --mojo-p latform-ch annel-hand le=2100 /p refetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
chrome.exe (PID: 3928 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://www.g oogle.com/ url?q=http s://people tracks.com &source=gm ail&ust=17 4579603152 9000&usg=A OvVaw1jJU4 a8Ea6iwBKS pUK2c3M#eJ ydkM1vgkAQ xf+X7bWF/W S3nlrTCGmM RpsocpthIf gBQUSx2/R/ 73Lq3cMc3s vML+/ND7Fk QnQUodDkmR ReMC2VZvSV Sm9U3uAAWk nKaamE4lTm CgUrrRYUtU QY7/bjGuWK Sh5xIZmUJu K7DzPjNH7T RkhttJHif1 5A4BEQLDZY Vw7ywFERgL t2RWmDpug9 9OShVd+3l0 kYPsQInyBZ DHP+6bKYTS HdnLFZ3Wzc OtiuBmymx7 lY19AsmE2y E/J2sGm239 X3s922Lv8y 38tkdsgP78 NSrO823bQ+ VedTXS9F93 Ct2/gr8vsH 6G1t/Q==" MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
- • Phishing
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Process Injection | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Extra Window Memory Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 3 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
beacons3.gvt2.com | 142.250.69.3 | true | false | high | |
peopletracks.com | 192.145.237.43 | true | false | unknown | |
cdnjs.cloudflare.com | 104.17.24.14 | true | false | high | |
beacons-handoff.gcp.gvt2.com | 142.250.123.94 | true | false | high | |
www.google.com | 192.178.49.196 | true | false | high | |
beacons2.gvt2.com | 173.194.217.94 | true | false | high | |
s-part-0043.t-0009.t-msedge.net | 13.107.246.71 | true | false | high | |
beacons.gvt2.com | 192.178.153.94 | true | false | high | |
7758003883899299392-drgqbtcheaf7amcy.z03.azurefd.net | unknown | unknown | false | unknown | |
beacons.gcp.gvt2.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
false | unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.145.237.43 | peopletracks.com | United States | 22611 | IMH-WESTUS | false | |
104.17.24.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
192.178.49.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
192.178.49.174 | unknown | United States | 15169 | GOOGLEUS | false | |
13.107.246.71 | s-part-0043.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.68.227 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.68.238 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.141.84 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.6 |
192.168.2.13 |
192.168.2.15 |
192.168.2.14 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1676442 |
Start date and time: | 2025-04-28 17:36:43 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://www.google.com/url?q=https://peopletracks.com&source=gmail&ust=1745796031529000&usg=AOvVaw1jJU4a8Ea6iwBKSpUK2c3M#eJydkM1vgkAQxf+X7bWF/WS3nlrTCGmMRpsocpthIfgBQUSx2/R/73Lq3cMc3svML+/ND7FkQnQUodDkmRReMC2VZvSVSm9U3uAAWknKaamE4lTmCgUrrRYUtUQY7/bjGuWKSh5xIZmUJuK7DzPjNH7TRkhttJHif15A4BEQLDZYVw7ywFERgLt2RWmDpug99OShVd+3l0kYPsQInyBZDHP+6bKYTSHdnLFZ3WzcOtiuBmymx7lY19AsmE2yE/J2sGm239X3s922Lv8y38tkdsgP78NSrO823bQ+VedTXS9F93Ct2/gr8vsH6G1t/Q== |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | SUS |
Classification: | sus20.win@24/5@43/114 |
- Exclude process from analysis
(whitelisted): SIHClient.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 192.178.49.174, 14 2.250.68.227, 142.250.141.84, 192.178.49.206, 184.29.183.29 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, clients2.google.com, accou nts.google.com, redirector.gvt 1.com, slscr.update.microsoft. com, clientservices.googleapis .com, clients.l.google.com, fe 3cr.delivery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - Some HTTPS proxied raw data pa
ckets have been limited to 10 per session. Please view the P CAPs for the complete data. - VT rate limit hit for: https:
//www.google.com/url?q=https:/ /peopletracks.com&source=g mail&ust=1745796031529000& amp;usg=AOvVaw1jJU4a8Ea6iwBKSp UK2c3M#eJydkM1vgkAQxf+X7bWF/WS 3nlrTCGmMRpsocpthIfgBQUSx2/R/7 3Lq3cMc3svML+/ND7FkQnQUodDkmRR eMC2VZvSVSm9U3uAAWknKaamE4lTmC gUrrRYUtUQY7/bjGuWKSh5xIZmUJuK 7DzPjNH7TRkhttJHif15A4BEQLDZYV w7ywFERgLt2RWmDpug99OShVd+3l0k YPsQInyBZDHP+6bKYTSHdnLFZ3WzcO tiuBmymx7lY19AsmE2yE/J2sGm239X 3s922Lv8y38tkdsgP78NSrO823bQ+V edTXS9F93Ct2/gr8vsH6G1t/Q==
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 611 |
Entropy (8bit): | 5.237360878328841 |
Encrypted: | false |
SSDEEP: | |
MD5: | AAEED72CD2D1EB82278457985D41E740 |
SHA1: | 8F94B60A83FAA67746C32065878247FFB851EF0F |
SHA-256: | F96BEA85D0A0BF7A4E15F749F825E6E9BDE5751523EA65B2800B6325B79967CE |
SHA-512: | ADCAEF4ADA97DB7F183F32F734413FBC6DB25200033CDB36C07EACCB87A53A77BE26968F8238489B60F024E40906F84C33F1850522894DAF32AFD45EF801A7EA |
Malicious: | false |
Reputation: | unknown |
URL: | https://7758003883899299392-drgqbtcheaf7amcy.z03.azurefd.net/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5430 |
Entropy (8bit): | 3.6534652184263736 |
Encrypted: | false |
SSDEEP: | |
MD5: | F3418A443E7D841097C714D69EC4BCB8 |
SHA1: | 49263695F6B0CDD72F45CF1B775E660FDC36C606 |
SHA-256: | 6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770 |
SHA-512: | 82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.google.com/favicon.ico |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 46859 |
Entropy (8bit): | 5.4549236356677895 |
Encrypted: | false |
SSDEEP: | |
MD5: | E647868246B70926C4D716F7640BD51A |
SHA1: | C64471D33F9A3D20B5D9219159FE102D8763ADCB |
SHA-256: | EDE2693A4A6A5126B9D35669062B358ECAB6AE7B9B86A1CF302FEB45A8514907 |
SHA-512: | 8364DE016C3918F9D7EF3D0A9FC9C56D87DE1DCBC0BBFB71E9DEA6ACB7BFF749A40B13BE45CA6DC98A64B14CF7E443B7DFB17CDDB6707265321E21DA9ACA647E |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/pako/2.1.0/pako.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1523 |
Entropy (8bit): | 5.513032936505175 |
Encrypted: | false |
SSDEEP: | |
MD5: | AF27B56E79FE900D3367BDD64420116D |
SHA1: | 9B7D55A60AA289EA2F6587334CE66D70B6C7A106 |
SHA-256: | 7174674DA336E4C891F1B3731641496F7CF81A0A082A69865ACDAC1BB64CEE12 |
SHA-512: | D8FEE6C569E8FDDE57B1DFD39586431150249C00D97595CC49DABC98ED7920680CF6195764E0C12E95735B2BD599DBE135C608A75256AD44A43E5270A51133E4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.google.com/url?q=https://peopletracks.com&source=gmail&ust=1745796031529000&usg=AOvVaw1jJU4a8Ea6iwBKSpUK2c3M |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 321 |
Entropy (8bit): | 5.095237286878727 |
Encrypted: | false |
SSDEEP: | |
MD5: | ED7904D3A7A09DC1AD29F247E551E8EC |
SHA1: | 30149CF2719587D21B19F07007B2336418C5118E |
SHA-256: | ACC6427CEF0A3DFC4AA16372FF61B8564554442684FAFD3372CBC06D2BB6D7F0 |
SHA-512: | B7D630F65BD6AA4CC7F0A3D2B71883C3A28A1DAD97E2D763C63299C7187EC0ACDA95CC5ECD4CC01A1F3C313B1C5E40AC19C755049F7E76CB81435AEF245FA5F3 |
Malicious: | false |
Reputation: | unknown |
URL: | https://7758003883899299392-drgqbtcheaf7amcy.z03.azurefd.net/favicon.ico |
Preview: |