Create Interactive Tour

Analysis Report https://nt.embluemail.com/p/cl?data=%2FgRNoJzq65iw6AOf6TOlCpw0L4LuJoXtTyXpVIVDFPyTBsdbNXXgHVTkJrFl%2FdtiHQHf05l36QEm9FO72jpctekVKul78M57%2FpiZIAnIhCg%3D!-!7b5il!-!http%3A%2F%2F%23%3Futm_source=emBlue%26utm_medium=email%26utm_campaign=Oportunidad

Overview

General Information

Sample URL:https://nt.embluemail.com/p/cl?data=%2FgRNoJzq65iw6AOf6TOlCpw0L4LuJoXtTyXpVIVDFPyTBsdbNXXgHVTkJrFl%2FdtiHQHf05l36QEm9FO72jpctekVKul78M57%2FpiZIAnIhCg%3D!-!7b5il!-!http%3A%2F%2F%23%3Futm_source=emBlue%26utm_medium=email%26utm_campaign=Oportunidad
Analysis ID:372269
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis



  • System is w10x64
  • iexplore.exe (PID: 2904 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 2840 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2904 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: unknownHTTPS traffic detected: 18.231.2.194:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknownHTTPS traffic detected: 18.231.2.194:443 -> 192.168.2.5:49701 version: TLS 1.2
Source: unknownDNS traffic detected: queries for: nt.embluemail.com
Source: {2B4AD32D-8932-11EB-90E5-ECF4BB570DC9}.dat.1.dr, ~DFB4007FDFD8350289.TMP.1.drString found in binary or memory: https://nt.embluemail.com/p/cl?data=%2FgRNoJzq65iw6AOf6TOlCpw0L4LuJoXtTyXpVIVDFPyTBsdbNXXgHVTkJrFl%2
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 18.231.2.194:443 -> 192.168.2.5:49702 version: TLS 1.2
Source: unknownHTTPS traffic detected: 18.231.2.194:443 -> 192.168.2.5:49701 version: TLS 1.2
Source: classification engineClassification label: unknown0.win@3/11@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2B4AD32B-8932-11EB-90E5-ECF4BB570DC9}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF0C876495DF0F887C.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2904 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2904 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 372269 URL: https://nt.embluemail.com/p... Startdate: 19/03/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 1 51 2->5         started        process3 7 iexplore.exe 35 5->7         started        dnsIp4 10 d-9z7gan7a2h.execute-api.sa-east-1.amazonaws.com 18.231.2.194, 443, 49701, 49702 AMAZON-02US United States 7->10 12 nt.embluemail.com 7->12

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
https://nt.embluemail.com/p/cl?data=%2FgRNoJzq65iw6AOf6TOlCpw0L4LuJoXtTyXpVIVDFPyTBsdbNXXgHVTkJrFl%2FdtiHQHf05l36QEm9FO72jpctekVKul78M57%2FpiZIAnIhCg%3D!-!7b5il!-!http%3A%2F%2F%23%3Futm_source=emBlue%26utm_medium=email%26utm_campaign=Oportunidad0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
d-9z7gan7a2h.execute-api.sa-east-1.amazonaws.com
18.231.2.194
truefalse
    high
    nt.embluemail.com
    unknown
    unknownfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      18.231.2.194
      d-9z7gan7a2h.execute-api.sa-east-1.amazonaws.comUnited States
      16509AMAZON-02USfalse

      General Information

      Joe Sandbox Version:31.0.0 Emerald
      Analysis ID:372269
      Start date:19.03.2021
      Start time:21:09:24
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 2m 25s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:https://nt.embluemail.com/p/cl?data=%2FgRNoJzq65iw6AOf6TOlCpw0L4LuJoXtTyXpVIVDFPyTBsdbNXXgHVTkJrFl%2FdtiHQHf05l36QEm9FO72jpctekVKul78M57%2FpiZIAnIhCg%3D!-!7b5il!-!http%3A%2F%2F%23%3Futm_source=emBlue%26utm_medium=email%26utm_campaign=Oportunidad
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:UNKNOWN
      Classification:unknown0.win@3/11@1/1
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • URL browsing timeout or error
      Warnings:
      • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 104.43.193.48, 204.79.197.200, 13.107.21.200, 20.50.102.62, 93.184.220.29, 13.64.90.137, 23.211.6.115, 104.108.39.131, 52.255.188.83, 23.57.80.111, 13.107.5.88, 13.107.42.23
      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, cs9.wac.phicdn.net, client-office365-tas.msedge.net, ocos-office365-s2s.msedge.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, l-0014.config.skype.com, arc.msn.com, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, go.microsoft.com, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, config.edge.skype.com, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, afdo-tas-offload.trafficmanager.net, dual-a-0001.a-msedge.net, e1723.g.akamaiedge.net, skypedataprdcolcus15.cloudapp.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, l-0014.l-msedge.net
      Errors:
      • URL not reachable
      No simulations
      No context
      No context
      No context
      No context
      No context
      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2B4AD32B-8932-11EB-90E5-ECF4BB570DC9}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):30296
      Entropy (8bit):1.8518585593380341
      Encrypted:false
      SSDEEP:96:rLZwZo25WYmtYobfY1HgKMYHYqYjeQYOxfY/HV6X:rLZwZo25WdtXfIlMmaPfKsX
      MD5:181B240B1FF4602348122CE791F1B599
      SHA1:48B6F13BA9418A441229DF7135F9731ED74A7EA5
      SHA-256:882418E743DB6568CF3AE5289C3CBAF2C01BF4C486D8B519975D479D9366A569
      SHA-512:9BA8B6DC42ED4E08B49A9835D3EA26F5339CEAD7A620DDF154184A43FBA3E698CB7EAD75A0F857D7347866616DA439F41CBA0A51FBFA4D3B68714422E2C41BFF
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{2B4AD32D-8932-11EB-90E5-ECF4BB570DC9}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):24600
      Entropy (8bit):1.7208443567495855
      Encrypted:false
      SSDEEP:48:IwtGcpr4Gwpa0G4pQrGrapbSVGQpBuGHHpcXTGUp8fGzYpmm6GopQYgPg6yUNQsH:rzZgQE6fBSfj92hWtM9Sn31Qjg
      MD5:4D36517167A8C552E00699AF804081D2
      SHA1:8633AFA06E354DDBD58D46A9C72185BAB2A50795
      SHA-256:1A83244A19EFD06DC190557862BAC067277F43C4BAC5654C3724A437F69D802D
      SHA-512:130844FB1E33BB92E96BFC75B7898661A85A689BCF09445FE4B44B5B09F3F5164FCC48B6AF67FE6F3A9FD3C763A123C10779A67DBDE5E7BB0A7C97B6DD68E97F
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{2B4AD32E-8932-11EB-90E5-ECF4BB570DC9}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):16984
      Entropy (8bit):1.5639236245101966
      Encrypted:false
      SSDEEP:48:IwuGcprTGwpaGG4pQVGrapbSIGQpKwG7HpR82TGIpG:ryZNQ26FBSwALT8CA
      MD5:E19F4DE2BCE755FC30FE8709915F9013
      SHA1:C1A2D542A518B8B0884E3C4E7CAE3DBC6B39FF50
      SHA-256:644733B7373B6F3443AFA77EE59E7DA49F9274F7B18DE1204136512CC333AC08
      SHA-512:386EF0070ACC111DD52F531636439AB46FED71D7B2251E469B2972ECE565F595DAE901B459980573B339C03060F0932BC7EED0E18A7531EE191695B9C8794114
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\errorPageStrings[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):4720
      Entropy (8bit):5.164796203267696
      Encrypted:false
      SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
      MD5:D65EC06F21C379C87040B83CC1ABAC6B
      SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
      SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
      SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/errorPageStrings.js
      Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\dnserror[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):2997
      Entropy (8bit):4.4885437940628465
      Encrypted:false
      SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
      MD5:2DC61EB461DA1436F5D22BCE51425660
      SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
      SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
      SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0002
      Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\down[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
      Category:downloaded
      Size (bytes):748
      Entropy (8bit):7.249606135668305
      Encrypted:false
      SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
      MD5:C4F558C4C8B56858F15C09037CD6625A
      SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
      SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
      SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/down.png
      Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\httpErrorPagesScripts[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):12105
      Entropy (8bit):5.451485481468043
      Encrypted:false
      SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
      MD5:9234071287E637F85D721463C488704C
      SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
      SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
      SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
      Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):1612
      Entropy (8bit):4.869554560514657
      Encrypted:false
      SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
      MD5:DFEABDE84792228093A5A270352395B6
      SHA1:E41258C9576721025926326F76063C2305586F76
      SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
      SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
      Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
      C:\Users\user\AppData\Local\Temp\~DF0C876495DF0F887C.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):13029
      Entropy (8bit):0.47915328596858825
      Encrypted:false
      SSDEEP:24:c9lLh9lLh9lIn9lIn9lo49loI9lWJpjoY:kBqoIzlJpjoY
      MD5:01ECF17A319EF4E96BA7A098975DA9CF
      SHA1:C0F36C0E83ACEECDBCAD38819F86D9478C2AB13B
      SHA-256:199753CC2C9D8F61CAE5E003BA0C96F58FAF40B167C7ABF67FB8F79420EF1F37
      SHA-512:F91162F7710FAED84CB4E2A3398FDB2EC6E9C837011522B5E1FDF52CEBBB9A09FDEAEA75C55EC29BF53CA7C5C04602C8DA7DBC52A791179F22A6851BC71EEBD9
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\~DF8191377AA5D9B33A.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):25441
      Entropy (8bit):0.36595449710263067
      Encrypted:false
      SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAAdfX1:kBqoxxJhHWSVSEabIP1
      MD5:382BCBB95C3681AF90736D57096E3C54
      SHA1:E7F20F51495A1F32220A7E894C5FA3726AB9A0FC
      SHA-256:96CD090281D298A3BB55758CB53EF0ACDB65D0644632AF4F200D08F110DA0F80
      SHA-512:D95B52FA8A03310521D63E617442A52E4C1F09A1D2DB680429B8295A21AB01FA08C5E836240B54410EE1358BBEE81867422392ED83806022D9B9A1845D149D97
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\~DFB4007FDFD8350289.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):34793
      Entropy (8bit):0.42796701469903936
      Encrypted:false
      SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwE9lw09l2C9l2i9l/m4:kBqoxKAuvScS+XZbSmImuYgPg6yUNQe
      MD5:FEA9420E4356C05963D1A6E0C7C5F314
      SHA1:EA17AE1DA10A029B4715028C061707C45F8E952A
      SHA-256:FB0539E941549910C0C760DE3C3940DED0C31C786C5803ACCBF6A7FB0AFDCC21
      SHA-512:C629A6532CCE017200B46B062A089BC5BC5B51D6AE8C272BD2B7EB93FE994E45722E321EDC5C776DBA1DD60208C39DB28802B7FDA70F359B874761EA7BE5A6F1
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      No static file info

      Network Behavior

      Download Network PCAP: filteredfull

      Network Port Distribution

      • Total Packets: 48
      • 443 (HTTPS)
      • 53 (DNS)
      TimestampSource PortDest PortSource IPDest IP
      Mar 19, 2021 21:10:16.126144886 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.126899958 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.367585897 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.367739916 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.367944956 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.367993116 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.373217106 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.373403072 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.615695000 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.616921902 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.616966009 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.617014885 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.617038965 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.617058992 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.617062092 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.617099047 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.617100000 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.617157936 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.619307995 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.619349003 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.619390965 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.619396925 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.619410992 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.619441032 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.619493008 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.619544029 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.652949095 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.653079033 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.658812046 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.658899069 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.659074068 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.894273996 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.894325018 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.894645929 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.894695044 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.894737959 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.894794941 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.894846916 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.895631075 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.896199942 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.899518013 CET4434970218.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.899652004 CET49702443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.900412083 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:16.900620937 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:16.946086884 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:17.106729984 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:17.106900930 CET49701443192.168.2.518.231.2.194
      Mar 19, 2021 21:10:17.137976885 CET4434970118.231.2.194192.168.2.5
      Mar 19, 2021 21:10:17.176985979 CET4434970218.231.2.194192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      Mar 19, 2021 21:10:07.502823114 CET5270453192.168.2.58.8.8.8
      Mar 19, 2021 21:10:07.568520069 CET53527048.8.8.8192.168.2.5
      Mar 19, 2021 21:10:07.902875900 CET5221253192.168.2.58.8.8.8
      Mar 19, 2021 21:10:07.954232931 CET53522128.8.8.8192.168.2.5
      Mar 19, 2021 21:10:07.985589981 CET5430253192.168.2.58.8.8.8
      Mar 19, 2021 21:10:08.036483049 CET53543028.8.8.8192.168.2.5
      Mar 19, 2021 21:10:08.077502966 CET5378453192.168.2.58.8.8.8
      Mar 19, 2021 21:10:08.110308886 CET6530753192.168.2.58.8.8.8
      Mar 19, 2021 21:10:08.129591942 CET53537848.8.8.8192.168.2.5
      Mar 19, 2021 21:10:08.162000895 CET53653078.8.8.8192.168.2.5
      Mar 19, 2021 21:10:08.550065041 CET6434453192.168.2.58.8.8.8
      Mar 19, 2021 21:10:08.612046957 CET53643448.8.8.8192.168.2.5
      Mar 19, 2021 21:10:10.979453087 CET6206053192.168.2.58.8.8.8
      Mar 19, 2021 21:10:11.042144060 CET53620608.8.8.8192.168.2.5
      Mar 19, 2021 21:10:14.830631971 CET6180553192.168.2.58.8.8.8
      Mar 19, 2021 21:10:14.892752886 CET53618058.8.8.8192.168.2.5
      Mar 19, 2021 21:10:16.049736023 CET5479553192.168.2.58.8.8.8
      Mar 19, 2021 21:10:16.112529993 CET53547958.8.8.8192.168.2.5
      Mar 19, 2021 21:10:17.998887062 CET4955753192.168.2.58.8.8.8
      Mar 19, 2021 21:10:18.051127911 CET53495578.8.8.8192.168.2.5
      Mar 19, 2021 21:10:19.007983923 CET6173353192.168.2.58.8.8.8
      Mar 19, 2021 21:10:19.057514906 CET53617338.8.8.8192.168.2.5
      Mar 19, 2021 21:10:20.551116943 CET6544753192.168.2.58.8.8.8
      Mar 19, 2021 21:10:20.602219105 CET53654478.8.8.8192.168.2.5
      Mar 19, 2021 21:10:24.131189108 CET5244153192.168.2.58.8.8.8
      Mar 19, 2021 21:10:24.190608025 CET53524418.8.8.8192.168.2.5
      Mar 19, 2021 21:10:25.120520115 CET6217653192.168.2.58.8.8.8
      Mar 19, 2021 21:10:25.178462982 CET53621768.8.8.8192.168.2.5
      Mar 19, 2021 21:10:27.078980923 CET5959653192.168.2.58.8.8.8
      Mar 19, 2021 21:10:27.131345034 CET53595968.8.8.8192.168.2.5
      Mar 19, 2021 21:10:28.297055006 CET6529653192.168.2.58.8.8.8
      Mar 19, 2021 21:10:28.349220037 CET53652968.8.8.8192.168.2.5
      Mar 19, 2021 21:10:33.312659979 CET6318353192.168.2.58.8.8.8
      Mar 19, 2021 21:10:33.362044096 CET53631838.8.8.8192.168.2.5
      Mar 19, 2021 21:10:36.352788925 CET6015153192.168.2.58.8.8.8
      Mar 19, 2021 21:10:36.421861887 CET53601518.8.8.8192.168.2.5
      Mar 19, 2021 21:10:41.278678894 CET5973653192.168.2.58.8.8.8
      Mar 19, 2021 21:10:41.329868078 CET53597368.8.8.8192.168.2.5
      Mar 19, 2021 21:10:41.424521923 CET5105853192.168.2.58.8.8.8
      Mar 19, 2021 21:10:41.424642086 CET5263653192.168.2.58.8.8.8
      Mar 19, 2021 21:10:41.474097013 CET53510588.8.8.8192.168.2.5
      Mar 19, 2021 21:10:41.474170923 CET53526368.8.8.8192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Mar 19, 2021 21:10:16.049736023 CET192.168.2.58.8.8.80xbd0Standard query (0)nt.embluemail.comA (IP address)IN (0x0001)
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Mar 19, 2021 21:10:16.112529993 CET8.8.8.8192.168.2.50xbd0No error (0)nt.embluemail.comd-9z7gan7a2h.execute-api.sa-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)
      Mar 19, 2021 21:10:16.112529993 CET8.8.8.8192.168.2.50xbd0No error (0)d-9z7gan7a2h.execute-api.sa-east-1.amazonaws.com18.231.2.194A (IP address)IN (0x0001)
      Mar 19, 2021 21:10:16.112529993 CET8.8.8.8192.168.2.50xbd0No error (0)d-9z7gan7a2h.execute-api.sa-east-1.amazonaws.com18.231.53.220A (IP address)IN (0x0001)
      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
      Mar 19, 2021 21:10:16.617099047 CET18.231.2.194443192.168.2.549702CN=*.embluemail.com CN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USWed Jun 10 02:00:00 CEST 2020 Thu Oct 22 02:00:00 CEST 2015 Mon May 25 14:00:00 CEST 2015 Wed Sep 02 02:00:00 CEST 2009Sat Jul 10 14:00:00 CEST 2021 Sun Oct 19 02:00:00 CEST 2025 Thu Dec 31 02:00:00 CET 2037 Wed Jun 28 19:39:16 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
      CN=Amazon, OU=Server CA 1B, O=Amazon, C=USCN=Amazon Root CA 1, O=Amazon, C=USThu Oct 22 02:00:00 CEST 2015Sun Oct 19 02:00:00 CEST 2025
      CN=Amazon Root CA 1, O=Amazon, C=USCN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USMon May 25 14:00:00 CEST 2015Thu Dec 31 02:00:00 CET 2037
      CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USWed Sep 02 02:00:00 CEST 2009Wed Jun 28 19:39:16 CEST 2034
      Mar 19, 2021 21:10:16.619493008 CET18.231.2.194443192.168.2.549701CN=*.embluemail.com CN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USWed Jun 10 02:00:00 CEST 2020 Thu Oct 22 02:00:00 CEST 2015 Mon May 25 14:00:00 CEST 2015 Wed Sep 02 02:00:00 CEST 2009Sat Jul 10 14:00:00 CEST 2021 Sun Oct 19 02:00:00 CEST 2025 Thu Dec 31 02:00:00 CET 2037 Wed Jun 28 19:39:16 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
      CN=Amazon, OU=Server CA 1B, O=Amazon, C=USCN=Amazon Root CA 1, O=Amazon, C=USThu Oct 22 02:00:00 CEST 2015Sun Oct 19 02:00:00 CEST 2025
      CN=Amazon Root CA 1, O=Amazon, C=USCN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USMon May 25 14:00:00 CEST 2015Thu Dec 31 02:00:00 CET 2037
      CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USWed Sep 02 02:00:00 CEST 2009Wed Jun 28 19:39:16 CEST 2034

      Code Manipulations

      Statistics

      CPU Usage

      0102030s020406080100

      Click to jump to process

      Memory Usage

      0102030s0.002040MB

      Click to jump to process

      Behavior

      Click to jump to process

      System Behavior

      Start time:21:10:13
      Start date:19/03/2021
      Path:C:\Program Files\internet explorer\iexplore.exe
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Imagebase:0x7ff69ccb0000
      File size:823560 bytes
      MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Start time:21:10:14
      Start date:19/03/2021
      Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      Wow64 process (32bit):true
      Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2904 CREDAT:17410 /prefetch:2
      Imagebase:0x110000
      File size:822536 bytes
      MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly