Play interactive tourEdit tour

Analysis Report http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.

Overview

General Information

Sample URL:http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.
Analysis ID:398032
Infos:

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 6372 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.' > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 6484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 5012 cmdline: wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.' MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: global trafficHTTP traffic detected: GET /InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343. HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like GeckoAccept: */*Accept-Encoding: identityHost: cdn.itsupport247.netConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: cdn.itsupport247.net
Source: wget.exe, 00000002.00000002.634228525.0000000000140000.00000004.00000020.sdmp, cmdline.out.2.drString found in binary or memory: http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform
Source: classification engineClassification label: clean0.win@4/1@1/1
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6484:120:WilError_01
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.' > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.' Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSystem Information Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryRemote System Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 398032 URL: http://cdn.itsupport247.net... Startdate: 26/04/2021 Architecture: WINDOWS Score: 0 5 cmd.exe 2 2->5         started        process3 7 wget.exe 1 5->7         started        10 conhost.exe 5->10         started        dnsIp4 12 d327blnvqmk62q.cloudfront.net 65.9.66.25, 49734, 80 AMAZON-02US United States 7->12 14 cdn.itsupport247.net 7->14

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
d327blnvqmk62q.cloudfront.net
65.9.66.25
truefalse
    high
    cdn.itsupport247.net
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platformwget.exe, 00000002.00000002.634228525.0000000000140000.00000004.00000020.sdmp, cmdline.out.2.drfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          65.9.66.25
          d327blnvqmk62q.cloudfront.netUnited States
          16509AMAZON-02USfalse

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:398032
          Start date:26.04.2021
          Start time:19:02:27
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 1m 44s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:urldownload.jbs
          Sample URL:http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean0.win@4/1@1/1
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Unable to download file
          Warnings:
          • Exclude process from analysis (whitelisted): svchost.exe
          • Excluded IPs from analysis (whitelisted): 104.42.151.234, 168.61.161.212, 52.147.198.201, 52.255.188.83
          • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, watson.telemetry.microsoft.com, skypedataprdcolwus16.cloudapp.net
          No simulations
          No context
          No context
          No context
          No context
          No context
          C:\Users\user\Desktop\cmdline.out
          Process:C:\Windows\SysWOW64\wget.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):448
          Entropy (8bit):5.149722657458643
          Encrypted:false
          SSDEEP:12:H9ouaNKDHypDOnKr1Qc3ulUQlsulDxr1De5RhkgsQoua2wsf:SuakDHypiKhHuljlsulDxxePf+uah2
          MD5:6AE4110F0C3D8A6F89AFC1DEA658DDC8
          SHA1:0BEE648072B84458A46F4C90F32FEE06DBD36750
          SHA-256:CA095E0B5E4E0729B810B79B151494B9E9C867E36B098632EE7092B5C9556694
          SHA-512:AF778F76F16122F01B93C8BE4D5B295514DF5EE1EB8EAB64BE3AF4DE9AA841A6251399DB840D198E1BA83E175EC77C87793F9E2343A7103F03A0F48CC4BB0FF5
          Malicious:false
          Reputation:low
          Preview: --2021-04-26 19:03:07-- http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343...Resolving cdn.itsupport247.net (cdn.itsupport247.net)... 65.9.66.25, 65.9.66.34, 65.9.66.115, .....Connecting to cdn.itsupport247.net (cdn.itsupport247.net)|65.9.66.25|:80... connected...HTTP request sent, awaiting response... 403 Forbidden..2021-04-26 19:03:08 ERROR 403: Forbidden.....

          Static File Info

          No static file info

          Network Behavior

          Download Network PCAP: filteredfull

          Snort IDS Alerts

          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          04/26/21-19:03:09.565510TCP1201ATTACK-RESPONSES 403 Forbidden804973465.9.66.25192.168.2.4

          Network Port Distribution

          • Total Packets: 15
          • 80 (HTTP)
          • 53 (DNS)
          TimestampSource PortDest PortSource IPDest IP
          Apr 26, 2021 19:03:09.080473900 CEST4973480192.168.2.465.9.66.25
          Apr 26, 2021 19:03:09.120999098 CEST804973465.9.66.25192.168.2.4
          Apr 26, 2021 19:03:09.121516943 CEST4973480192.168.2.465.9.66.25
          Apr 26, 2021 19:03:09.124181032 CEST4973480192.168.2.465.9.66.25
          Apr 26, 2021 19:03:09.164618969 CEST804973465.9.66.25192.168.2.4
          Apr 26, 2021 19:03:09.565510035 CEST804973465.9.66.25192.168.2.4
          Apr 26, 2021 19:03:09.565572977 CEST804973465.9.66.25192.168.2.4
          Apr 26, 2021 19:03:09.565789938 CEST4973480192.168.2.465.9.66.25
          Apr 26, 2021 19:03:09.882019043 CEST4973480192.168.2.465.9.66.25
          TimestampSource PortDest PortSource IPDest IP
          Apr 26, 2021 19:03:02.129615068 CEST4991053192.168.2.48.8.8.8
          Apr 26, 2021 19:03:02.181298971 CEST53499108.8.8.8192.168.2.4
          Apr 26, 2021 19:03:03.334218025 CEST5585453192.168.2.48.8.8.8
          Apr 26, 2021 19:03:03.385818005 CEST53558548.8.8.8192.168.2.4
          Apr 26, 2021 19:03:04.267766953 CEST6454953192.168.2.48.8.8.8
          Apr 26, 2021 19:03:04.316550970 CEST53645498.8.8.8192.168.2.4
          Apr 26, 2021 19:03:05.123840094 CEST6315353192.168.2.48.8.8.8
          Apr 26, 2021 19:03:05.172660112 CEST53631538.8.8.8192.168.2.4
          Apr 26, 2021 19:03:05.963695049 CEST5299153192.168.2.48.8.8.8
          Apr 26, 2021 19:03:06.015314102 CEST53529918.8.8.8192.168.2.4
          Apr 26, 2021 19:03:08.996354103 CEST5370053192.168.2.48.8.8.8
          Apr 26, 2021 19:03:09.061995983 CEST53537008.8.8.8192.168.2.4
          Apr 26, 2021 19:03:09.853107929 CEST5172653192.168.2.48.8.8.8
          Apr 26, 2021 19:03:09.904620886 CEST53517268.8.8.8192.168.2.4
          Apr 26, 2021 19:03:10.899847031 CEST5679453192.168.2.48.8.8.8
          Apr 26, 2021 19:03:10.948713064 CEST53567948.8.8.8192.168.2.4
          Apr 26, 2021 19:03:12.486923933 CEST5653453192.168.2.48.8.8.8
          Apr 26, 2021 19:03:12.535693884 CEST53565348.8.8.8192.168.2.4
          Apr 26, 2021 19:03:13.329256058 CEST5662753192.168.2.48.8.8.8
          Apr 26, 2021 19:03:13.380887985 CEST53566278.8.8.8192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Apr 26, 2021 19:03:08.996354103 CEST192.168.2.48.8.8.80x30fbStandard query (0)cdn.itsupport247.netA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Apr 26, 2021 19:03:09.061995983 CEST8.8.8.8192.168.2.40x30fbNo error (0)cdn.itsupport247.netd327blnvqmk62q.cloudfront.netCNAME (Canonical name)IN (0x0001)
          Apr 26, 2021 19:03:09.061995983 CEST8.8.8.8192.168.2.40x30fbNo error (0)d327blnvqmk62q.cloudfront.net65.9.66.25A (IP address)IN (0x0001)
          Apr 26, 2021 19:03:09.061995983 CEST8.8.8.8192.168.2.40x30fbNo error (0)d327blnvqmk62q.cloudfront.net65.9.66.34A (IP address)IN (0x0001)
          Apr 26, 2021 19:03:09.061995983 CEST8.8.8.8192.168.2.40x30fbNo error (0)d327blnvqmk62q.cloudfront.net65.9.66.115A (IP address)IN (0x0001)
          Apr 26, 2021 19:03:09.061995983 CEST8.8.8.8192.168.2.40x30fbNo error (0)d327blnvqmk62q.cloudfront.net65.9.66.88A (IP address)IN (0x0001)
          • cdn.itsupport247.net
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.44973465.9.66.2580C:\Windows\SysWOW64\wget.exe
          TimestampkBytes transferredDirectionData
          Apr 26, 2021 19:03:09.124181032 CEST988OUTGET /InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343. HTTP/1.1
          User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko
          Accept: */*
          Accept-Encoding: identity
          Host: cdn.itsupport247.net
          Connection: Keep-Alive
          Apr 26, 2021 19:03:09.565510035 CEST989INHTTP/1.1 403 Forbidden
          Content-Type: application/xml
          Transfer-Encoding: chunked
          Connection: keep-alive
          Date: Mon, 26 Apr 2021 17:03:09 GMT
          Server: AmazonS3
          X-Cache: Error from cloudfront
          Via: 1.1 b8fb5d47d5536b63dd25111404e6e2e4.cloudfront.net (CloudFront)
          X-Amz-Cf-Pop: FRA56-C1
          X-Amz-Cf-Id: QZ2RrL76rVLwVRyKqzjgBN7TPtiKe2_IsyhPobU4moaNzXRHcOBJeg==
          Data Raw: 66 33 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0a 3c 45 72 72 6f 72 3e 3c 43 6f 64 65 3e 41 63 63 65 73 73 44 65 6e 69 65 64 3c 2f 43 6f 64 65 3e 3c 4d 65 73 73 61 67 65 3e 41 63 63 65 73 73 20 44 65 6e 69 65 64 3c 2f 4d 65 73 73 61 67 65 3e 3c 52 65 71 75 65 73 74 49 64 3e 43 44 44 39 4d 56 42 4a 4a 4a 51 52 51 37 59 4a 3c 2f 52 65 71 75 65 73 74 49 64 3e 3c 48 6f 73 74 49 64 3e 2f 52 73 52 30 4c 45 46 38 69 69 4e 59 41 6e 4a 44 52 53 4c 6a 69 30 31 51 78 41 72 53 50 45 30 33 6b 4d 6e 6b 2b 68 4f 4f 6e 2f 55 31 4d 31 71 36 6f 77 62 35 4d 6d 70 4b 50 76 78 53 37 57 42 4c 2b 44 47 58 69 68 71 76 51 41 3d 3c 2f 48 6f 73 74 49 64 3e 3c 2f 45 72 72 6f 72 3e 0d 0a
          Data Ascii: f3<?xml version="1.0" encoding="UTF-8"?><Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>CDD9MVBJJJQRQ7YJ</RequestId><HostId>/RsR0LEF8iiNYAnJDRSLji01QxArSPE03kMnk+hOOn/U1M1q6owb5MmpKPvxS7WBL+DGXihqvQA=</HostId></Error>
          Apr 26, 2021 19:03:09.565572977 CEST989INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Code Manipulations

          Statistics

          CPU Usage

          02468s020406080100

          Click to jump to process

          Memory Usage

          Click to jump to process

          High Level Behavior Distribution

          • File
          • Network

          Click to dive into process behavior distribution

          Behavior

          Click to jump to process

          System Behavior

          Start time:19:03:06
          Start date:26/04/2021
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.' > cmdline.out 2>&1
          Imagebase:0x11d0000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Start time:19:03:07
          Start date:26/04/2021
          Path:C:\Windows\SysWOW64\wget.exe
          Wow64 process (32bit):true
          Commandline:wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://cdn.itsupport247.net/InstallJunoAgent/Plugin/Windows/platform-version-plugin/1.0.343/platform_version_plugin_windows32_1.0.343.'
          Imagebase:0x400000
          File size:3895184 bytes
          MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          Disassembly

          Code Analysis