Windows
Analysis Report
http://www.tobramedical.com
Overview
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
chrome.exe (PID: 5720 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized --sin gle-argume nt http:// www.tobram edical.com / MD5: 7BC7B4AEDC055BB02BCB52710132E9E1) conhost.exe (PID: 3176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F) chrome.exe (PID: 6156 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pl atform-cha nnel-handl e=2112 --f ield-trial -handle=18 56,i,34604 3372410630 3124,14854 7530421349 70485,1310 72 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationTarg etPredicti on /prefet ch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1) chrome.exe (PID: 1868 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= audio.mojo m.AudioSer vice --lan g=en-US -- service-sa ndbox-type =audio -- mojo-platf orm-channe l-handle=5 988 --fiel d-trial-ha ndle=1856, i,34604337 2410630312 4,14854753 0421349704 85,131072 --disable- features=O ptimizatio nGuideMode lDownloadi ng,Optimiz ationHints ,Optimizat ionTargetP rediction /prefetch: 8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
wscript.exe (PID: 7068 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\eyup\A ppData\Loc al\Temp\Te mp1_U?date Inst?ller. zip\Versio n.105.5374 .38.js" MD5: 563EDAE37876138FDFF47F3E7A9A78FD)
wscript.exe (PID: 7092 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\eyup\A ppData\Loc al\Temp\Te mp1_U?date Inst?ller. zip\Versio n.105.5374 .38.js" MD5: 563EDAE37876138FDFF47F3E7A9A78FD)
- cleanup
Timestamp: | 62.233.50.75192.168.2.2443498042852970 03/02/23-21:01:17.951743 |
SID: | 2852970 |
Source Port: | 443 |
Destination Port: | 49804 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 88.119.169.146192.168.2.2443498182852898 03/02/23-21:01:22.541811 |
SID: | 2852898 |
Source Port: | 443 |
Destination Port: | 49818 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.21.1.1.152968532042998 03/02/23-21:01:18.196826 |
SID: | 2042998 |
Source Port: | 52968 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 62.233.50.75192.168.2.2443498042853529 03/02/23-21:01:17.951776 |
SID: | 2853529 |
Source Port: | 443 |
Destination Port: | 49804 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.21.1.1.154552532044369 03/02/23-21:01:51.622507 |
SID: | 2044369 |
Source Port: | 54552 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.21.1.1.155981532043159 03/02/23-21:01:16.431307 |
SID: | 2043159 |
Source Port: | 55981 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.21.1.1.149378532044369 03/02/23-21:02:26.600778 |
SID: | 2044369 |
Source Port: | 49378 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Memory has grown: |
Networking |
---|
Source: | Network Connect: |
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Key opened: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | File read: | ||
Source: | File read: | ||
Source: | File read: | ||
Source: | File read: |
Source: | File created: |
Source: | File created: |
Source: | Window detected: |
Source: | Directory created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window found: | ||
Source: | Window found: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: |
Source: | Key value queried: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Scripting | Path Interception | 11 Process Injection | 3 Masquerading | OS Credential Dumping | 2 System Information Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 11 Process Injection | LSASS Memory | 1 Remote System Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 2 Non-Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Scripting | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 3 Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Extra Window Memory Injection | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 1 Ingress Tool Transfer | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
stats.wp.com | 192.0.76.3 | true | false | high | |
secure.gravatar.com | 192.0.73.2 | true | false | high | |
accounts.google.com | 172.217.16.205 | true | false | high | |
kinematics.starmidwest.com | 141.255.161.75 | true | false | unknown | |
office.cdsigner.com | 88.119.169.146 | true | true | unknown | |
www.tobramedical.com | 104.21.20.139 | true | false | unknown | |
youtube-ui.l.google.com | 142.250.184.206 | true | false | high | |
pixel.wp.com | 192.0.76.3 | true | false | high | |
lb.wordpress.com | 192.0.78.12 | true | false | high | |
www.google.com | 142.250.184.228 | true | false | high | |
clients.l.google.com | 142.250.184.206 | true | false | high | |
tobramedical.com | 104.21.20.139 | true | false | unknown | |
jqueryns.com | 62.233.50.75 | true | true | unknown | |
clients2.google.com | unknown | unknown | false | high | |
code.jquery.com | unknown | unknown | false | high | |
www.youtube.com | unknown | unknown | false | high | |
v0.wordpress.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | low | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.67 | unknown | United States | 15169 | GOOGLEUS | false | |
34.104.35.123 | unknown | United States | 15169 | GOOGLEUS | false | |
88.119.169.146 | office.cdsigner.com | Lithuania | 61272 | IST-ASLT | true | |
172.217.16.205 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
193.243.147.167 | unknown | Poland | 3246 | TDCSONGTele2BusinessTDCSwedenSE | true | |
192.0.76.3 | stats.wp.com | United States | 2635 | AUTOMATTICUS | false | |
141.255.161.75 | kinematics.starmidwest.com | Switzerland | 51852 | PLI-ASCH | false | |
216.239.32.36 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.185.227 | unknown | United States | 15169 | GOOGLEUS | false | |
62.233.50.75 | jqueryns.com | unknown | 15583 | DivisionWRSBE | true | |
69.16.175.42 | unknown | United States | 20446 | HIGHWINDS3US | false | |
104.21.20.139 | www.tobramedical.com | United States | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.251.143.35 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.164 | unknown | United States | 15169 | GOOGLEUS | false | |
172.67.192.242 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.184.227 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.184.206 | youtube-ui.l.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.186.136 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.184.234 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.16.142 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.1 |
127.0.0.1 |
Joe Sandbox Version: | 37.0.0 Beryl |
Analysis ID: | 17679 |
Start date and time: | 2023-03-02 21:00:28 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | http://www.tobramedical.com |
Analysis system description: | Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip) |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal56.evad.win@34/2@16/235 |
- Exclude process from analysis
(whitelisted): audiodg.exe, SI HClient.exe, SgrmBroker.exe, s vchost.exe - Excluded IPs from analysis (wh
itelisted): 20.190.159.73, 40. 126.31.67, 20.190.159.71, 20.1 90.159.4, 20.190.159.68, 40.12 6.31.73, 40.126.31.69, 20.190. 159.0, 142.250.186.67, 34.104. 35.123, 69.16.175.42, 69.16.17 5.10, 172.217.16.142, 142.250. 184.234, 142.250.186.99, 142.2 50.185.227, 142.250.184.202, 1 42.250.186.136, 216.239.32.36, 216.239.34.36 - Excluded domains from analysis
(whitelisted): cds.s5x3j6q5.h wcdn.net, fonts.googleapis.com , slscr.update.microsoft.com, fonts.gstatic.com, clientservi ces.googleapis.com, login.msa. msidentity.com, www.tm.a.prd.a adg.trafficmanager.net, region 1.google-analytics.com, prda.a adg.msidentity.com, edgedl.me. gvt1.com, login.live.com, www. googletagmanager.com, www.tm.l g.prod.aadmsa.trafficmanager.n et, www.google-analytics.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9678 |
Entropy (8bit): | 7.972642419979499 |
Encrypted: | false |
SSDEEP: | |
MD5: | D999FAA9097C1E579FB6BE6BE2C70CED |
SHA1: | EF6DB3BDFA7421E656A0775F72AFE1C0AC9110D8 |
SHA-256: | 8C82E5858B1056CE9CC68C5B057F1AC47745B6EC7C293EE45561DB262B523F6B |
SHA-512: | 92D2207F1BB0DFF1BD1A583E21537A58955125A3FC5E89DEC7272686C9E0FC7C6391D78F87BFFC3533714D9381DAE73AB3E8E45CC54B117548C71AD1CE0213C7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9678 |
Entropy (8bit): | 7.972642419979499 |
Encrypted: | false |
SSDEEP: | |
MD5: | D999FAA9097C1E579FB6BE6BE2C70CED |
SHA1: | EF6DB3BDFA7421E656A0775F72AFE1C0AC9110D8 |
SHA-256: | 8C82E5858B1056CE9CC68C5B057F1AC47745B6EC7C293EE45561DB262B523F6B |
SHA-512: | 92D2207F1BB0DFF1BD1A583E21537A58955125A3FC5E89DEC7272686C9E0FC7C6391D78F87BFFC3533714D9381DAE73AB3E8E45CC54B117548C71AD1CE0213C7 |
Malicious: | false |
Reputation: | low |
Preview: |