Edit tour

Windows Analysis Report
http://34.76.96.55

Overview

General Information

Sample URL:http://34.76.96.55
Analysis ID:17746

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6408 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://34.76.96.55/ MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • conhost.exe (PID: 6476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
    • chrome.exe (PID: 6624 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1904,i,3099747839567155641,6010464035654390520,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Source: unknownDNS traffic detected: queries for: accounts.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 34.76.96.55
Source: unknownTCP traffic detected without corresponding DNS query: 172.217.16.195
Source: unknownTCP traffic detected without corresponding DNS query: 172.217.16.195
Source: unknownTCP traffic detected without corresponding DNS query: 172.217.16.195
Source: unknownTCP traffic detected without corresponding DNS query: 172.217.16.195
Source: classification engineClassification label: clean0.win@31/0@4/121
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://34.76.96.55/
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1904,i,3099747839567155641,6010464035654390520,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1904,i,3099747839567155641,6010464035654390520,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://34.76.96.550%Avira URL Cloudsafe
http://34.76.96.554%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
142.250.184.205
truefalse
    high
    www.google.com
    142.250.184.228
    truefalse
      high
      clients.l.google.com
      142.250.181.238
      truefalse
        high
        clients2.google.com
        unknown
        unknownfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          142.250.181.238
          clients.l.google.comUnited States
          15169GOOGLEUSfalse
          34.104.35.123
          unknownUnited States
          15169GOOGLEUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          216.58.212.164
          unknownUnited States
          15169GOOGLEUSfalse
          172.217.18.3
          unknownUnited States
          15169GOOGLEUSfalse
          142.250.184.205
          accounts.google.comUnited States
          15169GOOGLEUSfalse
          142.250.186.100
          unknownUnited States
          15169GOOGLEUSfalse
          34.76.96.55
          unknownUnited States
          15169GOOGLEUSfalse
          172.217.16.195
          unknownUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.1
          127.0.0.1
          Joe Sandbox Version:37.0.0 Beryl
          Analysis ID:17746
          Start date and time:2023-03-03 17:47:29 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Sample URL:http://34.76.96.55
          Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean0.win@31/0@4/121
          • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.190.159.0, 20.190.159.23, 40.126.31.73, 20.190.159.71, 40.126.31.69, 40.126.31.71, 40.126.31.67, 20.190.159.75, 172.217.18.3, 34.104.35.123
          • Excluded domains from analysis (whitelisted): prda.aadg.msidentity.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, login.live.com, clientservices.googleapis.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          No created / dropped files found
          No static file info