Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com

Overview

General Information

Sample URL:http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com
Analysis ID:1501608
Infos:
Errors
  • URL not reachable

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Stores files to the Windows start menu directory
URL contains potential PII (phishing indication)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 1812 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5820 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2136,i,9428874624911263863,9461454333157918533,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 5028 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.comSample URL: PII: r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49720 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: welcome.americanexpress.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: unknown1.win@19/6@16/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2136,i,9428874624911263863,9461454333157918533,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2136,i,9428874624911263863,9461454333157918533,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
www.google.com0%VirustotalBrowse
google.com0%VirustotalBrowse
welcome.americanexpress.com0%VirustotalBrowse
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.185.110
truefalseunknown
www.google.com
216.58.206.68
truefalseunknown
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalseunknown
welcome.americanexpress.com
unknown
unknownfalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
239.255.255.250
unknownReserved
unknownunknownfalse
216.58.206.68
www.google.comUnited States
15169GOOGLEUSfalse
IP
192.168.2.5
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501608
Start date and time:2024-08-30 07:52:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown1.win@19/6@16/3
Cookbook Comments:
  • URL browsing timeout or error
  • URL not reachable
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 216.58.212.131, 142.250.181.238, 74.125.206.84, 34.104.35.123, 184.28.90.27, 20.114.59.183, 93.184.221.240, 192.229.221.95, 20.166.126.56
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtSetInformationFile calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Program Files\Google\Chrome\Application\chrome.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Aug 30 04:52:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
Category:dropped
Size (bytes):2677
Entropy (8bit):3.9782968815606035
Encrypted:false
SSDEEP:48:8KdOTq+QHpidAKZdA19ehwiZUklqehly+3:8bnCmy
MD5:CC8EF506D97767A8CE15F507BDE9BE2C
SHA1:0A580E5645C23FC4A2FA9806D7D63970CE8BFC92
SHA-256:058ACD831594F13D2D717D4B30AA83E5CB9E882391C86AF099EF8C1DF39F200C
SHA-512:AED0DCBAAA137F61E3AFA158C1A159AB945A44378207B3842F8E3C5F654AF51EA3908C65A4ED253A8E40304C6BCD5C7F6A31814C07BB6091D1626F3E5D267E89
Malicious:false
Reputation:low
Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Y......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............Vi......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
Process:C:\Program Files\Google\Chrome\Application\chrome.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Aug 30 04:52:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
Category:dropped
Size (bytes):2679
Entropy (8bit):3.992131778931199
Encrypted:false
SSDEEP:48:8IdOTq+QHpidAKZdA1weh/iZUkAQkqehWy+2:85nY9Q/y
MD5:D05E3FA5A56F1B72CE24CE9E642B05E7
SHA1:5079FA956E277A51C211BA3978F5ED78A872D31B
SHA-256:26A389B24D6BD06142522852A8F3B4A55F86A2F490910ADBD0851A34DCBBCA60
SHA-512:E7467A8CA42073FB31C11726D2E37414CB84ACB9194B7FB2E1B0A282AD15E9DE86A42EBC46A6D91B050AD0A0D7710B4F469881B9F7A36B42F8365E7487E9D04A
Malicious:false
Reputation:low
Preview:L..................F.@.. ...$+.,..........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Y......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............Vi......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
Process:C:\Program Files\Google\Chrome\Application\chrome.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
Category:dropped
Size (bytes):2693
Entropy (8bit):4.003495304724097
Encrypted:false
SSDEEP:48:8xfdOTq+sHpidAKZdA14tseh7sFiZUkmgqeh7sYy+BX:8xInUniy
MD5:88271D83E70F54E8DF9827C852AE888E
SHA1:EC11AD3A11C6D2DF28A9A175EA108DF34D841932
SHA-256:F18253C79A140E192E0729D2A11360C761926E8548CB601A280C3B6C747DD720
SHA-512:B3E0DB55A1C764AD339E371D5A1A73748FD9874B170F11DA1C68E62B66E9DD4BA50A9F4A6FF13CAC0E8197AA39899F9E834F158424B9D775A86A13C0CFD1CAB0
Malicious:false
Reputation:low
Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Y......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............Vi......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
Process:C:\Program Files\Google\Chrome\Application\chrome.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Aug 30 04:52:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
Category:dropped
Size (bytes):2681
Entropy (8bit):3.988408777631163
Encrypted:false
SSDEEP:48:86dOTq+QHpidAKZdA1vehDiZUkwqehKy+R:8rnDAy
MD5:F8D56C89AF756BE6F4ADF51BBFA7BBDF
SHA1:4A4BD9A5D8B54B61B6D8021AE0C09C92D66CB896
SHA-256:C90FCD58EC9F1AFBE5EE91AAB75256289BAF816AA33715CAD21FBA1866CEADD2
SHA-512:2F69D646D822CA9C2E8AE2D086B7365E0DBA017F7E122FB305A5AAE89B09AC3B1B7EB00B78D292BBDF0DD25978A2F38C6D97D386794ED12263C0C3C110C025E0
Malicious:false
Reputation:low
Preview:L..................F.@.. ...$+.,....Lc.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Y......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............Vi......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
Process:C:\Program Files\Google\Chrome\Application\chrome.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Aug 30 04:52:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
Category:dropped
Size (bytes):2681
Entropy (8bit):3.9800378903722584
Encrypted:false
SSDEEP:48:8XdOTq+QHpidAKZdA1hehBiZUk1W1qehky+C:8wnT9Ey
MD5:78A9E864FC542E6917BE0D757AF63E2F
SHA1:B99C469DF10F615E18D7A211C524B11FB1ECC776
SHA-256:2CD669007A257B89C0DB9F6A5103E0C9BF23213D471B934250969EC5F50C9E16
SHA-512:310A389B4E98A7557961F770F5E54A942A5ECBF6C5A29400436DEA384AC148CDE6572783D49DC59D21A5FCCD7B52EBB4DE5B7397F73C9A1D17F44148285622E9
Malicious:false
Reputation:low
Preview:L..................F.@.. ...$+.,....;......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Y......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............Vi......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
Process:C:\Program Files\Google\Chrome\Application\chrome.exe
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Aug 30 04:52:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
Category:dropped
Size (bytes):2683
Entropy (8bit):3.9903735879541706
Encrypted:false
SSDEEP:48:85idOTq+QHpidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbiy+yT+:8NnDT/TbxWOvTbiy7T
MD5:CF50102000526F6AF6D22FDCC9A2CDA6
SHA1:61D64B1A0131802B75817062EB24CAC2DCC21F9A
SHA-256:6C451995188DBFC24A7D79BF78610645FA25E540BB94D60B047DA4B7BC40C855
SHA-512:096E4E4C89AF0CEE940B97B398D39267CE3534D726007B42044870B44A0F6E986D1BC77216A1BD9EC00478D1091B2A22F3678552D89A1F562F35AB8FFDF02A9C
Malicious:false
Reputation:low
Preview:L..................F.@.. ...$+.,...."[.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.Y......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............Vi......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
No static file info
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 07:52:51.601346016 CEST49675443192.168.2.523.1.237.91
Aug 30, 2024 07:52:51.601346016 CEST49674443192.168.2.523.1.237.91
Aug 30, 2024 07:52:51.741920948 CEST49673443192.168.2.523.1.237.91
Aug 30, 2024 07:53:01.213368893 CEST49675443192.168.2.523.1.237.91
Aug 30, 2024 07:53:01.214030027 CEST49674443192.168.2.523.1.237.91
Aug 30, 2024 07:53:01.353992939 CEST49673443192.168.2.523.1.237.91
Aug 30, 2024 07:53:01.920902967 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:01.920927048 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:01.921026945 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:01.927357912 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:01.927372932 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:02.559256077 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:02.559855938 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:02.559886932 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:02.561223030 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:02.561285019 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:02.562669039 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:02.562735081 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:02.604628086 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:02.604643106 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:02.651500940 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:02.976653099 CEST4434970323.1.237.91192.168.2.5
Aug 30, 2024 07:53:02.976756096 CEST49703443192.168.2.523.1.237.91
Aug 30, 2024 07:53:12.458909988 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:12.458971977 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:12.459017992 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:13.827426910 CEST49711443192.168.2.5216.58.206.68
Aug 30, 2024 07:53:13.827457905 CEST44349711216.58.206.68192.168.2.5
Aug 30, 2024 07:53:13.883815050 CEST49703443192.168.2.523.1.237.91
Aug 30, 2024 07:53:13.884067059 CEST49703443192.168.2.523.1.237.91
Aug 30, 2024 07:53:13.884530067 CEST49720443192.168.2.523.1.237.91
Aug 30, 2024 07:53:13.884562016 CEST4434972023.1.237.91192.168.2.5
Aug 30, 2024 07:53:13.884618998 CEST49720443192.168.2.523.1.237.91
Aug 30, 2024 07:53:13.887622118 CEST49720443192.168.2.523.1.237.91
Aug 30, 2024 07:53:13.887638092 CEST4434972023.1.237.91192.168.2.5
Aug 30, 2024 07:53:13.888628960 CEST4434970323.1.237.91192.168.2.5
Aug 30, 2024 07:53:13.888820887 CEST4434970323.1.237.91192.168.2.5
Aug 30, 2024 07:53:14.511389017 CEST4434972023.1.237.91192.168.2.5
Aug 30, 2024 07:53:14.511457920 CEST49720443192.168.2.523.1.237.91
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 07:52:57.252887964 CEST53532571.1.1.1192.168.2.5
Aug 30, 2024 07:52:57.308677912 CEST53650471.1.1.1192.168.2.5
Aug 30, 2024 07:52:58.272929907 CEST53593421.1.1.1192.168.2.5
Aug 30, 2024 07:52:59.186460018 CEST6245253192.168.2.51.1.1.1
Aug 30, 2024 07:52:59.186677933 CEST6039253192.168.2.51.1.1.1
Aug 30, 2024 07:52:59.197145939 CEST53624521.1.1.1192.168.2.5
Aug 30, 2024 07:52:59.205574036 CEST53603921.1.1.1192.168.2.5
Aug 30, 2024 07:52:59.206737995 CEST5424453192.168.2.51.1.1.1
Aug 30, 2024 07:52:59.216872931 CEST53542441.1.1.1192.168.2.5
Aug 30, 2024 07:52:59.273077011 CEST5171653192.168.2.58.8.8.8
Aug 30, 2024 07:52:59.273332119 CEST5079653192.168.2.51.1.1.1
Aug 30, 2024 07:52:59.280148029 CEST53507961.1.1.1192.168.2.5
Aug 30, 2024 07:52:59.280194998 CEST53517168.8.8.8192.168.2.5
Aug 30, 2024 07:53:00.279262066 CEST5884853192.168.2.51.1.1.1
Aug 30, 2024 07:53:00.279486895 CEST6067853192.168.2.51.1.1.1
Aug 30, 2024 07:53:00.290051937 CEST53588481.1.1.1192.168.2.5
Aug 30, 2024 07:53:00.290157080 CEST53606781.1.1.1192.168.2.5
Aug 30, 2024 07:53:00.313091993 CEST6050453192.168.2.51.1.1.1
Aug 30, 2024 07:53:00.313360929 CEST5878953192.168.2.51.1.1.1
Aug 30, 2024 07:53:00.320096970 CEST53605041.1.1.1192.168.2.5
Aug 30, 2024 07:53:00.334125042 CEST53587891.1.1.1192.168.2.5
Aug 30, 2024 07:53:01.906229019 CEST5209653192.168.2.51.1.1.1
Aug 30, 2024 07:53:01.906714916 CEST5725553192.168.2.51.1.1.1
Aug 30, 2024 07:53:01.914134026 CEST53572551.1.1.1192.168.2.5
Aug 30, 2024 07:53:01.914155006 CEST53520961.1.1.1192.168.2.5
Aug 30, 2024 07:53:05.391891956 CEST5430153192.168.2.51.1.1.1
Aug 30, 2024 07:53:05.392061949 CEST6354453192.168.2.51.1.1.1
Aug 30, 2024 07:53:05.410356045 CEST53635441.1.1.1192.168.2.5
Aug 30, 2024 07:53:05.418148994 CEST53543011.1.1.1192.168.2.5
Aug 30, 2024 07:53:05.430758953 CEST6526353192.168.2.51.1.1.1
Aug 30, 2024 07:53:05.442588091 CEST53652631.1.1.1192.168.2.5
Aug 30, 2024 07:53:05.450207949 CEST6037453192.168.2.51.1.1.1
Aug 30, 2024 07:53:05.450376034 CEST6305853192.168.2.51.1.1.1
Aug 30, 2024 07:53:05.461150885 CEST53630581.1.1.1192.168.2.5
Aug 30, 2024 07:53:05.468817949 CEST53603741.1.1.1192.168.2.5
Aug 30, 2024 07:53:15.160439014 CEST53523151.1.1.1192.168.2.5
TimestampSource IPDest IPChecksumCodeType
Aug 30, 2024 07:52:59.206785917 CEST192.168.2.51.1.1.1c22e(Port unreachable)Destination Unreachable
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Aug 30, 2024 07:52:59.186460018 CEST192.168.2.51.1.1.10x28d3Standard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:52:59.186677933 CEST192.168.2.51.1.1.10x4aeaStandard query (0)welcome.americanexpress.com65IN (0x0001)false
Aug 30, 2024 07:52:59.206737995 CEST192.168.2.51.1.1.10x2406Standard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:52:59.273077011 CEST192.168.2.58.8.8.80xd39aStandard query (0)google.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:52:59.273332119 CEST192.168.2.51.1.1.10x6bcaStandard query (0)google.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:00.279262066 CEST192.168.2.51.1.1.10xe1faStandard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:00.279486895 CEST192.168.2.51.1.1.10x40eaStandard query (0)welcome.americanexpress.com65IN (0x0001)false
Aug 30, 2024 07:53:00.313091993 CEST192.168.2.51.1.1.10x870Standard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:00.313360929 CEST192.168.2.51.1.1.10xa793Standard query (0)welcome.americanexpress.com65IN (0x0001)false
Aug 30, 2024 07:53:01.906229019 CEST192.168.2.51.1.1.10x981cStandard query (0)www.google.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:01.906714916 CEST192.168.2.51.1.1.10xa3f4Standard query (0)www.google.com65IN (0x0001)false
Aug 30, 2024 07:53:05.391891956 CEST192.168.2.51.1.1.10x763bStandard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:05.392061949 CEST192.168.2.51.1.1.10xbcdbStandard query (0)welcome.americanexpress.com65IN (0x0001)false
Aug 30, 2024 07:53:05.430758953 CEST192.168.2.51.1.1.10x9842Standard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:05.450207949 CEST192.168.2.51.1.1.10xf614Standard query (0)welcome.americanexpress.comA (IP address)IN (0x0001)false
Aug 30, 2024 07:53:05.450376034 CEST192.168.2.51.1.1.10x3c11Standard query (0)welcome.americanexpress.com65IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Aug 30, 2024 07:52:59.280148029 CEST1.1.1.1192.168.2.50x6bcaNo error (0)google.com142.250.185.110A (IP address)IN (0x0001)false
Aug 30, 2024 07:52:59.280194998 CEST8.8.8.8192.168.2.50xd39aNo error (0)google.com142.251.37.14A (IP address)IN (0x0001)false
Aug 30, 2024 07:53:01.914134026 CEST1.1.1.1192.168.2.50xa3f4No error (0)www.google.com65IN (0x0001)false
Aug 30, 2024 07:53:01.914155006 CEST1.1.1.1192.168.2.50x981cNo error (0)www.google.com216.58.206.68A (IP address)IN (0x0001)false
Aug 30, 2024 07:53:13.109555006 CEST1.1.1.1192.168.2.50x4007No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
Aug 30, 2024 07:53:13.109555006 CEST1.1.1.1192.168.2.50x4007No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:52:52
Start date:30/08/2024
Path:C:\Program Files\Google\Chrome\Application\chrome.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Imagebase:0x7ff715980000
File size:3'242'272 bytes
MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:2
Start time:01:52:55
Start date:30/08/2024
Path:C:\Program Files\Google\Chrome\Application\chrome.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2136,i,9428874624911263863,9461454333157918533,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Imagebase:0x7ff715980000
File size:3'242'272 bytes
MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:3
Start time:01:52:57
Start date:30/08/2024
Path:C:\Program Files\Google\Chrome\Application\chrome.exe
Wow64 process (32bit):false
Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://r_ae0c4d7a80ab726de0286811_2_c.americanexpress@welcome.americanexpress.com"
Imagebase:0x7ff715980000
File size:3'242'272 bytes
MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

No disassembly