Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://destinoseconomicos-latam.com/

Overview

General Information

Sample URL:https://destinoseconomicos-latam.com/
Analysis ID:1522034
Tags:openphish
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Stores files to the Windows start menu directory
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • chrome.exe (PID: 1120 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5816 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2004,i,11335595415186685517,3390655710223039559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6788 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://destinoseconomicos-latam.com/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://destinoseconomicos-latam.com/SlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49719 version: TLS 1.0
Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49719 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: destinoseconomicos-latam.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: classification engineClassification label: mal48.win@19/6@12/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2004,i,11335595415186685517,3390655710223039559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://destinoseconomicos-latam.com/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2004,i,11335595415186685517,3390655710223039559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://destinoseconomicos-latam.com/100%SlashNextCredential Stealing type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.184.206
truefalse
    unknown
    www.google.com
    142.250.186.132
    truefalse
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        destinoseconomicos-latam.com
        unknown
        unknownfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.250.186.132
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.5
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1522034
          Start date and time:2024-09-29 07:36:28 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 1m 51s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://destinoseconomicos-latam.com/
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@19/6@12/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 216.58.206.67, 142.250.184.206, 108.177.15.84, 34.104.35.123, 184.28.90.27, 13.85.23.86, 93.184.221.240, 192.229.221.95, 52.165.164.15
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: https://destinoseconomicos-latam.com/
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Sep 29 04:37:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.978095653635653
          Encrypted:false
          SSDEEP:48:83dbTDnSHgidAKZdA19ehwiZUklqehNy+3:8Z3ZKy
          MD5:3F6DDA51FF4EF7CCAE02A85A1EC03F07
          SHA1:E327F4B537905E6818968778610CDD6C0CE3E218
          SHA-256:06C4F65F9D17D6A3770D00B471CA18BC2C041798A82F6579E1D063AF75EAE2BC
          SHA-512:82FD0BFB98E15A936E898BD4D0123F287F56B7468CB98DC9234863B1292988696CF5C52E7C3787325747CA900BC5478EE1614F8C9A94558F8E42197A769CC769
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,........1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I=Y.,....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=Y.,....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=Y.,....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=Y.,..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=Y.,...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............e:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Sep 29 04:37:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):3.9933000550466895
          Encrypted:false
          SSDEEP:48:8UdbTDnSHgidAKZdA1weh/iZUkAQkqeh6y+2:843L9Q/y
          MD5:7457EE0906519FD4C014484BA3301ADB
          SHA1:4A4BC7F2F8ED66E55FC5A8D1E8ACC70334626F09
          SHA-256:E8AC088B1FA07737F17A9CC7B62D588BDD5E33E7CDDF1777C87BB483AD99A4C6
          SHA-512:6419567D876298D31D4E82638764246120F21A8FA1BE00E48BA5986B5784FBB8440187104A08CFBCD5025228FF1F1F3DBA3811B8A0C7818622DF80B15DAB49E5
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,........1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I=Y.,....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=Y.,....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=Y.,....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=Y.,..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=Y.,...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............e:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2693
          Entropy (8bit):4.0054205721203795
          Encrypted:false
          SSDEEP:48:8xYdbTDnsHgidAKZdA14tseh7sFiZUkmgqeh7s8y+BX:8xc3ln2y
          MD5:6E0EF5C736E132B655176F4F49DB1E9F
          SHA1:3D0AACFFEC4C90697C02A32780EF17E8013A90A6
          SHA-256:C84F49EC55F603EA7B5C0D6A814D4DB472054B079161553A11B85665F1AFEE31
          SHA-512:551861BF50CD41F4C460CAD069A29563449EED7E3222672F4B9E0453653DCBDDDDD5E201C4575A623BF5B8849EE9BEBD7840B5B30D3A5CF50D50AABCBAF7D4F4
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I=Y.,....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=Y.,....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=Y.,....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=Y.,..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............e:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Sep 29 04:37:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.992770352672949
          Encrypted:false
          SSDEEP:48:80dbTDnSHgidAKZdA1vehDiZUkwqehOy+R:8Y3I0y
          MD5:2AB5B4B3796FAC20A62C48DF07203351
          SHA1:2286710CB5E175F4E09A66BF49E31731EFF261EB
          SHA-256:80D31ECC99CD220C3D0AC241D753FCA3ED592E009EEB25C33205EC5F618B4FA3
          SHA-512:DE13FA7A6D1B412FDD97D03332E14ACFEDD0D7B155C948722294E1C3AC67B134965D0CC37EC8647729CF516C8AA26C7D8F69A9A948D222ED7A59D7C5C3FDD9FA
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,...../..1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I=Y.,....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=Y.,....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=Y.,....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=Y.,..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=Y.,...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............e:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Sep 29 04:37:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2681
          Entropy (8bit):3.98099909389738
          Encrypted:false
          SSDEEP:48:83dbTDnSHgidAKZdA1hehBiZUk1W1qehYy+C:8Z3Y94y
          MD5:045FA2E6027428B3EF5F75EB76B06FBA
          SHA1:9A754CBD144FBD4CB84E13856CD7493F3485C01D
          SHA-256:5D9382BEA879E6D4C031BBEE3CFBCFC065887984C33D9527331D20C10942D166
          SHA-512:C26BE8B314680EE0759B9ADE662567BE4D1BE68824A325F92D8961DD959BED7450128B9D9D9172F00F62475E7F0F1CFC698EA3B071B4A4EA0551ABF1122D26D3
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,....Y...1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I=Y.,....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=Y.,....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=Y.,....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=Y.,..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=Y.,...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............e:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Sep 29 04:37:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2683
          Entropy (8bit):3.990456535891489
          Encrypted:false
          SSDEEP:48:8WdbTDnSHgidAKZdA1duT+ehOuTbbiZUk5OjqehOuTb2y+yT+:8+32T/TbxWOvTb2y7T
          MD5:3041BF0C6114F1402270FAD1EC78E3F3
          SHA1:CB4A071024722E81965C5189D65F5F3869446199
          SHA-256:6558AB27BE4D0A090DB98623FC0E0631FFBADCE4D40AFD3B04032991EBB9A908
          SHA-512:9BF148634F414991F44782B79EA659F409E003E2F8C186D884DA3902419DEB5E64FADBDC7F7743941311A6A863AEB110F51352882505CBA2C15435BCAE7F94FE
          Malicious:false
          Reputation:low
          Preview:L..................F.@.. ...$+.,.......1...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I=Y.,....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=Y.,....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=Y.,....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=Y.,..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=Y.,...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............e:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Sep 29, 2024 07:37:14.247080088 CEST49674443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:14.247092962 CEST49675443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:14.340832949 CEST49673443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:23.852503061 CEST49674443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:23.852520943 CEST49675443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:23.947587967 CEST49673443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:24.968489885 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:24.968583107 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:24.968683004 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:24.969175100 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:24.969225883 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:25.591409922 CEST4434970323.1.237.91192.168.2.5
          Sep 29, 2024 07:37:25.591516972 CEST49703443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:25.624160051 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:25.645078897 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:25.645133972 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:25.646732092 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:25.646837950 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:25.652992010 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:25.653105021 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:25.694797039 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:25.694822073 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:25.741678953 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:35.533190012 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:35.533260107 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:35.533400059 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:36.676786900 CEST49703443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:36.676901102 CEST49703443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:36.681699991 CEST4434970323.1.237.91192.168.2.5
          Sep 29, 2024 07:37:36.681730986 CEST4434970323.1.237.91192.168.2.5
          Sep 29, 2024 07:37:36.700582981 CEST49719443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:36.700658083 CEST4434971923.1.237.91192.168.2.5
          Sep 29, 2024 07:37:36.701080084 CEST49719443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:36.701463938 CEST49719443192.168.2.523.1.237.91
          Sep 29, 2024 07:37:36.701498985 CEST4434971923.1.237.91192.168.2.5
          Sep 29, 2024 07:37:36.885092974 CEST49711443192.168.2.5142.250.186.132
          Sep 29, 2024 07:37:36.885135889 CEST44349711142.250.186.132192.168.2.5
          Sep 29, 2024 07:37:37.294667006 CEST4434971923.1.237.91192.168.2.5
          Sep 29, 2024 07:37:37.294878960 CEST49719443192.168.2.523.1.237.91
          TimestampSource PortDest PortSource IPDest IP
          Sep 29, 2024 07:37:20.404906034 CEST53495471.1.1.1192.168.2.5
          Sep 29, 2024 07:37:20.678028107 CEST53494821.1.1.1192.168.2.5
          Sep 29, 2024 07:37:21.812024117 CEST53551441.1.1.1192.168.2.5
          Sep 29, 2024 07:37:22.321757078 CEST4956953192.168.2.51.1.1.1
          Sep 29, 2024 07:37:22.321908951 CEST5991953192.168.2.51.1.1.1
          Sep 29, 2024 07:37:22.445694923 CEST53599191.1.1.1192.168.2.5
          Sep 29, 2024 07:37:22.447061062 CEST53495691.1.1.1192.168.2.5
          Sep 29, 2024 07:37:22.447845936 CEST6161053192.168.2.51.1.1.1
          Sep 29, 2024 07:37:22.571183920 CEST53616101.1.1.1192.168.2.5
          Sep 29, 2024 07:37:22.624447107 CEST5335553192.168.2.58.8.8.8
          Sep 29, 2024 07:37:22.624690056 CEST5428453192.168.2.51.1.1.1
          Sep 29, 2024 07:37:22.631202936 CEST53533558.8.8.8192.168.2.5
          Sep 29, 2024 07:37:22.631409883 CEST53542841.1.1.1192.168.2.5
          Sep 29, 2024 07:37:23.623697996 CEST6053853192.168.2.51.1.1.1
          Sep 29, 2024 07:37:23.624063969 CEST4981453192.168.2.51.1.1.1
          Sep 29, 2024 07:37:23.653759003 CEST53498141.1.1.1192.168.2.5
          Sep 29, 2024 07:37:23.747108936 CEST53605381.1.1.1192.168.2.5
          Sep 29, 2024 07:37:24.900304079 CEST6018253192.168.2.51.1.1.1
          Sep 29, 2024 07:37:24.900793076 CEST6399653192.168.2.51.1.1.1
          Sep 29, 2024 07:37:24.906997919 CEST53601821.1.1.1192.168.2.5
          Sep 29, 2024 07:37:24.907341957 CEST53639961.1.1.1192.168.2.5
          Sep 29, 2024 07:37:28.770102024 CEST5576753192.168.2.51.1.1.1
          Sep 29, 2024 07:37:28.770668983 CEST5815953192.168.2.51.1.1.1
          Sep 29, 2024 07:37:28.932364941 CEST53557671.1.1.1192.168.2.5
          Sep 29, 2024 07:37:28.977364063 CEST5346853192.168.2.51.1.1.1
          Sep 29, 2024 07:37:29.048357964 CEST53581591.1.1.1192.168.2.5
          Sep 29, 2024 07:37:29.097371101 CEST53534681.1.1.1192.168.2.5
          Sep 29, 2024 07:37:38.795970917 CEST53611571.1.1.1192.168.2.5
          TimestampSource IPDest IPChecksumCodeType
          Sep 29, 2024 07:37:29.048444033 CEST192.168.2.51.1.1.1c23c(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Sep 29, 2024 07:37:22.321757078 CEST192.168.2.51.1.1.10x53a8Standard query (0)destinoseconomicos-latam.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:22.321908951 CEST192.168.2.51.1.1.10xe06Standard query (0)destinoseconomicos-latam.com65IN (0x0001)false
          Sep 29, 2024 07:37:22.447845936 CEST192.168.2.51.1.1.10x437cStandard query (0)destinoseconomicos-latam.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:22.624447107 CEST192.168.2.58.8.8.80x1a57Standard query (0)google.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:22.624690056 CEST192.168.2.51.1.1.10x9fc9Standard query (0)google.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:23.623697996 CEST192.168.2.51.1.1.10x8fb4Standard query (0)destinoseconomicos-latam.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:23.624063969 CEST192.168.2.51.1.1.10x9261Standard query (0)destinoseconomicos-latam.com65IN (0x0001)false
          Sep 29, 2024 07:37:24.900304079 CEST192.168.2.51.1.1.10x581bStandard query (0)www.google.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:24.900793076 CEST192.168.2.51.1.1.10xe04fStandard query (0)www.google.com65IN (0x0001)false
          Sep 29, 2024 07:37:28.770102024 CEST192.168.2.51.1.1.10x4d88Standard query (0)destinoseconomicos-latam.comA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:28.770668983 CEST192.168.2.51.1.1.10xf301Standard query (0)destinoseconomicos-latam.com65IN (0x0001)false
          Sep 29, 2024 07:37:28.977364063 CEST192.168.2.51.1.1.10x79c9Standard query (0)destinoseconomicos-latam.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Sep 29, 2024 07:37:22.445694923 CEST1.1.1.1192.168.2.50xe06Name error (3)destinoseconomicos-latam.comnonenone65IN (0x0001)false
          Sep 29, 2024 07:37:22.447061062 CEST1.1.1.1192.168.2.50x53a8Name error (3)destinoseconomicos-latam.comnonenoneA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:22.571183920 CEST1.1.1.1192.168.2.50x437cName error (3)destinoseconomicos-latam.comnonenoneA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:22.631202936 CEST8.8.8.8192.168.2.50x1a57No error (0)google.com142.250.184.206A (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:22.631409883 CEST1.1.1.1192.168.2.50x9fc9No error (0)google.com142.250.184.206A (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:23.653759003 CEST1.1.1.1192.168.2.50x9261Name error (3)destinoseconomicos-latam.comnonenone65IN (0x0001)false
          Sep 29, 2024 07:37:23.747108936 CEST1.1.1.1192.168.2.50x8fb4Name error (3)destinoseconomicos-latam.comnonenoneA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:24.906997919 CEST1.1.1.1192.168.2.50x581bNo error (0)www.google.com142.250.186.132A (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:24.907341957 CEST1.1.1.1192.168.2.50xe04fNo error (0)www.google.com65IN (0x0001)false
          Sep 29, 2024 07:37:28.932364941 CEST1.1.1.1192.168.2.50x4d88Name error (3)destinoseconomicos-latam.comnonenoneA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:29.048357964 CEST1.1.1.1192.168.2.50xf301Name error (3)destinoseconomicos-latam.comnonenone65IN (0x0001)false
          Sep 29, 2024 07:37:29.097371101 CEST1.1.1.1192.168.2.50x79c9Name error (3)destinoseconomicos-latam.comnonenoneA (IP address)IN (0x0001)false
          Sep 29, 2024 07:37:35.961000919 CEST1.1.1.1192.168.2.50xe475No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Sep 29, 2024 07:37:35.961000919 CEST1.1.1.1192.168.2.50xe475No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:01:37:15
          Start date:29/09/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:01:37:19
          Start date:29/09/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2004,i,11335595415186685517,3390655710223039559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:01:37:21
          Start date:29/09/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://destinoseconomicos-latam.com/"
          Imagebase:0x7ff715980000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly