Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.com

Overview

General Information

Sample URL:https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.com
Analysis ID:1533090
Infos:

Detection

Captcha Phish
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Yara detected Captcha Phish
Stores files to the Windows start menu directory
URL contains potential PII (phishing indication)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5232 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6012 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,11242851642936306301,11392960889638104959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6580 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
dropped/chromecache_61JoeSecurity_CaptchaPhish_2Yara detected Captcha PhishJoe Security
    SourceRuleDescriptionAuthorStrings
    1.1.pages.csvJoeSecurity_CaptchaPhish_2Yara detected Captcha PhishJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: atenasur.clVirustotal: Detection: 6%Perma Link

      Phishing

      barindex
      Source: Yara matchFile source: 1.1.pages.csv, type: HTML
      Source: Yara matchFile source: dropped/chromecache_61, type: DROPPED
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comSample URL: PII: james@domain.com
      Source: https://tiny-startupop.pl/OXHpn/#Djames@domain.comHTTP Parser: No favicon
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49707 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49723 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49730 version: TLS 1.2
      Source: chrome.exeMemory has grown: Private usage: 18MB later: 28MB
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /wp/ld//QjLtBRuVpCWi/james@domain.com HTTP/1.1Host: atenasur.clConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
      Source: global trafficDNS traffic detected: DNS query: www.google.com.pe
      Source: global trafficDNS traffic detected: DNS query: atenasur.cl
      Source: global trafficDNS traffic detected: DNS query: tiny-startupop.pl
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: blogger.googleusercontent.com
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49707 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49713 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49723 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49730 version: TLS 1.2
      Source: classification engineClassification label: mal56.phis.win@19/8@18/172
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,11242851642936306301,11392960889638104959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.com"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1884,i,11242851642936306301,11392960889638104959,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Extra Window Memory Injection
      1
      Extra Window Memory Injection
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      a.nel.cloudflare.com0%VirustotalBrowse
      atenasur.cl6%VirustotalBrowse
      www.google.com0%VirustotalBrowse
      blogger.googleusercontent.com0%VirustotalBrowse
      googlehosted.l.googleusercontent.com0%VirustotalBrowse
      www.google.com.pe0%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      a.nel.cloudflare.com
      35.190.80.1
      truefalseunknown
      www.google.com.pe
      142.250.74.195
      truefalseunknown
      atenasur.cl
      54.39.125.95
      truetrueunknown
      tiny-startupop.pl
      104.21.70.170
      truefalse
        unknown
        www.google.com
        142.250.181.228
        truefalseunknown
        googlehosted.l.googleusercontent.com
        142.250.184.225
        truefalseunknown
        blogger.googleusercontent.com
        unknown
        unknownfalseunknown
        NameMaliciousAntivirus DetectionReputation
        https://atenasur.cl/wp/ld/QjLtBRuVpCWi/james@domain.comtrue
          unknown
          http://atenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.comtrue
            unknown
            https://tiny-startupop.pl/OXHpn/#Djames@domain.comfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              142.250.186.174
              unknownUnited States
              15169GOOGLEUSfalse
              54.39.125.95
              atenasur.clCanada
              16276OVHFRtrue
              172.217.18.14
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.185.170
              unknownUnited States
              15169GOOGLEUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              142.250.181.228
              www.google.comUnited States
              15169GOOGLEUSfalse
              142.250.184.225
              googlehosted.l.googleusercontent.comUnited States
              15169GOOGLEUSfalse
              64.233.184.84
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.184.227
              unknownUnited States
              15169GOOGLEUSfalse
              35.190.80.1
              a.nel.cloudflare.comUnited States
              15169GOOGLEUSfalse
              172.217.16.195
              unknownUnited States
              15169GOOGLEUSfalse
              142.250.74.195
              www.google.com.peUnited States
              15169GOOGLEUSfalse
              142.250.185.97
              unknownUnited States
              15169GOOGLEUSfalse
              104.21.70.170
              tiny-startupop.plUnited States
              13335CLOUDFLARENETUSfalse
              IP
              192.168.2.16
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1533090
              Start date and time:2024-10-14 13:08:00 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Sample URL:https://www.google.com.pe/url?q=QjLtBRuVpCWi&rct=QjLtBRuVpCWi&sa=t&esrc=QjLtBRuVpCWi&source=&cd=QjLtBRuVpCWi&uact=&url=amp%2Fatenasur.cl/wp/ld//QjLtBRuVpCWi/james@domain.com
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal56.phis.win@19/8@18/172
              • Exclude process from analysis (whitelisted): SgrmBroker.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 142.250.184.227, 142.250.186.174, 64.233.184.84
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
              • Not all processes where analyzed, report is missing behavior information
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 14 10:08:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2673
              Entropy (8bit):3.981970588808285
              Encrypted:false
              SSDEEP:
              MD5:88EF33CFFB650CDE67CD1FCCF2792DEE
              SHA1:AB90FAD341602476AF15296D84A7D3D57930691F
              SHA-256:9CD220380C80DDB8779686682E3785AB774CFD5BD85A5F6834A6270D71992517
              SHA-512:21A8519ED83AD42C289502D528640CED30079BF63F718C4BFED03F03E3D2873F72E2837F2EF29785B7F528F11317726C0D8B4EE009CFEB2B6BF96DB4A6E34466
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....V.k)...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.INY.Y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VNY.Y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VNY.Y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VNY.Y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VNY.Y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.&......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 14 10:08:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2675
              Entropy (8bit):3.997165190121991
              Encrypted:false
              SSDEEP:
              MD5:B6443F163D998F5218485987BF9984BA
              SHA1:358017E815DF97678B9F7746CCA9817A9A820695
              SHA-256:B6D31ADE0E211FB901F221CB85783B32DE487FEFBCAFDFE220B3726A4AA6495A
              SHA-512:E4E8D287442E138079DDC28D7C768B23F7FD59617E739A637D01E8834715EB77BD43A6FB6C9E82659C455A82580F2C5876A03C420972FC32AAFC6B5000EBFEA9
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....~7|k)...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.INY.Y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VNY.Y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VNY.Y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VNY.Y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VNY.Y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.&......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 14 10:08:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.995358600802728
              Encrypted:false
              SSDEEP:
              MD5:7BD7B4BD3A3CDA7E9B25202F4E8DB7ED
              SHA1:10B08E3D8134956B05F725A8E8525319C9328FE6
              SHA-256:E17B453AADE22C740A6808A9FD74F5EF01FFB03077D973C84AE49ED0AF8141ED
              SHA-512:DD0F36104DC7ECB5C2AE0E06F885FB7D08DA6AD342B5F204EB763A492110293A51CC5EBEE39CBDE38E201299E3FE01675406D20061130F379015E08F0D9C00D8
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,......uk)...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.INY.Y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VNY.Y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VNY.Y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VNY.Y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VNY.Y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.&......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 14 10:08:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.983432391881177
              Encrypted:false
              SSDEEP:
              MD5:A4F0EDE2D0CF0F4F38CF64D3212CAD32
              SHA1:253CA7AE93DA7A5E49D9946C17210F1CA3423C36
              SHA-256:C5128F8C35909CE899E76814E2046D01865A30EEA181F304658A41EFC707ED28
              SHA-512:337CDF8236D846C227415EBF8DEC460F5BA8E105483EC35B772732C82020146DB27550D93471275CD09FF453313BDFC617A59214798AF9E44EB693D7C6B4EE9A
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.... ..k)...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.INY.Y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VNY.Y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VNY.Y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VNY.Y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VNY.Y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........U.&......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:PNG image data, 3396 x 1920, 8-bit/color RGB, non-interlaced
              Category:downloaded
              Size (bytes):87859
              Entropy (8bit):7.046777034066421
              Encrypted:false
              SSDEEP:
              MD5:A4D9107960AE4E4F79E6A36DF931EF5D
              SHA1:35704C698FCCD795B8F19DA76672A72C00422857
              SHA-256:FBBBC78E85DFA4F2B390E6DC2F3850D0F5247D16B5FD525093331572AA79AE84
              SHA-512:2C7FB7F198B0B141DD5B2B72ECB8B6E00514B70DFDE8CF6161988A5BB4F26C72BEED5CB59EC9E80BB2651016999D7DBB1CEE73F18AF7A982A0F3AC73E9B02465
              Malicious:false
              Reputation:unknown
              URL:https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png
              Preview:.PNG........IHDR...D.........3;+.....sBIT.....O...._zTXtRaw profile type APP1.....JO.K-.LV((.O..I.R..c...K.K.D......04006..F@.9T(..........Y..)....O..h.-... .IDATx...!.. ..0..X..I.................@g............;3............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13............|..........3..........@............13..
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:HTML document, ASCII text, with CRLF, LF line terminators
              Category:downloaded
              Size (bytes):1249
              Entropy (8bit):5.242453121762845
              Encrypted:false
              SSDEEP:
              MD5:F58515DFE987F7E027C8A71BBC884621
              SHA1:BEC6AEBF5940EA88FBBFF5748D539453D49FA284
              SHA-256:679E7E62B81267C93D0778083AE0FD0EFE24172FF0AC581835B54165B3D9ED43
              SHA-512:F085346A38318F7935D76909DB0367862924CC9B0D96256F7FF4E8999C041E610BBCDE8CA56C92673BDE0991C85E9C9D9B6726ABD91D0C3177462C80D4A99140
              Malicious:false
              Reputation:unknown
              URL:https://tiny-startupop.pl/favicon.ico
              Preview:<!DOCTYPE html>.<html style="height:100%">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">.<title> 404 Not Found..</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head>.<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">.<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;">. <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>.<h2 style="margin-top:20px;font-size: 30px;">Not Found..</h2>.<p>The resource requested could not be found on this server!</p>.</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1px
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:HTML document, ASCII text, with very long lines (10455), with CRLF line terminators
              Category:downloaded
              Size (bytes):19231
              Entropy (8bit):5.934628205711211
              Encrypted:false
              SSDEEP:
              MD5:44A718D10DC9BEABC26AFB035DC9DA95
              SHA1:2E5C2A949EA5029494D775EA3AC8D7250EB76F6B
              SHA-256:6DE83C295D405851F37D2D5A72692068375EDE9400D04B175C41DDE8D9A027F7
              SHA-512:DD9338C4E856020860659671B794C064F9D6DDC3977846644433EAB90027C9DE2FD93602D8DF50F0DC9BEC11FCB0CC1D606AAA9D67CA04521E9E566290016ABE
              Malicious:false
              Reputation:unknown
              URL:https://tiny-startupop.pl/OXHpn/
              Preview:<!DOCTYPE html>..<html lang="en">..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title></title>.. <style>.. body, html {.. margin: 0;.. padding: 0;.. height: 100%;.. overflow: hidden;.. }.... .background-container {.. position: relative;.. height: 100%;.. width: 100%;.. }.... .background-container::before {.. content: "";.. position: absolute;.. top: 0;.. left: 0;.. right: 0;.. bottom: 0;.. background-image: url("https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png");.. background-size: cover;..
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with no line terminators
              Category:downloaded
              Size (bytes):16
              Entropy (8bit):3.5
              Encrypted:false
              SSDEEP:
              MD5:F1C9C44E663E7E62582E3F5B236C1C72
              SHA1:E142F3A0C2D1CDF175A5C3AF43AD66FEFE208B1F
              SHA-256:D843E67FBFA1F5CB0024062861EE26860C5A866F80755CF39B3465459A8538B9
              SHA-512:19FE62CB9D884BB3424C51DD15E74EB22E5A639BABF8398BACEBB781862296FA0D7AEE39C88CB9C7AF5791FD58830AC3433F5C6BD94B1BA3912AB33151E93452
              Malicious:false
              Reputation:unknown
              URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAmyMewvNaeAkxIFDTcwqTA=?alt=proto
              Preview:CgkKBw03MKkwGgA=
              No static file info