Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://edgeupgrade.com

Overview

General Information

Sample URL:http://edgeupgrade.com
Analysis ID:1546640

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
AI detected suspicious URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7076 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6564 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1936,i,12872846631059640952,12547791596982061661,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 2996 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://edgeupgrade.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T10:42:43.506992+010020559201Exploit Kit Activity Detected192.168.2.16507631.1.1.153UDP
2024-11-01T10:42:43.507151+010020559201Exploit Kit Activity Detected192.168.2.16601091.1.1.153UDP
2024-11-01T10:42:46.528132+010020559201Exploit Kit Activity Detected192.168.2.16614281.1.1.153UDP
2024-11-01T10:42:46.528274+010020559201Exploit Kit Activity Detected192.168.2.16625591.1.1.153UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T10:42:47.698143+010020559211Exploit Kit Activity Detected192.168.2.1649722173.211.70.232443TCP
2024-11-01T10:42:47.698441+010020559211Exploit Kit Activity Detected192.168.2.1649721173.211.70.232443TCP
2024-11-01T10:42:53.899409+010020559211Exploit Kit Activity Detected192.168.2.1649725173.211.70.232443TCP
2024-11-01T10:42:53.900719+010020559211Exploit Kit Activity Detected192.168.2.1649726173.211.70.232443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T10:42:25.152667+010020560821Exploit Kit Activity Detected192.168.2.16632531.1.1.153UDP
2024-11-01T10:42:25.152884+010020560821Exploit Kit Activity Detected192.168.2.16559721.1.1.153UDP
2024-11-01T10:42:25.168365+010020560821Exploit Kit Activity Detected192.168.2.16535501.1.1.153UDP
2024-11-01T10:42:26.366256+010020560821Exploit Kit Activity Detected192.168.2.16623311.1.1.153UDP
2024-11-01T10:42:26.366381+010020560821Exploit Kit Activity Detected192.168.2.16596511.1.1.153UDP
2024-11-01T10:42:31.421569+010020560821Exploit Kit Activity Detected192.168.2.16539761.1.1.153UDP
2024-11-01T10:42:31.421702+010020560821Exploit Kit Activity Detected192.168.2.16564411.1.1.153UDP
2024-11-01T10:42:31.432559+010020560821Exploit Kit Activity Detected192.168.2.16553471.1.1.153UDP
2024-11-01T10:42:39.632550+010020560821Exploit Kit Activity Detected192.168.2.16593161.1.1.153UDP
2024-11-01T10:42:39.632870+010020560821Exploit Kit Activity Detected192.168.2.16492571.1.1.153UDP
2024-11-01T10:42:39.643485+010020560821Exploit Kit Activity Detected192.168.2.16561021.1.1.153UDP
2024-11-01T10:42:57.577402+010020560821Exploit Kit Activity Detected192.168.2.16578391.1.1.153UDP
2024-11-01T10:43:16.619676+010020560821Exploit Kit Activity Detected192.168.2.16548691.1.1.153UDP
2024-11-01T10:43:37.535551+010020560821Exploit Kit Activity Detected192.168.2.16635971.1.1.153UDP

Click to jump to signature section

Show All Signature Results
Source: https://www.google.co.uk/search?q=edgeupgrade.com&sca_esv=a5c97670553a4812&source=hp&ei=oqIkZ9SYAvWti-gP667pkQs&iflsig=AL9hbdgAAAAAZySwsr_slZ5QPCytqEo1kQ-yfV7YOH0v&ved=0ahUKEwjU8dOU7LqJAxX11gIHHWtXOrIQ4dUDCA8&uact=5&oq=edgeupgrade.com&gs_lp=Egdnd3Mtd2l6Ig9lZGdldXBncmFkZS5jb21I7ANQAFgAcAB4AJABAJgBAKABAKoBALgBA8gBAJgCAKACAJgDAJIHAKAHAA&sclient=gws-wizHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49811 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 25MB later: 36MB

Networking

barindex
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:63253 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:62331 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:59651 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:53550 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055921 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in TLS SNI (updatechrllom .com) : 192.168.2.16:49721 -> 173.211.70.232:443
Source: Network trafficSuricata IDS: 2055921 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in TLS SNI (updatechrllom .com) : 192.168.2.16:49725 -> 173.211.70.232:443
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:53976 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055921 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in TLS SNI (updatechrllom .com) : 192.168.2.16:49726 -> 173.211.70.232:443
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:55972 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:59316 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055920 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in DNS Lookup (updatechrllom .com) : 192.168.2.16:60109 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:56441 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055920 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in DNS Lookup (updatechrllom .com) : 192.168.2.16:50763 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055921 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in TLS SNI (updatechrllom .com) : 192.168.2.16:49722 -> 173.211.70.232:443
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:49257 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:56102 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:55347 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055920 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in DNS Lookup (updatechrllom .com) : 192.168.2.16:61428 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:57839 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055920 - Severity 1 - ET EXPLOIT_KIT Fake Browser Update Domain in DNS Lookup (updatechrllom .com) : 192.168.2.16:62559 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:54869 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056082 - Severity 1 - ET EXPLOIT_KIT Fake Java Update Domain in DNS Lookup (edgeupgrade .com) : 192.168.2.16:63597 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: updatechrllom.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: updatechrllom.comConnection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: updatechrllom.comConnection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: edgeupgrade.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: updatechrllom.com
Source: global trafficDNS traffic detected: DNS query: www.google.co.uk
Source: global trafficDNS traffic detected: DNS query: ogs.google.co.uk
Source: global trafficDNS traffic detected: DNS query: apis.google.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: global trafficDNS traffic detected: DNS query: id.google.co.uk
Source: global trafficDNS traffic detected: DNS query: dns-tunnel-check.googlezip.net
Source: global trafficDNS traffic detected: DNS query: tunnel.googlezip.net
Source: global trafficDNS traffic detected: DNS query: i.ytimg.com
Source: global trafficDNS traffic detected: DNS query: any.run
Source: global trafficDNS traffic detected: DNS query: static.cloudflareinsights.com
Source: global trafficDNS traffic detected: DNS query: content.any.run
Source: global trafficDNS traffic detected: DNS query: analytics.any.run
Source: global trafficDNS traffic detected: DNS query: cookie.any.run
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49811 version: TLS 1.2
Source: classification engineClassification label: mal52.win@27/1@71/194
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1936,i,12872846631059640952,12547791596982061661,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://edgeupgrade.com"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1936,i,12872846631059640952,12547791596982061661,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected

Persistence and Installation Behavior

barindex
Source: EmailJoeBoxAI: AI detected Brand spoofing attempt in URL: URL: http://edgeupgrade.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
216.58.206.78
truefalse
    unknown
    static.cloudflareinsights.com
    104.16.79.73
    truefalse
      unknown
      plus.l.google.com
      142.250.184.206
      truefalse
        unknown
        analytics.any.run
        104.22.48.74
        truefalse
          unknown
          i.ytimg.com
          142.250.185.246
          truefalse
            unknown
            cookie.any.run
            104.22.49.74
            truefalse
              unknown
              www3.l.google.com
              216.58.206.46
              truefalse
                unknown
                play.google.com
                142.250.185.238
                truefalse
                  unknown
                  dns-tunnel-check.googlezip.net
                  216.239.34.159
                  truefalse
                    unknown
                    tunnel.googlezip.net
                    216.239.34.157
                    truefalse
                      unknown
                      www.google.co.uk
                      172.217.18.3
                      truefalse
                        unknown
                        content.any.run
                        104.22.48.74
                        truefalse
                          unknown
                          any.run
                          104.22.49.74
                          truefalse
                            unknown
                            www.google.com
                            142.250.185.68
                            truefalse
                              unknown
                              updatechrllom.com
                              173.211.70.232
                              truetrue
                                unknown
                                id.google.co.uk
                                142.250.184.227
                                truefalse
                                  unknown
                                  ogs.google.co.uk
                                  unknown
                                  unknownfalse
                                    unknown
                                    edgeupgrade.com
                                    unknown
                                    unknowntrue
                                      unknown
                                      apis.google.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        NameMaliciousAntivirus DetectionReputation
                                        https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00cefalse
                                          unknown
                                          http://updatechrllom.com/true
                                            unknown
                                            https://www.google.co.uk/search?q=edgeupgrade.com&sca_esv=a5c97670553a4812&source=hp&ei=oqIkZ9SYAvWti-gP667pkQs&iflsig=AL9hbdgAAAAAZySwsr_slZ5QPCytqEo1kQ-yfV7YOH0v&ved=0ahUKEwjU8dOU7LqJAxX11gIHHWtXOrIQ4dUDCA8&uact=5&oq=edgeupgrade.com&gs_lp=Egdnd3Mtd2l6Ig9lZGdldXBncmFkZS5jb21I7ANQAFgAcAB4AJABAJgBAKABAKoBALgBA8gBAJgCAKACAJgDAJIHAKAHAA&sclient=gws-wizfalse
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              142.250.185.228
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              173.211.70.232
                                              updatechrllom.comUnited States
                                              46261QUICKPACKETUStrue
                                              142.250.181.234
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.185.246
                                              i.ytimg.comUnited States
                                              15169GOOGLEUSfalse
                                              8.8.8.8
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              104.22.49.74
                                              cookie.any.runUnited States
                                              13335CLOUDFLARENETUSfalse
                                              142.251.168.84
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.186.132
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              172.217.18.99
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.184.227
                                              id.google.co.ukUnited States
                                              15169GOOGLEUSfalse
                                              142.250.184.206
                                              plus.l.google.comUnited States
                                              15169GOOGLEUSfalse
                                              104.16.79.73
                                              static.cloudflareinsights.comUnited States
                                              13335CLOUDFLARENETUSfalse
                                              142.250.186.74
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.186.98
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              172.217.16.200
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.185.67
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.185.68
                                              www.google.comUnited States
                                              15169GOOGLEUSfalse
                                              1.1.1.1
                                              unknownAustralia
                                              13335CLOUDFLARENETUStrue
                                              172.217.18.8
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.186.163
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.184.194
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.185.234
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              172.217.18.3
                                              www.google.co.ukUnited States
                                              15169GOOGLEUSfalse
                                              142.250.185.238
                                              play.google.comUnited States
                                              15169GOOGLEUSfalse
                                              216.58.206.46
                                              www3.l.google.comUnited States
                                              15169GOOGLEUSfalse
                                              142.250.181.227
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              104.22.48.74
                                              analytics.any.runUnited States
                                              13335CLOUDFLARENETUSfalse
                                              239.255.255.250
                                              unknownReserved
                                              unknownunknownfalse
                                              142.250.186.142
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              142.250.186.86
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              216.239.34.157
                                              tunnel.googlezip.netUnited States
                                              15169GOOGLEUSfalse
                                              IP
                                              192.168.2.16
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1546640
                                              Start date and time:2024-11-01 10:41:55 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                              Sample URL:http://edgeupgrade.com
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:13
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • EGA enabled
                                              Analysis Mode:stream
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal52.win@27/1@71/194
                                              • Exclude process from analysis (whitelisted): svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 172.217.18.99, 142.250.186.142, 142.251.168.84
                                              • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • VT rate limit hit for: http://edgeupgrade.com
                                              InputOutput
                                              URL: Model: claude-3-5-sonnet-latest
                                              {
                                                  "typosquatting": false,
                                                  "unusual_query_string": false,
                                                  "suspicious_tld": false,
                                                  "ip_in_url": false,
                                                  "long_subdomain": false,
                                                  "malicious_keywords": true,
                                                  "encoded_characters": false,
                                                  "redirection": false,
                                                  "contains_email_address": false,
                                                  "known_domain": false,
                                                  "brand_spoofing_attempt": true,
                                                  "third_party_hosting": false
                                              }
                                              URL: URL: http://edgeupgrade.com
                                              URL: https://www.google.co.uk/search?q=edgeupgrade.com&sca_esv=a5c97670553a4812&source=hp&ei=oqIkZ9SYAvWti-gP667pkQs&iflsig=AL9hbdgAAAAAZySwsr_slZ5QPCytqEo1kQ-yfV7YOH0v&ved=0ahUKEwjU8dOU7LqJAxX11gIHHWtXOrIQ4dUDCA8&uact=5&oq=edgeupgrade.com&gs_lp=Egdnd3Mtd2l6Ig Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "contains_trigger_text": true,
                                                "trigger_text": "To fully upgrade to the new Microsoft Edge, you must be signed in to your device using an administrator account. If you don't have this level of access, ...",
                                                "prominent_button_name": "unknown",
                                                "text_input_field_labels": "unknown",
                                                "pdf_icon_visible": false,
                                                "has_visible_captcha": false,
                                                "has_urgent_text": true,
                                                "has_visible_qrcode": false
                                              }
                                              URL: Model: claude-3-5-sonnet-latest
                                              {
                                                  "typosquatting": false,
                                                  "unusual_query_string": false,
                                                  "suspicious_tld": false,
                                                  "ip_in_url": false,
                                                  "long_subdomain": false,
                                                  "malicious_keywords": false,
                                                  "encoded_characters": false,
                                                  "redirection": false,
                                                  "contains_email_address": false,
                                                  "known_domain": true,
                                                  "brand_spoofing_attempt": false,
                                                  "third_party_hosting": false
                                              }
                                              URL: URL: https://www.google.co.uk
                                              URL: https://www.google.co.uk/search?q=edgeupgrade.com&sca_esv=a5c97670553a4812&source=hp&ei=oqIkZ9SYAvWti-gP667pkQs&iflsig=AL9hbdgAAAAAZySwsr_slZ5QPCytqEo1kQ-yfV7YOH0v&ved=0ahUKEwjU8dOU7LqJAxX11gIHHWtXOrIQ4dUDCA8&uact=5&oq=edgeupgrade.com&gs_lp=Egdnd3Mtd2l6Ig Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "brands": [
                                                  "Google",
                                                  "Microsoft"
                                                ]
                                              }
                                              URL: https://www.google.co.uk/search?q=edgeupgrade.com&sca_esv=a5c97670553a4812&source=hp&ei=oqIkZ9SYAvWti-gP667pkQs&iflsig=AL9hbdgAAAAAZySwsr_slZ5QPCytqEo1kQ-yfV7YOH0v&ved=0ahUKEwjU8dOU7LqJAxX11gIHHWtXOrIQ4dUDCA8&uact=5&oq=edgeupgrade.com&gs_lp=Egdnd3Mtd2l6Ig Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "contains_trigger_text": true,
                                                "trigger_text": "To fully upgrade to the new Microsoft Edge, you must be signed in to your device using an administrator account. If you don't have this level of access, ...",
                                                "prominent_button_name": "unknown",
                                                "text_input_field_labels": "unknown",
                                                "pdf_icon_visible": false,
                                                "has_visible_captcha": false,
                                                "has_urgent_text": true,
                                                "has_visible_qrcode": false
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "contains_trigger_text": true,
                                                "trigger_text": "Sign up, it's free",
                                                "prominent_button_name": "Sign up, it's free",
                                                "text_input_field_labels": "unknown",
                                                "pdf_icon_visible": false,
                                                "has_visible_captcha": false,
                                                "has_urgent_text": false,
                                                "has_visible_qrcode": false
                                              }
                                              URL: Model: claude-3-5-sonnet-latest
                                              {
                                                  "typosquatting": false,
                                                  "unusual_query_string": false,
                                                  "suspicious_tld": false,
                                                  "ip_in_url": false,
                                                  "long_subdomain": false,
                                                  "malicious_keywords": false,
                                                  "encoded_characters": false,
                                                  "redirection": false,
                                                  "contains_email_address": false,
                                                  "known_domain": true,
                                                  "brand_spoofing_attempt": false,
                                                  "third_party_hosting": false
                                              }
                                              URL: URL: https://any.run
                                              URL: https://www.google.co.uk/search?q=edgeupgrade.com&sca_esv=a5c97670553a4812&source=hp&ei=oqIkZ9SYAvWti-gP667pkQs&iflsig=AL9hbdgAAAAAZySwsr_slZ5QPCytqEo1kQ-yfV7YOH0v&ved=0ahUKEwjU8dOU7LqJAxX11gIHHWtXOrIQ4dUDCA8&uact=5&oq=edgeupgrade.com&gs_lp=Egdnd3Mtd2l6Ig Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "brands": [
                                                  "Google",
                                                  "Microsoft"
                                                ]
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "brands": [
                                                  "ANY RUN"
                                                ]
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "contains_trigger_text": true,
                                                "trigger_text": "View details of payment",
                                                "prominent_button_name": "Sign up, it's free",
                                                "text_input_field_labels": "unknown",
                                                "pdf_icon_visible": false,
                                                "has_visible_captcha": false,
                                                "has_urgent_text": false,
                                                "has_visible_qrcode": false
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "contains_trigger_text": false,
                                                "trigger_text": "unknown",
                                                "prominent_button_name": "Sign up, it's free",
                                                "text_input_field_labels": "unknown",
                                                "pdf_icon_visible": false,
                                                "has_visible_captcha": false,
                                                "has_urgent_text": false,
                                                "has_visible_qrcode": false
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "brands": [
                                                  "ANY RUN"
                                                ]
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "brands": [
                                                  "ANY RUN"
                                                ]
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "contains_trigger_text": false,
                                                "trigger_text": "unknown",
                                                "prominent_button_name": "Sign up, it's free",
                                                "text_input_field_labels": "unknown",
                                                "pdf_icon_visible": false,
                                                "has_visible_captcha": false,
                                                "has_urgent_text": false,
                                                "has_visible_qrcode": false
                                              }
                                              URL: https://any.run/report/7d526e6482de186d72dbcdc36062b337926b18d277854de309b5f5fb58ce388a/cb1a5c62-79f0-4b3a-9f53-efcbd06d00ce Model: claude-3-haiku-20240307
                                              ```json
                                              {
                                                "brands": [
                                                  "Any Run",
                                                  "Windows"
                                                ]
                                              }
                                              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                              Category:dropped
                                              Size (bytes):2689
                                              Entropy (8bit):4.00334433976793
                                              Encrypted:false
                                              SSDEEP:
                                              MD5:BF4E0C60A3CCE74B40AEB6C2DB1567DA
                                              SHA1:DACCE4450AD5DAE11463640D562E268D40E8CB11
                                              SHA-256:813DC8F7719AE653B834C44D9D43C0DAA8B3949596E7C00AA61468B12FC1688D
                                              SHA-512:2A57EA901A614AD7F39B22F36E256FC4189B6A4C55B64882A91ED364646425C86E3E24714B30BB5FDB93DC9BDC5F7A409D09EDD610DAE826AA6841490445C900
                                              Malicious:false
                                              Reputation:unknown
                                              Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IaYBM....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VaYLM....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VaYLM....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VaYLM..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                              No static file info