Windows
Analysis Report
3d#U0430.url
Overview
General Information
Sample name: | 3d#U0430.urlrenamed because original name is a hash value |
Original sample name: | .url |
Analysis ID: | 1561507 |
MD5: | 9aff477d681be77815b141cad037d7b6 |
SHA1: | 1da43753c3b48eb25180b04a2e7c6d64d9159be5 |
SHA256: | 8cf24fe1384ca8ea763081b78fd14995704bbd73a871ebe1c362053767aeec20 |
Errors
|
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T16:13:33.349670+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 50017 | 20.42.65.84 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Suricata IDS: |
System Summary |
---|
Source: | Initial sample: |
Source: | Classification label: |
Source: | ReversingLabs: |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Shortcut.Exploit.CVE-2024-4351 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561507 |
Start date and time: | 2024-11-23 16:07:46 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 3d#U0430.urlrenamed because original name is a hash value |
Original Sample Name: | .url |
Detection: | MAL |
Classification: | mal52.winURL@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse as no analysis process or sample was found
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: 3d#U0430.url
File type: | |
Entropy (8bit): | 5.300940822861295 |
TrID: |
|
File name: | 3d#U0430.url |
File size: | 407 bytes |
MD5: | 9aff477d681be77815b141cad037d7b6 |
SHA1: | 1da43753c3b48eb25180b04a2e7c6d64d9159be5 |
SHA256: | 8cf24fe1384ca8ea763081b78fd14995704bbd73a871ebe1c362053767aeec20 |
SHA512: | 0ac9cb5cf7e0f7aeae2129c7182dca232a9932328404a6a592ceb26296b7b60399d7e741509d839917afc2f1eab92bc02980fbc07a0dc47e9192079c91747cc7 |
SSDEEP: | 12:HRYFVmdg97y51EDYQ89nycXaVWfmJAVW4xhFYFeLpYddZVEI1oYn:HOFVmh5q0Q89nympfk34xhFYFa2rvoYn |
TLSH: | F1E02B18D59DD5D1C6132C4E5161F885EC0FB4C909F3D88C25D7D9CA1C62471CA4CFA2 |
File Content Preview: | [InternetShortcut]..URL=file://92.42.96.30/pdp.nacs.gov.ua/Certificate_Activate_45052389_005553.exe..IconIndex=1..HotKey=0..IDList=..IconFile=C:\Windows\System32\SHELL32.dll..[{009862A0-0000-0000-C000-000000005986}]..Prop3=19,9..[{000214A0-0000-0000-C000- |
Icon Hash: | 6de5a7b7b3b3a185 |