Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://djhgyuiuy.z28.web.core.windows.net/

Overview

General Information

Sample URL:https://djhgyuiuy.z28.web.core.windows.net/
Analysis ID:1433042
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample

Classification

  • System is w10x64
  • chrome.exe (PID: 5548 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 4284 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=2016,i,17814949654305067587,17563598107841255426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6400 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://djhgyuiuy.z28.web.core.windows.net/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://djhgyuiuy.z28.web.core.windows.net/SlashNext: detection malicious, Label: Scareware type: Phishing & Social Engineering
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: classification engineClassification label: mal48.win@19/0@4/3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=2016,i,17814949654305067587,17563598107841255426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://djhgyuiuy.z28.web.core.windows.net/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=2016,i,17814949654305067587,17563598107841255426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://djhgyuiuy.z28.web.core.windows.net/0%Avira URL Cloudsafe
https://djhgyuiuy.z28.web.core.windows.net/3%VirustotalBrowse
https://djhgyuiuy.z28.web.core.windows.net/100%SlashNextScareware type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.191.142
truefalse
    high
    www.google.com
    142.250.191.164
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalseunknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.191.164
      www.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.4
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1433042
      Start date and time:2024-04-29 01:30:24 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 53s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:https://djhgyuiuy.z28.web.core.windows.net/
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal48.win@19/0@4/3
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • URL browsing timeout or error
      • URL not reachable
      • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 172.217.2.35, 142.250.112.84, 172.217.4.46, 34.104.35.123, 69.192.208.109, 20.12.23.50, 72.21.81.240, 192.229.211.108, 13.95.31.18
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, djhgyuiuy.z28.web.core.windows.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      No static file info
      TimestampSource PortDest PortSource IPDest IP
      Apr 29, 2024 01:31:05.628563881 CEST49675443192.168.2.4173.222.162.32
      Apr 29, 2024 01:31:06.722318888 CEST49678443192.168.2.4104.46.162.224
      Apr 29, 2024 01:31:15.330607891 CEST49675443192.168.2.4173.222.162.32
      Apr 29, 2024 01:31:19.349904060 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.350004911 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.350155115 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.353893995 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.353945017 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.612241983 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.633182049 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.633224964 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.634845018 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.635282993 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.638057947 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.638168097 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.720665932 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:19.720693111 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:19.876353979 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:29.576721907 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:29.576778889 CEST44349737142.250.191.164192.168.2.4
      Apr 29, 2024 01:31:29.577012062 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:30.738298893 CEST49737443192.168.2.4142.250.191.164
      Apr 29, 2024 01:31:30.738341093 CEST44349737142.250.191.164192.168.2.4
      TimestampSource PortDest PortSource IPDest IP
      Apr 29, 2024 01:31:14.687047958 CEST53520371.1.1.1192.168.2.4
      Apr 29, 2024 01:31:14.889796019 CEST53520881.1.1.1192.168.2.4
      Apr 29, 2024 01:31:15.345679045 CEST53519081.1.1.1192.168.2.4
      Apr 29, 2024 01:31:15.797060013 CEST53502631.1.1.1192.168.2.4
      Apr 29, 2024 01:31:15.802941084 CEST53523451.1.1.1192.168.2.4
      Apr 29, 2024 01:31:15.962692022 CEST53583941.1.1.1192.168.2.4
      Apr 29, 2024 01:31:17.320420980 CEST5471953192.168.2.48.8.8.8
      Apr 29, 2024 01:31:17.320760965 CEST6476553192.168.2.41.1.1.1
      Apr 29, 2024 01:31:17.431807041 CEST53647651.1.1.1192.168.2.4
      Apr 29, 2024 01:31:17.441176891 CEST53547198.8.8.8192.168.2.4
      Apr 29, 2024 01:31:18.408169031 CEST53500451.1.1.1192.168.2.4
      Apr 29, 2024 01:31:18.423460007 CEST53492611.1.1.1192.168.2.4
      Apr 29, 2024 01:31:18.880672932 CEST5823553192.168.2.41.1.1.1
      Apr 29, 2024 01:31:18.880943060 CEST5863153192.168.2.41.1.1.1
      Apr 29, 2024 01:31:18.991372108 CEST53586311.1.1.1192.168.2.4
      Apr 29, 2024 01:31:18.991394997 CEST53582351.1.1.1192.168.2.4
      Apr 29, 2024 01:31:25.270838022 CEST53650581.1.1.1192.168.2.4
      Apr 29, 2024 01:31:25.274847984 CEST53646931.1.1.1192.168.2.4
      Apr 29, 2024 01:31:25.484406948 CEST53625431.1.1.1192.168.2.4
      TimestampSource IPDest IPChecksumCodeType
      Apr 29, 2024 01:31:14.889868975 CEST192.168.2.41.1.1.1c22c(Port unreachable)Destination Unreachable
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 29, 2024 01:31:17.320420980 CEST192.168.2.48.8.8.80x9bd9Standard query (0)google.comA (IP address)IN (0x0001)false
      Apr 29, 2024 01:31:17.320760965 CEST192.168.2.41.1.1.10xcbf2Standard query (0)google.comA (IP address)IN (0x0001)false
      Apr 29, 2024 01:31:18.880672932 CEST192.168.2.41.1.1.10x290bStandard query (0)www.google.comA (IP address)IN (0x0001)false
      Apr 29, 2024 01:31:18.880943060 CEST192.168.2.41.1.1.10xd30Standard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 29, 2024 01:31:17.431807041 CEST1.1.1.1192.168.2.40xcbf2No error (0)google.com142.250.191.142A (IP address)IN (0x0001)false
      Apr 29, 2024 01:31:17.441176891 CEST8.8.8.8192.168.2.40x9bd9No error (0)google.com142.250.190.46A (IP address)IN (0x0001)false
      Apr 29, 2024 01:31:18.991372108 CEST1.1.1.1192.168.2.40xd30No error (0)www.google.com65IN (0x0001)false
      Apr 29, 2024 01:31:18.991394997 CEST1.1.1.1192.168.2.40x290bNo error (0)www.google.com142.250.191.164A (IP address)IN (0x0001)false
      Apr 29, 2024 01:31:28.558237076 CEST1.1.1.1192.168.2.40xb375No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Apr 29, 2024 01:31:28.558237076 CEST1.1.1.1192.168.2.40xb375No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:01:31:08
      Start date:29/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:01:31:12
      Start date:29/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=2016,i,17814949654305067587,17563598107841255426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:01:31:14
      Start date:29/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://djhgyuiuy.z28.web.core.windows.net/"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly