Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html

Overview

General Information

Sample URL:https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html
Analysis ID:1433045
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample

Classification

  • System is w10x64
  • chrome.exe (PID: 4852 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1544 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2040,i,3694230326841623501,11650552077228610517,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6476 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://thumbzillagetpointsgt.z13.web.core.windows.net/index.htmlSlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering
Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: google.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: classification engineClassification label: mal48.win@19/0@4/3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2040,i,3694230326841623501,11650552077228610517,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2040,i,3694230326841623501,11650552077228610517,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html0%Avira URL Cloudsafe
https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html2%VirustotalBrowse
https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html100%SlashNextCredential Stealing type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
google.com
142.250.190.110
truefalse
    high
    www.google.com
    142.250.191.196
    truefalse
      high
      fp2e7a.wpc.phicdn.net
      192.229.211.108
      truefalseunknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.191.196
      www.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.4
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1433045
      Start date and time:2024-04-29 01:45:24 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 49s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal48.win@19/0@4/3
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • URL browsing timeout or error
      • URL not reachable
      • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 172.217.4.195, 142.250.112.84, 142.250.191.238, 34.104.35.123, 23.11.208.106, 20.12.23.50, 72.21.81.240, 192.229.211.108
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, wu.ec.azureedge.net, clientservices.googleapis.com, ctldl.windowsupdate.com, thumbzillagetpointsgt.z13.web.core.windows.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, clients.l.google.com, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      No static file info
      TimestampSource PortDest PortSource IPDest IP
      Apr 29, 2024 01:46:07.380167961 CEST49678443192.168.2.4104.46.162.224
      Apr 29, 2024 01:46:07.427179098 CEST49675443192.168.2.4173.222.162.32
      Apr 29, 2024 01:46:17.034004927 CEST49675443192.168.2.4173.222.162.32
      Apr 29, 2024 01:46:19.548868895 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.548890114 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:19.551609039 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.552386999 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.552400112 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:19.790796041 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:19.791682959 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.791693926 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:19.792545080 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:19.792809010 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.803520918 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.803581953 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:19.879509926 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:19.879517078 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:20.065983057 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:29.774275064 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:29.774337053 CEST44349738142.250.191.196192.168.2.4
      Apr 29, 2024 01:46:29.774455070 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:31.114315987 CEST49738443192.168.2.4142.250.191.196
      Apr 29, 2024 01:46:31.114340067 CEST44349738142.250.191.196192.168.2.4
      TimestampSource PortDest PortSource IPDest IP
      Apr 29, 2024 01:46:14.766263962 CEST53580411.1.1.1192.168.2.4
      Apr 29, 2024 01:46:14.791121960 CEST53615451.1.1.1192.168.2.4
      Apr 29, 2024 01:46:15.452745914 CEST53578111.1.1.1192.168.2.4
      Apr 29, 2024 01:46:17.618283033 CEST53619481.1.1.1192.168.2.4
      Apr 29, 2024 01:46:17.618611097 CEST53528861.1.1.1192.168.2.4
      Apr 29, 2024 01:46:17.756589890 CEST53494951.1.1.1192.168.2.4
      Apr 29, 2024 01:46:18.160243988 CEST5443853192.168.2.41.1.1.1
      Apr 29, 2024 01:46:18.160892010 CEST6206253192.168.2.48.8.8.8
      Apr 29, 2024 01:46:18.270308971 CEST53544381.1.1.1192.168.2.4
      Apr 29, 2024 01:46:18.281682968 CEST53620628.8.8.8192.168.2.4
      Apr 29, 2024 01:46:19.435357094 CEST6323053192.168.2.41.1.1.1
      Apr 29, 2024 01:46:19.435628891 CEST5759153192.168.2.41.1.1.1
      Apr 29, 2024 01:46:19.545917034 CEST53632301.1.1.1192.168.2.4
      Apr 29, 2024 01:46:19.546364069 CEST53575911.1.1.1192.168.2.4
      Apr 29, 2024 01:46:19.575445890 CEST53576571.1.1.1192.168.2.4
      Apr 29, 2024 01:46:19.580373049 CEST53636251.1.1.1192.168.2.4
      Apr 29, 2024 01:46:24.993879080 CEST53501141.1.1.1192.168.2.4
      Apr 29, 2024 01:46:24.997210979 CEST53644191.1.1.1192.168.2.4
      Apr 29, 2024 01:46:27.582438946 CEST53545521.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 29, 2024 01:46:18.160243988 CEST192.168.2.41.1.1.10xa4cdStandard query (0)google.comA (IP address)IN (0x0001)false
      Apr 29, 2024 01:46:18.160892010 CEST192.168.2.48.8.8.80x6c63Standard query (0)google.comA (IP address)IN (0x0001)false
      Apr 29, 2024 01:46:19.435357094 CEST192.168.2.41.1.1.10xa614Standard query (0)www.google.comA (IP address)IN (0x0001)false
      Apr 29, 2024 01:46:19.435628891 CEST192.168.2.41.1.1.10x129Standard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 29, 2024 01:46:18.270308971 CEST1.1.1.1192.168.2.40xa4cdNo error (0)google.com142.250.190.110A (IP address)IN (0x0001)false
      Apr 29, 2024 01:46:18.281682968 CEST8.8.8.8192.168.2.40x6c63No error (0)google.com142.250.190.46A (IP address)IN (0x0001)false
      Apr 29, 2024 01:46:19.545917034 CEST1.1.1.1192.168.2.40xa614No error (0)www.google.com142.250.191.196A (IP address)IN (0x0001)false
      Apr 29, 2024 01:46:19.546364069 CEST1.1.1.1192.168.2.40x129No error (0)www.google.com65IN (0x0001)false
      Apr 29, 2024 01:46:30.581445932 CEST1.1.1.1192.168.2.40xc019No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Apr 29, 2024 01:46:30.581445932 CEST1.1.1.1192.168.2.40xc019No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:01:46:09
      Start date:29/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:01:46:13
      Start date:29/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2040,i,3694230326841623501,11650552077228610517,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:01:46:15
      Start date:29/04/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://thumbzillagetpointsgt.z13.web.core.windows.net/index.html"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly