Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://xxnewmac5xx.z13.web.core.windows.net/

Overview

General Information

Sample URL:https://xxnewmac5xx.z13.web.core.windows.net/
Analysis ID:1430630
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample

Classification

  • System is w10x64
  • chrome.exe (PID: 5180 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3592 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2476,i,5080569679281105653,3474554381594792134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6444 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://xxnewmac5xx.z13.web.core.windows.net/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://xxnewmac5xx.z13.web.core.windows.net/SlashNext: detection malicious, Label: Scareware type: Phishing & Social Engineering
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: classification engineClassification label: mal48.win@19/0@4/3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2476,i,5080569679281105653,3474554381594792134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://xxnewmac5xx.z13.web.core.windows.net/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2476,i,5080569679281105653,3474554381594792134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://xxnewmac5xx.z13.web.core.windows.net/0%Avira URL Cloudsafe
https://xxnewmac5xx.z13.web.core.windows.net/100%SlashNextScareware type: Phishing & Social Engineering
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    google.com
    142.251.2.139
    truefalse
      high
      www.google.com
      142.250.141.104
      truefalse
        high
        fp2e7a.wpc.phicdn.net
        192.229.211.108
        truefalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.250.141.104
          www.google.comUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.4
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1430630
          Start date and time:2024-04-24 01:07:33 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 4s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://xxnewmac5xx.z13.web.core.windows.net/
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@19/0@4/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): SIHClient.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 74.125.137.94, 142.251.2.113, 142.251.2.100, 142.251.2.138, 142.251.2.101, 142.251.2.139, 142.251.2.102, 142.251.2.84, 34.104.35.123, 23.61.210.98, 40.68.123.157, 199.232.210.172, 192.229.211.108, 20.166.126.56
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: https://xxnewmac5xx.z13.web.core.windows.net/
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Apr 24, 2024 01:08:14.152813911 CEST49675443192.168.2.4173.222.162.32
          Apr 24, 2024 01:08:15.855972052 CEST49678443192.168.2.4104.46.162.224
          Apr 24, 2024 01:08:23.762809038 CEST49675443192.168.2.4173.222.162.32
          Apr 24, 2024 01:08:25.179081917 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.179167032 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.179265976 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.190463066 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.190498114 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.546394110 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.546732903 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.546762943 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.547612906 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.547710896 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.548970938 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.549035072 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.602569103 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:25.602586985 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:25.649444103 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:35.545430899 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:35.545510054 CEST44349737142.250.141.104192.168.2.4
          Apr 24, 2024 01:08:35.545876980 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:37.380573034 CEST49737443192.168.2.4142.250.141.104
          Apr 24, 2024 01:08:37.380639076 CEST44349737142.250.141.104192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Apr 24, 2024 01:08:21.120678902 CEST53556631.1.1.1192.168.2.4
          Apr 24, 2024 01:08:21.140697956 CEST53625191.1.1.1192.168.2.4
          Apr 24, 2024 01:08:22.150305033 CEST53535901.1.1.1192.168.2.4
          Apr 24, 2024 01:08:22.647252083 CEST53493211.1.1.1192.168.2.4
          Apr 24, 2024 01:08:22.647403002 CEST53534591.1.1.1192.168.2.4
          Apr 24, 2024 01:08:22.805464029 CEST53532611.1.1.1192.168.2.4
          Apr 24, 2024 01:08:22.842226028 CEST5889553192.168.2.48.8.8.8
          Apr 24, 2024 01:08:22.844147921 CEST6214953192.168.2.41.1.1.1
          Apr 24, 2024 01:08:22.998080969 CEST53621491.1.1.1192.168.2.4
          Apr 24, 2024 01:08:23.012717009 CEST53588958.8.8.8192.168.2.4
          Apr 24, 2024 01:08:23.998004913 CEST53562051.1.1.1192.168.2.4
          Apr 24, 2024 01:08:24.000009060 CEST53611711.1.1.1192.168.2.4
          Apr 24, 2024 01:08:25.001873970 CEST4970953192.168.2.41.1.1.1
          Apr 24, 2024 01:08:25.002214909 CEST6274853192.168.2.41.1.1.1
          Apr 24, 2024 01:08:25.155338049 CEST53497091.1.1.1192.168.2.4
          Apr 24, 2024 01:08:25.155499935 CEST53627481.1.1.1192.168.2.4
          Apr 24, 2024 01:08:29.268150091 CEST53654891.1.1.1192.168.2.4
          Apr 24, 2024 01:08:29.269201040 CEST53592951.1.1.1192.168.2.4
          Apr 24, 2024 01:08:29.448257923 CEST53533261.1.1.1192.168.2.4
          Apr 24, 2024 01:08:39.402908087 CEST53570791.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 24, 2024 01:08:22.842226028 CEST192.168.2.48.8.8.80x8d19Standard query (0)google.comA (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:22.844147921 CEST192.168.2.41.1.1.10x857fStandard query (0)google.comA (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.001873970 CEST192.168.2.41.1.1.10xe40aStandard query (0)www.google.comA (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.002214909 CEST192.168.2.41.1.1.10xc1adStandard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 24, 2024 01:08:22.998080969 CEST1.1.1.1192.168.2.40x857fNo error (0)google.com142.251.2.139A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:22.998080969 CEST1.1.1.1192.168.2.40x857fNo error (0)google.com142.251.2.102A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:22.998080969 CEST1.1.1.1192.168.2.40x857fNo error (0)google.com142.251.2.113A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:22.998080969 CEST1.1.1.1192.168.2.40x857fNo error (0)google.com142.251.2.101A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:22.998080969 CEST1.1.1.1192.168.2.40x857fNo error (0)google.com142.251.2.138A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:22.998080969 CEST1.1.1.1192.168.2.40x857fNo error (0)google.com142.251.2.100A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:23.012717009 CEST8.8.8.8192.168.2.40x8d19No error (0)google.com142.251.40.46A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155338049 CEST1.1.1.1192.168.2.40xe40aNo error (0)www.google.com142.250.141.104A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155338049 CEST1.1.1.1192.168.2.40xe40aNo error (0)www.google.com142.250.141.106A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155338049 CEST1.1.1.1192.168.2.40xe40aNo error (0)www.google.com142.250.141.103A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155338049 CEST1.1.1.1192.168.2.40xe40aNo error (0)www.google.com142.250.141.105A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155338049 CEST1.1.1.1192.168.2.40xe40aNo error (0)www.google.com142.250.141.147A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155338049 CEST1.1.1.1192.168.2.40xe40aNo error (0)www.google.com142.250.141.99A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:25.155499935 CEST1.1.1.1192.168.2.40xc1adNo error (0)www.google.com65IN (0x0001)false
          Apr 24, 2024 01:08:37.552197933 CEST1.1.1.1192.168.2.40xbbfNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:37.552197933 CEST1.1.1.1192.168.2.40xbbfNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          Apr 24, 2024 01:08:38.132738113 CEST1.1.1.1192.168.2.40x56edNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 24, 2024 01:08:38.132738113 CEST1.1.1.1192.168.2.40x56edNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:01:08:17
          Start date:24/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:01:08:19
          Start date:24/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2476,i,5080569679281105653,3474554381594792134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff7699e0000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:01:08:21
          Start date:24/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://xxnewmac5xx.z13.web.core.windows.net/"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly