Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe

Overview

General Information

Sample URL:http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe
Analysis ID:1432073
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found detection on Joe Sandbox Cloud Basic
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found

Classification

  • System is w10x64
  • chrome.exe (PID: 3152 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5000 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6764 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3156 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6492 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.193.120.112:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.193.120.112:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.193.120.112
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficDNS traffic detected: DNS query: download.lenovo.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://ocsp.digicert.com0O
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://rb.symcb.com/rb.crl0W
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://rb.symcb.com/rb.crt0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://rb.symcd.com0&
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://s.symcd.com0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://www.digicert.com/CPS0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: https://d.symcb.com/cps0%
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: https://d.symcb.com/rpa0
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: https://d.symcb.com/rpa06
Source: Unconfirmed 881090.crdownload.0.dr, chromecache_45.2.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownHTTPS traffic detected: 23.193.120.112:443 -> 192.168.2.4:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.193.120.112:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exeJoe Sandbox Cloud Basic: Detection: suspicious Score: 23 Threat Name: Analyzer: w10x64_raPerma Link
Source: 20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmp.0.drStatic PE information: No import functions for PE file found
Source: 20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmp.0.drStatic PE information: Data appended to the last section found
Source: classification engineClassification label: clean3.win@19/4@6/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmpJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3156 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3156 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmp.0.drStatic PE information: real checksum: 0x4307f8 should be: 0x9c59
Source: 20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmp.0.drStatic PE information: section name: .didata
Source: Unconfirmed 881090.crdownload.0.drStatic PE information: section name: .didata
Source: chromecache_45.2.drStatic PE information: section name: .didata
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Unconfirmed 881090.crdownloadJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: Chrome Cache Entry: 45Jump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmpJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: Chrome Cache Entry: 45
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: Chrome Cache Entry: 45Jump to dropped file
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432073 URL: http://download.lenovo.com/... Startdate: 26/04/2024 Architecture: WINDOWS Score: 3 5 chrome.exe 11 2->5         started        9 chrome.exe 2->9         started        dnsIp3 23 192.168.2.4, 138, 443, 49740 unknown unknown 5->23 25 239.255.255.250 unknown Reserved 5->25 17 C:\Users\...\Unconfirmed 881090.crdownload, PE32 5->17 dropped 19 20f453e0-7c18-44a5-acb0-fd6ec335ba85.tmp, PE32 5->19 dropped 11 chrome.exe 5->11         started        15 chrome.exe 5->15         started        file4 process5 dnsIp6 27 www.google.com 142.250.217.164, 443, 49740, 49750 GOOGLEUS United States 11->27 29 download.lenovo.com 11->29 21 Chrome Cache Entry: 45, PE32 11->21 dropped file7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe0%Avira URL Cloudsafe
SourceDetectionScannerLabelLink
C:\Users\user\Downloads\Unconfirmed 881090.crdownload0%ReversingLabs
C:\Users\user\Downloads\Unconfirmed 881090.crdownload0%VirustotalBrowse
Chrome Cache Entry: 450%ReversingLabs
Chrome Cache Entry: 450%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.217.164
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.211.108
    truefalse
      unknown
      download.lenovo.com
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUUnconfirmed 881090.crdownload.0.dr, chromecache_45.2.drfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          142.250.217.164
          www.google.comUnited States
          15169GOOGLEUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          IP
          192.168.2.4
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1432073
          Start date and time:2024-04-26 11:37:48 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 1s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:9
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean3.win@19/4@6/3
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 192.178.50.67, 142.250.189.142, 172.253.123.84, 34.104.35.123, 184.84.136.138, 40.127.169.103, 23.45.182.93, 23.45.182.85, 20.242.39.171, 192.229.211.108, 20.166.126.56, 172.217.3.67, 142.250.217.238
          • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, download.lenovo.com.akadns.net, slscr.update.microsoft.com, clientservices.googleapis.com, ctldl.windowsupdate.com, e7741.d.akamaiedge.net, a767.dspw65.akamai.net, download.lenovo.com.edgekey.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, clients2.google.com, download.lenovo.com.edgekey.net.globalredir.akadns.net, edgedl.me.gvt1.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, update.googleapis.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):16074
          Entropy (8bit):6.24186527968806
          Encrypted:false
          SSDEEP:192:nBHsbUwRRc/NGHxzPaelqRy2oI3+McuJwmCzB8QQtBkQdeNl2yRiM15+:NeR8NwlPaek5JEIO6QQXPGlWM1Q
          MD5:BBEC9F6E3AF3DDEBEBF992B4D88FE564
          SHA1:8812736E10C3F9BF283B24A54212D489ADD17D41
          SHA-256:96B1767D6EA0ECAFBE1BBA6C59C59B5D31BCD19F0A383B46D47F7D469B47AF3B
          SHA-512:2BACFBEF15E1BC11BAB790013502224998B662253CC342FE742DD4B7E8D5E87A97092534F256A882E5A2BAEE109809CD12DFFC4E6FF65825420E7C7B5B120105
          Malicious:false
          Reputation:low
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..^.................P...l.......[.......p....@...................................C...@......@................... ..q.......H....P...8.......... .B.0....................................@......................d...........>....................text....:.......<.................. ..`.itext..h....P.......@.............. ..`.data...(....p.......T..............@....bss....Xa...............................idata..H............l..............@....didata.>............t..............@....edata..q.... ......................@..@.tls.........0...........................rdata..]....@......................@..@.rsrc....8...P...8..................@..@....................................@..@........................................................
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4336720
          Entropy (8bit):7.987807467068793
          Encrypted:false
          SSDEEP:98304:YN24SDdaUKQyR6Fe9IMr0KcrRjm6ENFjgZWw:c2T9KQSJHyRjm6CjkX
          MD5:E372109B2BD3B0F50EF462D53E9989BA
          SHA1:94D80DFE20689B9C47B32E4C25875731AF4BD20B
          SHA-256:81CB774D3527ACAB6003E200FEF2E285BE7E6042693969FC25E38EDB71A562EC
          SHA-512:CDA8B17EFAEBA6CB6100409C92C8752E703D866E148D57273592C0DB059D6B7B1E649D7D61B34861B3FF286D2E4925FF55241F62197D8911A2F8AF7B7573DC2F
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Reputation:low
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..^.................P...l.......[.......p....@...................................C...@......@................... ..q.......H....P...8.......... .B.0....................................@......................d...........>....................text....:.......<.................. ..`.itext..h....P.......@.............. ..`.data...(....p.......T..............@....bss....Xa...............................idata..H............l..............@....didata.>............t..............@....edata..q.... ......................@..@.tls.........0...........................rdata..]....@......................@..@.rsrc....8...P...8..................@..@....................................@..@........................................................
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:downloaded
          Size (bytes):4336720
          Entropy (8bit):7.987807467068793
          Encrypted:false
          SSDEEP:98304:YN24SDdaUKQyR6Fe9IMr0KcrRjm6ENFjgZWw:c2T9KQSJHyRjm6CjkX
          MD5:E372109B2BD3B0F50EF462D53E9989BA
          SHA1:94D80DFE20689B9C47B32E4C25875731AF4BD20B
          SHA-256:81CB774D3527ACAB6003E200FEF2E285BE7E6042693969FC25E38EDB71A562EC
          SHA-512:CDA8B17EFAEBA6CB6100409C92C8752E703D866E148D57273592C0DB059D6B7B1E649D7D61B34861B3FF286D2E4925FF55241F62197D8911A2F8AF7B7573DC2F
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Reputation:low
          URL:https://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..^.................P...l.......[.......p....@...................................C...@......@................... ..q.......H....P...8.......... .B.0....................................@......................d...........>....................text....:.......<.................. ..`.itext..h....P.......@.............. ..`.data...(....p.......T..............@....bss....Xa...............................idata..H............l..............@....didata.>............t..............@....edata..q.... ......................@..@.tls.........0...........................rdata..]....@......................@..@.rsrc....8...P...8..................@..@....................................@..@........................................................
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Apr 26, 2024 11:38:33.769449949 CEST49675443192.168.2.4173.222.162.32
          Apr 26, 2024 11:38:43.378061056 CEST49675443192.168.2.4173.222.162.32
          Apr 26, 2024 11:38:45.396378040 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.396464109 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.396543026 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.397629976 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.397660017 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.810668945 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.811012983 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.811083078 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.812552929 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.812609911 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.814650059 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.814733028 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.861903906 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:45.861929893 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:45.908761978 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:46.520401001 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.520440102 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:46.520647049 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.522418022 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.522434950 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:46.781027079 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:46.781111956 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.789980888 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.790016890 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:46.790290117 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:46.830672026 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.864064932 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:46.908123970 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.025753021 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.025883913 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.025938034 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.026115894 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.026139021 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.026158094 CEST49741443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.026164055 CEST4434974123.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.074520111 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.074609995 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.074716091 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.075364113 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.075398922 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.333421946 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.333513975 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.355693102 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.355734110 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.356015921 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.358338118 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.404112101 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.583009958 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.583080053 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.583139896 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.584256887 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.584300041 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:47.584328890 CEST49742443192.168.2.423.193.120.112
          Apr 26, 2024 11:38:47.584350109 CEST4434974223.193.120.112192.168.2.4
          Apr 26, 2024 11:38:55.811192989 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:55.811266899 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:38:55.812170029 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:56.168587923 CEST49740443192.168.2.4142.250.217.164
          Apr 26, 2024 11:38:56.168618917 CEST44349740142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:44.957662106 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:44.957703114 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:44.957770109 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:44.958012104 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:44.958026886 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:45.287050009 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:45.291152000 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:45.291218042 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:45.291712046 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:45.295150995 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:45.295299053 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:45.347143888 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:55.280767918 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:55.280931950 CEST44349750142.250.217.164192.168.2.4
          Apr 26, 2024 11:39:55.281086922 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:56.090136051 CEST49750443192.168.2.4142.250.217.164
          Apr 26, 2024 11:39:56.090223074 CEST44349750142.250.217.164192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Apr 26, 2024 11:38:41.842075109 CEST53624511.1.1.1192.168.2.4
          Apr 26, 2024 11:38:41.842906952 CEST53530721.1.1.1192.168.2.4
          Apr 26, 2024 11:38:42.792735100 CEST53602301.1.1.1192.168.2.4
          Apr 26, 2024 11:38:43.459363937 CEST5902753192.168.2.41.1.1.1
          Apr 26, 2024 11:38:43.459537029 CEST5299853192.168.2.41.1.1.1
          Apr 26, 2024 11:38:43.841598034 CEST5274453192.168.2.41.1.1.1
          Apr 26, 2024 11:38:43.841727018 CEST6188053192.168.2.41.1.1.1
          Apr 26, 2024 11:38:44.905806065 CEST6061653192.168.2.41.1.1.1
          Apr 26, 2024 11:38:44.906121969 CEST5114753192.168.2.41.1.1.1
          Apr 26, 2024 11:38:45.031106949 CEST53511471.1.1.1192.168.2.4
          Apr 26, 2024 11:38:45.031519890 CEST53606161.1.1.1192.168.2.4
          Apr 26, 2024 11:38:59.980631113 CEST53514991.1.1.1192.168.2.4
          Apr 26, 2024 11:39:01.415473938 CEST138138192.168.2.4192.168.2.255
          Apr 26, 2024 11:39:18.723150015 CEST53525151.1.1.1192.168.2.4
          Apr 26, 2024 11:39:41.261084080 CEST53600741.1.1.1192.168.2.4
          Apr 26, 2024 11:39:41.787749052 CEST53641031.1.1.1192.168.2.4
          Apr 26, 2024 11:40:09.558032036 CEST53528771.1.1.1192.168.2.4
          TimestampSource IPDest IPChecksumCodeType
          Apr 26, 2024 11:38:44.164876938 CEST192.168.2.41.1.1.1c2d4(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 26, 2024 11:38:43.459363937 CEST192.168.2.41.1.1.10x3af9Standard query (0)download.lenovo.comA (IP address)IN (0x0001)false
          Apr 26, 2024 11:38:43.459537029 CEST192.168.2.41.1.1.10x8c72Standard query (0)download.lenovo.com65IN (0x0001)false
          Apr 26, 2024 11:38:43.841598034 CEST192.168.2.41.1.1.10x3d98Standard query (0)download.lenovo.comA (IP address)IN (0x0001)false
          Apr 26, 2024 11:38:43.841727018 CEST192.168.2.41.1.1.10x3fedStandard query (0)download.lenovo.com65IN (0x0001)false
          Apr 26, 2024 11:38:44.905806065 CEST192.168.2.41.1.1.10x8b40Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Apr 26, 2024 11:38:44.906121969 CEST192.168.2.41.1.1.10x6691Standard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 26, 2024 11:38:43.585174084 CEST1.1.1.1192.168.2.40x8c72No error (0)download.lenovo.comdownload.lenovo.com.akadns.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:38:43.586009026 CEST1.1.1.1192.168.2.40x3af9No error (0)download.lenovo.comdownload.lenovo.com.akadns.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:38:44.102948904 CEST1.1.1.1192.168.2.40x3d98No error (0)download.lenovo.comdownload.lenovo.com.akadns.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:38:44.164813042 CEST1.1.1.1192.168.2.40x3fedNo error (0)download.lenovo.comdownload.lenovo.com.akadns.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:38:45.031106949 CEST1.1.1.1192.168.2.40x6691No error (0)www.google.com65IN (0x0001)false
          Apr 26, 2024 11:38:45.031519890 CEST1.1.1.1192.168.2.40x8b40No error (0)www.google.com142.250.217.164A (IP address)IN (0x0001)false
          Apr 26, 2024 11:38:59.577373028 CEST1.1.1.1192.168.2.40xdfcbNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:38:59.577373028 CEST1.1.1.1192.168.2.40xdfcbNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          Apr 26, 2024 11:39:15.067142010 CEST1.1.1.1192.168.2.40xb39bNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:39:15.067142010 CEST1.1.1.1192.168.2.40xb39bNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          Apr 26, 2024 11:39:33.789200068 CEST1.1.1.1192.168.2.40x2e7cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:39:33.789200068 CEST1.1.1.1192.168.2.40x2e7cNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          Apr 26, 2024 11:39:54.831487894 CEST1.1.1.1192.168.2.40xa21eNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:39:54.831487894 CEST1.1.1.1192.168.2.40xa21eNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          Apr 26, 2024 11:40:24.644520998 CEST1.1.1.1192.168.2.40xf7a6No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Apr 26, 2024 11:40:24.644520998 CEST1.1.1.1192.168.2.40xf7a6No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
          • fs.microsoft.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.44974123.193.120.112443
          TimestampBytes transferredDirectionData
          2024-04-26 09:38:46 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-04-26 09:38:47 UTC466INHTTP/1.1 200 OK
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          Content-Type: application/octet-stream
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          Server: ECAcc (chd/0712)
          X-CID: 11
          X-Ms-ApiVersion: Distribute 1.2
          X-Ms-Region: prod-eus-z1
          Cache-Control: public, max-age=77146
          Date: Fri, 26 Apr 2024 09:38:46 GMT
          Connection: close
          X-CID: 2


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.44974223.193.120.112443
          TimestampBytes transferredDirectionData
          2024-04-26 09:38:47 UTC239OUTGET /fs/windows/config.json HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          Accept-Encoding: identity
          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
          Range: bytes=0-2147483646
          User-Agent: Microsoft BITS/7.8
          Host: fs.microsoft.com
          2024-04-26 09:38:47 UTC530INHTTP/1.1 200 OK
          Content-Type: application/octet-stream
          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
          ApiVersion: Distribute 1.1
          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
          X-Azure-Ref: 0DZ+oYgAAAABSxwJpMgMuSLkfS640ajfFQVRBRURHRTEyMTkAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
          Cache-Control: public, max-age=77158
          Date: Fri, 26 Apr 2024 09:38:47 GMT
          Content-Length: 55
          Connection: close
          X-CID: 2
          2024-04-26 09:38:47 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:11:38:36
          Start date:26/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:11:38:39
          Start date:26/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:11:38:42
          Start date:26/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://download.lenovo.com/pccbbs/desktop/u1ra101us17.exe"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:4
          Start time:11:38:43
          Start date:26/04/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3156 --field-trial-handle=2212,i,535787671628062436,16230548482103842467,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly