Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ATTT003.html

Overview

General Information

Sample name:ATTT003.html
Analysis ID:1603844
MD5:27119ebcb5a3b43df57241ed6aa4dc2b
SHA1:781c52b4c8d8b3b3d2e02d4c142499bb0beb2062
SHA256:4d55bff057dfa0d3934f7131802133d4511c812bfd8c5b5a7e2340945f606561
Infos:

Detection

HTMLPhisher
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish10
AI detected suspicious Javascript
Detected javascript redirector / loader
HTML document with suspicious title
HTML file submission containing password form
HTML sample is only containing javascript code
Creates files inside the system directory
Deletes files inside the Windows folder
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Invalid T&C link found
None HTTPS page querying sensitive user data (password, username or email)

Classification

  • System is w11x64_office
  • chrome.exe (PID: 1092 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\ATTT003.html" MD5: 290DF23002E9B52249B5549F0C668A86)
    • chrome.exe (PID: 2848 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2148,i,15482744133375623234,5143722552884581729,262144 --variations-seed-version=20250129-180207.876000 --mojo-platform-channel-handle=2172 /prefetch:11 MD5: 290DF23002E9B52249B5549F0C668A86)
    • chrome.exe (PID: 4248 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --string-annotations=is-enterprise-managed=no --field-trial-handle=4540,i,15482744133375623234,5143722552884581729,262144 --variations-seed-version=20250129-180207.876000 --mojo-platform-channel-handle=5108 /prefetch:14 MD5: 290DF23002E9B52249B5549F0C668A86)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
2.2.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    1.1.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: Yara matchFile source: 2.2.pages.csv, type: HTML
      Source: Yara matchFile source: 1.1.pages.csv, type: HTML
      Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/Desktop/ATTT003.html... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and heavy obfuscation. The use of `eval` and the `Function` constructor to execute remote code, along with the transmission of potentially sensitive data to an unknown domain, are clear indicators of malicious intent. The extensive obfuscation of the code and URLs further reinforces the suspicion of malicious activity. Overall, this script poses a significant security risk and should be treated with caution.
      Source: ATTT003.htmlHTTP Parser: Low number of body elements: 0
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlTab title: Sign in to your account
      Source: file:///C:/Users/user/Desktop/ATTT003.html#Tab title: Sign in to your account
      Source: ATTT003.htmlHTTP Parser: <script>let rh13z8jemt = 'eWFuc2FyaUBjd2luZ2F0ZS5jb20='; // Jowl labore sirloin voluptate.let lXX2;!function(){const Uf2H=Array.prototype.slice.call(arguments);return eval("(function MZgG(vfoy){const PCgy=zkty(vfoy,Hs6x(MZgG.toString()));try{let ...
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: Number of links: 0
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
      Source: ATTT003.htmlHTTP Parser: Base64 decoded: yansari@cwingate.com
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: Title: Sign in to your account does not match URL
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: Invalid link: Privacy statement
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: <input type="password" .../> found
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: No <meta name="copyright".. found
      Source: global trafficHTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application%2Fx-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=c498711f02654edca8a715ca6e1cb4d4-dc31da17-845c-4cca-84e5-547d05dad708-6945&upload-time=1738331999058&w=0&anoncknm=al_app_anon&NoResponseBody=true HTTP/1.1Accept-Encoding: gzip, deflateContent-Length: 2746Content-Type: application/json; charset=UTF-8Host: browser.events.data.msn.cnConnection: Keep-AliveCache-Control: no-cache
      Source: Joe Sandbox ViewIP Address: 104.18.10.207 104.18.10.207
      Source: Joe Sandbox ViewIP Address: 104.18.10.207 104.18.10.207
      Source: Joe Sandbox ViewIP Address: 2.23.209.34 2.23.209.34
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.15
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
      Source: unknownTCP traffic detected without corresponding DNS query: 2.21.65.132
      Source: unknownTCP traffic detected without corresponding DNS query: 2.21.65.132
      Source: unknownTCP traffic detected without corresponding DNS query: 2.21.65.132
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.40
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.40
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.40
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.40
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /ajax/libs/popper.js/1.12.9/umd/popper.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveOrigin: nullsec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36sec-ch-ua: "Google Chrome";v="131", "Chromium";v="131", "Not_A Brand";v="24"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /jquery-3.2.1.slim.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveOrigin: nullsec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36sec-ch-ua: "Google Chrome";v="131", "Chromium";v="131", "Not_A Brand";v="24"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /ajax/libs/popper.js/1.12.9/umd/popper.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /jquery-3.2.1.slim.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /attach%2Fbootstrap.min.js HTTP/1.1Host: 1419993777-1317754460.cos.ap-singapore.myqcloud.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36sec-ch-ua: "Google Chrome";v="131", "Chromium";v="131", "Not_A Brand";v="24"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /attach%2Fbootstrap.min.js HTTP/1.1Host: 1419993777-1317754460.cos.ap-singapore.myqcloud.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /r/r1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
      Source: global trafficDNS traffic detected: DNS query: stackpath.bootstrapcdn.com
      Source: global trafficDNS traffic detected: DNS query: 1419993777-1317754460.cos.ap-singapore.myqcloud.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: ableg.filevaultaccounting.com
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
      Source: unknownHTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application%2Fx-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=c498711f02654edca8a715ca6e1cb4d4-dc31da17-845c-4cca-84e5-547d05dad708-6945&upload-time=1738331999058&w=0&anoncknm=al_app_anon&NoResponseBody=true HTTP/1.1Accept-Encoding: gzip, deflateContent-Length: 2746Content-Type: application/json; charset=UTF-8Host: browser.events.data.msn.cnConnection: Keep-AliveCache-Control: no-cache
      Source: chromecache_73.1.dr, chromecache_71.1.drString found in binary or memory: http://opensource.org/licenses/MIT).
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53968
      Source: unknownNetwork traffic detected: HTTP traffic on port 53973 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53966
      Source: unknownNetwork traffic detected: HTTP traffic on port 53992 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53996 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53961
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54013
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53964
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54018
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54017
      Source: unknownNetwork traffic detected: HTTP traffic on port 53982 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53957 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53986 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 54013 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53978
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53977
      Source: unknownNetwork traffic detected: HTTP traffic on port 53993 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53966 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53970
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53974
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53973
      Source: unknownNetwork traffic detected: HTTP traffic on port 53977 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53990 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53989
      Source: unknownNetwork traffic detected: HTTP traffic on port 54001 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53982
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53981
      Source: unknownNetwork traffic detected: HTTP traffic on port 54018 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53961 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53986
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53985
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53984
      Source: unknownNetwork traffic detected: HTTP traffic on port 53984 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53959 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53990
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54001
      Source: unknownNetwork traffic detected: HTTP traffic on port 53978 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53991 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53995 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53958
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53957
      Source: unknownNetwork traffic detected: HTTP traffic on port 53970 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53974 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53968 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53989 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53959
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53993
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53992
      Source: unknownNetwork traffic detected: HTTP traffic on port 53964 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53991
      Source: unknownNetwork traffic detected: HTTP traffic on port 54017 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53996
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53995
      Source: unknownNetwork traffic detected: HTTP traffic on port 53958 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53981 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 53985 -> 443
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir1092_1364403511Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir1092_1364403511Jump to behavior
      Source: classification engineClassification label: mal68.phis.winHTML@16/28@30/12
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\ATTT003.html"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2148,i,15482744133375623234,5143722552884581729,262144 --variations-seed-version=20250129-180207.876000 --mojo-platform-channel-handle=2172 /prefetch:11
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --string-annotations=is-enterprise-managed=no --field-trial-handle=4540,i,15482744133375623234,5143722552884581729,262144 --variations-seed-version=20250129-180207.876000 --mojo-platform-channel-handle=5108 /prefetch:14
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2148,i,15482744133375623234,5143722552884581729,262144 --variations-seed-version=20250129-180207.876000 --mojo-platform-channel-handle=2172 /prefetch:11Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --string-annotations=is-enterprise-managed=no --field-trial-handle=4540,i,15482744133375623234,5143722552884581729,262144 --variations-seed-version=20250129-180207.876000 --mojo-platform-channel-handle=5108 /prefetch:14Jump to behavior

      Stealing of Sensitive Information

      barindex
      Source: file:///C:/Users/user/Desktop/ATTT003.htmlHTTP Parser: file:///C:/Users/user/Desktop/ATTT003.html
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      Browser Extensions
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      File Deletion
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      file:///C:/Users/user/Desktop/ATTT003.html0%Avira URL Cloudsafe
      https://1419993777-1317754460.cos.ap-singapore.myqcloud.com/attach%2Fbootstrap.min.js0%Avira URL Cloudsafe
      file:///C:/Users/user/Desktop/ATTT003.html#0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      stackpath.bootstrapcdn.com
      104.18.10.207
      truefalse
        high
        sgp.file.myqcloud.com
        43.152.64.207
        truefalse
          high
          e329293.dscd.akamaiedge.net
          2.23.209.34
          truefalse
            high
            s-part-0044.t-0009.fb-t-msedge.net
            13.107.253.72
            truefalse
              high
              ableg.filevaultaccounting.com
              104.21.64.1
              truefalse
                high
                code.jquery.com
                151.101.130.137
                truefalse
                  high
                  cdnjs.cloudflare.com
                  104.17.24.14
                  truefalse
                    high
                    maxcdn.bootstrapcdn.com
                    104.18.11.207
                    truefalse
                      high
                      s-part-0017.t-0009.t-msedge.net
                      13.107.246.45
                      truefalse
                        high
                        www.google.com
                        172.217.23.100
                        truefalse
                          high
                          1419993777-1317754460.cos.ap-singapore.myqcloud.com
                          unknown
                          unknowntrue
                            unknown
                            aadcdn.msftauth.net
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              file:///C:/Users/user/Desktop/ATTT003.htmltrue
                              • Avira URL Cloud: safe
                              unknown
                              https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.jsfalse
                                high
                                https://browser.events.data.msn.cn/OneCollector/1.0?cors=true&content-type=application%2Fx-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=c498711f02654edca8a715ca6e1cb4d4-dc31da17-845c-4cca-84e5-547d05dad708-6945&upload-time=1738331999058&w=0&anoncknm=al_app_anon&NoResponseBody=truefalse
                                  high
                                  https://code.jquery.com/jquery-3.2.1.slim.min.jsfalse
                                    high
                                    file:///C:/Users/user/Desktop/ATTT003.html#true
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://1419993777-1317754460.cos.ap-singapore.myqcloud.com/attach%2Fbootstrap.min.jsfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://opensource.org/licenses/MIT).chromecache_73.1.dr, chromecache_71.1.drfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      104.18.10.207
                                      stackpath.bootstrapcdn.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      2.23.209.34
                                      e329293.dscd.akamaiedge.netEuropean Union
                                      1273CWVodafoneGroupPLCEUfalse
                                      104.21.64.1
                                      ableg.filevaultaccounting.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      151.101.130.137
                                      code.jquery.comUnited States
                                      54113FASTLYUSfalse
                                      43.153.232.152
                                      unknownJapan4249LILLY-ASUSfalse
                                      104.17.24.14
                                      cdnjs.cloudflare.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      104.18.11.207
                                      maxcdn.bootstrapcdn.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      172.217.23.100
                                      www.google.comUnited States
                                      15169GOOGLEUSfalse
                                      43.152.64.207
                                      sgp.file.myqcloud.comJapan4249LILLY-ASUSfalse
                                      IP
                                      192.168.2.6
                                      192.168.2.24
                                      192.168.2.23
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1603844
                                      Start date and time:2025-01-31 14:59:11 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 41s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:defaultwindowshtmlcookbook.jbs
                                      Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
                                      Number of analysed new started processes analysed:15
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:ATTT003.html
                                      Detection:MAL
                                      Classification:mal68.phis.winHTML@16/28@30/12
                                      EGA Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .html
                                      • Exclude process from analysis (whitelisted): SystemSettingsBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 217.20.57.18, 172.217.18.110, 172.217.16.195, 216.58.206.46, 64.233.167.84, 142.250.186.138, 142.250.185.174, 142.250.185.170, 172.217.16.206, 142.250.186.174, 142.250.185.202, 172.217.16.202, 142.250.186.42, 142.250.181.234, 216.58.212.170, 142.250.185.74, 142.250.185.106, 142.250.74.202, 216.58.206.74, 142.250.186.74, 142.250.186.106, 142.250.185.234, 142.250.186.170, 142.250.185.138, 2.22.50.117, 172.217.18.14, 142.250.186.110, 172.217.18.106, 142.250.184.202, 172.217.18.10, 142.250.184.234, 216.58.206.42, 142.250.185.110, 142.250.184.227, 142.250.184.238, 142.250.185.78, 199.232.210.172, 13.107.253.72, 13.107.246.45, 4.245.163.56, 52.149.20.212
                                      • Excluded domains from analysis (whitelisted): clients1.google.com, accounts.google.com, slscr.update.microsoft.com, ajax.googleapis.com, aadcdnoriginwus2.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, aadcdn.msauth.net, www.googleapis.com, firstparty-azurefd-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, redirector.gvt1.com, update.googleapis.com, aadcdnoriginwus2.afd.azureedge.net, clients.l.google.com, c.pki.goog, optimizationguide-pa.googleapis.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      No simulations