Windows
Analysis Report
https://2fa.com-token-auth.com/XaDg2clM2YnpKT1lnV2s1NzFwQUphUGNLajE5WkFsWG1aYVVxamhmckZlM3VwMkZkQktJNlMxazRhenRTMFdNdEdybll5UExNM0F1ODd5NU4rblJ3V1hKRVhTZDZDZGhUSHhiY2Z6RERJYjVHMVpKbHRuVnJQdjdTN0x5UFdWTVBDUi9jdEFwNlU1YnExRXJlK2FVeHRqZWx3TFU2WStPd0lMQnNvR2tzYjBLcXQ3cDJveUFabEYxUmk1dTFlYTRPZFN1aHdEMjNH
Overview
General Information
Detection
KnowBe4
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Yara detected KnowBe4 simulated phishing
Stores files to the Windows start menu directory
Classification
- System is w10x64_ra
chrome.exe (PID: 1240 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) chrome.exe (PID: 5584 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2116 --fi eld-trial- handle=204 4,i,687169 8712985736 363,468007 9741213650 170,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
chrome.exe (PID: 6568 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://2fa.c om-token-a uth.com/Xa Dg2clM2Ynp KT1lnV2s1N zFwQUphUGN LajE5WkFsW G1aYVVxamh mckZlM3VwM kZkQktJNlM xazRhenRTM FdNdEdybll 5UExNM0F1O Dd5NU4rblJ 3V1hKRVhTZ DZDZGhUSHh iY2Z6RERJY jVHMVpKbHR uVnJQdjdTN 0x5UFdWTVB DUi9jdEFwN lU1YnExRXJ lK2FVeHRqZ Wx3TFU2WSt Pd0lMQnNvR 2tzYjBLcXQ 3cDJveUFab EYxUmk1dTF lYTRPZFN1a HdEMjNHZXU xaHRMOVdae TBISklEMUp ZME9nPT0tL WR0bHdLN3l qZUJPVVI5Y nAtLXRpa1l sc2hYNnVaU kF4TVhXMTl 2M1E9PQ==? cid=239916 1896" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_KnowBe4 | Yara detected KnowBe4 simulated phishing | Joe Security |
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Phishing |
---|
Source: | File source: |
Source: | HTTP Parser: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 1 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s3.amazonaws.com | 16.182.38.208 | true | false | high | |
static.knowbe4.com | 18.66.147.27 | true | false | high | |
www.google.com | 142.250.186.164 | true | false | high | |
landing.training.knowbe4.com | 3.208.157.62 | true | false | high | |
ipv4.imgur.map.fastly.net | 199.232.192.193 | true | false | high | |
2fa.com-token-auth.com | unknown | unknown | false | high | |
account.secured-login.net | unknown | unknown | false | high | |
i.imgur.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | high | ||
false |
| unknown | |
false |
| unknown | |
false | unknown | ||
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
199.232.192.193 | ipv4.imgur.map.fastly.net | United States | 54113 | FASTLYUS | false | |
54.231.170.152 | unknown | United States | 16509 | AMAZON-02US | false | |
16.182.38.208 | s3.amazonaws.com | United States | unknown | unknown | false | |
3.208.157.62 | landing.training.knowbe4.com | United States | 14618 | AMAZON-AESUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
18.66.147.27 | static.knowbe4.com | United States | 3 | MIT-GATEWAYSUS | false |
IP |
---|
192.168.2.17 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1611316 |
Start date and time: | 2025-02-10 19:22:30 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Sample URL: | https://2fa.com-token-auth.com/XaDg2clM2YnpKT1lnV2s1NzFwQUphUGNLajE5WkFsWG1aYVVxamhmckZlM3VwMkZkQktJNlMxazRhenRTMFdNdEdybll5UExNM0F1ODd5NU4rblJ3V1hKRVhTZDZDZGhUSHhiY2Z6RERJYjVHMVpKbHRuVnJQdjdTN0x5UFdWTVBDUi9jdEFwNlU1YnExRXJlK2FVeHRqZWx3TFU2WStPd0lMQnNvR2tzYjBLcXQ3cDJveUFabEYxUmk1dTFlYTRPZFN1aHdEMjNHZXUxaHRMOVdaeTBISklEMUpZME9nPT0tLWR0bHdLN3lqZUJPVVI5YnAtLXRpa1lsc2hYNnVaUkF4TVhXMTl2M1E9PQ==?cid=2399161896 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal48.phis.win@17/33@20/8 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, TextInputHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 172.217.18.14, 172.217.16.195, 142.250.110.84, 142.250.74.206, 216.58.206.78, 142.250.186.142, 2.23.77.188, 217.20.57.19, 142.250.181.238, 172.217.16.206, 216.58.206.35, 142.250.184.238, 142.250.186.110, 4.175.87.197, 184.28.90.27, 13.107.246.44, 13.107.5.88, 40.126.31.3, 2.21.65.132
- Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, redirector.gvt1.com, login.live.com, evoke-windowsservices-tas.msedge.net, update.googleapis.com, clients.l.google.com
- Not all processes where analyzed, report is missing behavior information
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: https://2fa.com-token-auth.com/XaDg2clM2YnpKT1lnV2s1NzFwQUphUGNLajE5WkFsWG1aYVVxamhmckZlM3VwMkZkQktJNlMxazRhenRTMFdNdEdybll5UExNM0F1ODd5NU4rblJ3V1hKRVhTZDZDZGhUSHhiY2Z6RERJYjVHMVpKbHRuVnJQdjdTN0x5UFdWTVBDUi9jdEFwNlU1YnExRXJlK2FVeHRqZWx3TFU2WStPd0lMQnNvR2tzYjBLcXQ3cDJveUFabEYxUmk1dTFlYTRPZFN1aHdEMjNHZXUxaHRMOVdaeTBISklEMUpZME9nPT0tLWR0bHdLN3lqZUJPVVI5YnAtLXRpa1lsc2hYNnVaUkF4TVhXMTl2M1E9PQ==?cid=2399161896
⊘No simulations
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.99610404857946 |
Encrypted: | false |
SSDEEP: | 48:8SSdCTX78HHQcidAKZdA1JehwiZUklqehRy+3:8Srsr+y |
MD5: | BD192AB63960EDFB10D314F279CDEB1B |
SHA1: | AED5688C262BBF59728FD8BA25490ACBC88D3D30 |
SHA-256: | 16055A683F3C66735BDFCBDD0EF55F65E7A99D967CD8575E0DDC2644DA6204DF |
SHA-512: | B97B5F45870A4CB8967C68184E85A64B689226EDC099547AA2A0DBE2B9C06DB27E8FA303D48BC0E5E18AB4CE0A68F1A2DF924FC40A332106F4FB4F6A8A00B835 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.011053590483634 |
Encrypted: | false |
SSDEEP: | 48:84SdCTX78HHQcidAKZdA10eh/iZUkAQkqehuy+2:84rsJ9Qzy |
MD5: | 71756E5C36F177F1A4B26EAEF719F2EC |
SHA1: | E8297C0F5986F8918AFBC0C35889B8716C441EB7 |
SHA-256: | 371303B2BE849628481B31935F164BEE1EDE6B90B29D5E3E08147011A5D8806A |
SHA-512: | DB4AA75E441448D784F4708375A045B76221D5BC0B1F55DC5968A246CF4C61573EF875D4065DE9AF11B25F2A11BE46A4A0988F4FDF7345DD9EBD4CF5C89B849A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.018991681077779 |
Encrypted: | false |
SSDEEP: | 48:8eSdCTX78jHQcidAKZdA14tIeh7sFiZUkmgqeh7sYy+BX:8ersFnqy |
MD5: | 17E0534166CCE7E32214A1B104A365D8 |
SHA1: | E4E928AF0E1A47AC946CFA3FF53B0B9F1A547767 |
SHA-256: | 617AF03EE527DA6135106B62EDE18FBE1810C11A250CC8337764BAF8E1249F00 |
SHA-512: | D9B2F28CD41E0AAF62603AD18F7E18196C5654C11DFB3C3F042FEF0B4D48EF8715DB326958E300CE5A9EE65346E99B8AA0D243BBE984773CF267ACF461068CA2 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.010592530063729 |
Encrypted: | false |
SSDEEP: | 48:8hSdCTX78HHQcidAKZdA1behDiZUkwqehCy+R:8hrs6Qy |
MD5: | B9D06C499C0C3F4D79BA6C3B2F2AF39D |
SHA1: | 8F6E6FC1889BB5BE242B65AA2DA468141426B76C |
SHA-256: | 11F36EB9A3A1980194CE22422EE86987A38210722056210FFCF8B45B28FE2424 |
SHA-512: | 195B547AA7C89F02CCA52D8C1587BF31DAEAF640B431A08D110905F051A87A8029D8D069516838852C7069A7A876221D4E19D94E54D6D32307F3896F01556E31 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.000649726072077 |
Encrypted: | false |
SSDEEP: | 48:8iSdCTX78HHQcidAKZdA1VehBiZUk1W1qehEy+C:8irsa9ky |
MD5: | 31593164248708B70A65D058E498A651 |
SHA1: | D911BD66FEE9EA43DB32AA0A1BBEC0297EA77A54 |
SHA-256: | 9F52CAE89F43B2EFF85FBD966BEFA298E7870A78A51146857C0AA7449241E2BC |
SHA-512: | FC3B91F8AEB3DE61EA3B26F10A95F7D72D21B420905D1905691D68E91A57FC955BA8A9C383BB4B5345CD702FE1A20621AAAA42EE13BEC361D28E2D59AC0EC2B1 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 4.012669894926756 |
Encrypted: | false |
SSDEEP: | 48:8wSdCTX78HHQcidAKZdA1duT6ehOuTbbiZUk5OjqehOuTbqy+yT+:8wrsITTTbxWOvTbqy7T |
MD5: | BC5B0E1EBFA3D2166D9584DA40B1860D |
SHA1: | E8E2CEBA46228BB48FFA799CAD344221B470A01E |
SHA-256: | D15390EA8D5CD797DABAECEA9D6AFAA8B1B1D2843994D4F5280C9743B52B9B88 |
SHA-512: | 92F316B0A7248B44680DC5132051072DBBAA3C4AED483227FC50DAA7CC125FF5678F04EFE98288EB843B1B6A97AB46DEB7F40AF2C481E93AD22B1948C523D1F9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 26215 |
Entropy (8bit): | 7.9453849905719185 |
Encrypted: | false |
SSDEEP: | 768:HUac4ouUhUGBgwj/VrMXV8BYmbydDCAdx:04XUhVxNMXKBYjdndx |
MD5: | F8AC39EA88DB7F7B824BA6703458CB8E |
SHA1: | 5CA66C9C9941A149B4394C90AF81AB82110B14DE |
SHA-256: | 92A8C576146BC93A8C34BD32348CADEC152B3FE1DF030A358EC88C4F2FD07A34 |
SHA-512: | 80DBEFAAF01EA5B59344ABB2C54C03E933BD4F237539E9E19EFD342725C47788BF08F0831D8D2FC7AE367BB13F34F1B42E8B6A09D362397BCB0EAFB981D4193A |
Malicious: | false |
Reputation: | low |
URL: | https://s3.amazonaws.com/helpimg/landing_pages/images/stoplookthink.jpg |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 94885 |
Entropy (8bit): | 6.056735943303183 |
Encrypted: | false |
SSDEEP: | 1536:2YbYUgk3oG3RyFqBsRm/i6GkFc5FIF+pyjhG4lNi1U7+knYHp31lPSeq:gkRRyymPm |
MD5: | CBA32DEB5BB05C46AB84E88AD40569CA |
SHA1: | 12D7FF5E2ACF145B45CD19540BD785E41AAE1C20 |
SHA-256: | BDE8F382E42AB45926D55B59856C648F61E74DB8B282868591594C14F203EF54 |
SHA-512: | C2AE9A0E0608025A81CD064A0C52CFFD0858FB9AAC96D828D94D263FF3D729C8D0B2C0F3569409110D55A56B285205E08138518DD10F5860466FF81D03059989 |
Malicious: | false |
Reputation: | low |
URL: | https://account.secured-login.net/pages/f2a999cc0255ed490aca07e96810a28b/XaDg2clM2YnpKT1lnV2s1NzFwQUphUGNLajE5WkFsWG1aYVVxamhmckZlM3VwMkZkQktJNlMxazRhenRTMFdNdEdybll5UExNM0F1ODd5NU4rblJ3V1hKRVhTZDZDZGhUSHhiY2Z6RERJYjVHMVpKbHRuVnJQdjdTN0x5UFdWTVBDUi9jdEFwNlU1YnExRXJlK2FVeHRqZWx3TFU2WStPd0lMQnNvR2tzYjBLcXQ3cDJveUFabEYxUmk1dTFlYTRPZFN1aHdEMjNHZXUxaHRMOVdaeTBISklEMUpZME9nPT0tLWR0bHdLN3lqZUJPVVI5YnAtLXRpa1lsc2hYNnVaUkF4TVhXMTl2M1E9PQ== |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 380848 |
Entropy (8bit): | 5.202109831427653 |
Encrypted: | false |
SSDEEP: | 3072:sHNwcv9VBQpLl88SMBQ47GKYQa8ITLYI9fB8NJOD3EAjV2Uc9M1U+/uz+rSLyCAV:sHWK9VC78UBQ47GKXIvd9sOVAqtNX |
MD5: | 67A0C4DBD69561F3226243034423F1ED |
SHA1: | 88C1B5C7EBBFA24D8196290206BF544F28EEB406 |
SHA-256: | 74B9F1CFE7CAD31AE1C1901200890B76676E6D92AC817641F5EF9BFD552F2110 |
SHA-512: | D5326C46E2FC443AA0C75DB573B39957514BD025235ADB5F16797133394E1AFD0A6458B38DA8220BF7558333E8F2334532FBCC4CD9DD4DD5811AAC403B498542 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 537 |
Entropy (8bit): | 5.846043145489213 |
Encrypted: | false |
SSDEEP: | 12:3R+xSKtic2fQM7hSdd6xWDRt+Pash+Au3KMm3w5CxWd4AEdeIQL:33KE3rGgWrIaw+PKHmDNEkj |
MD5: | 4DE7EECE261F227FC75F98D0AECAFDDA |
SHA1: | A7D661322A9DF52F0ADCEE648A7472C348713ACE |
SHA-256: | EE1059881621B15018719CD700C0ABCDE015871F93BA12B246828FD6D40F970F |
SHA-512: | 2A36DD03307E1FEEDB8E314FE96664805E86BE14F0C2D991243E18E120B4103A7D4FD39B49015CA8AAB6AE6C0E8C76E001F061A26C22B6316FA20106BD864953 |
Malicious: | false |
Reputation: | low |
URL: | https://2fa.com-token-auth.com/XaDg2clM2YnpKT1lnV2s1NzFwQUphUGNLajE5WkFsWG1aYVVxamhmckZlM3VwMkZkQktJNlMxazRhenRTMFdNdEdybll5UExNM0F1ODd5NU4rblJ3V1hKRVhTZDZDZGhUSHhiY2Z6RERJYjVHMVpKbHRuVnJQdjdTN0x5UFdWTVBDUi9jdEFwNlU1YnExRXJlK2FVeHRqZWx3TFU2WStPd0lMQnNvR2tzYjBLcXQ3cDJveUFabEYxUmk1dTFlYTRPZFN1aHdEMjNHZXUxaHRMOVdaeTBISklEMUpZME9nPT0tLWR0bHdLN3lqZUJPVVI5YnAtLXRpa1lsc2hYNnVaUkF4TVhXMTl2M1E9PQ==?cid=2399161896 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3168 |
Entropy (8bit): | 7.704911325185365 |
Encrypted: | false |
SSDEEP: | 48:37TcgUFv95NwPpK+adjaoVaqzGfYdIO+bExaLM2uO+xVwvpoP:ftUFvdy8dXVaGNdIb1Lz8PwvpY |
MD5: | A907E6E737788176B026FA71DFE8AFFE |
SHA1: | 6844236F638CEDCD652EB0A805476A1A13376CF5 |
SHA-256: | FC5E7621BA0E98C5C6728E3B2BDF802311C0A0953A05E60A7551CB0C7BED00A9 |
SHA-512: | 3A17E66931A15B5C6553DAE241C5A7BB40240699F0608F92ED940CB203CBEA3031CB0FAC23F9C962F50D573F56DB27A3369F1A38ED1AEA0168D7E707803CA27A |
Malicious: | false |
Reputation: | low |
URL: | https://account.secured-login.net/assets/sei-flag-90af55d793544fe1893f26677661a4252761afbe811fab0eced85c67bc82f984.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20217 |
Entropy (8bit): | 7.976064268012866 |
Encrypted: | false |
SSDEEP: | 384:xNlMKDW14cJB4Ri7iDmTvN0BOlU6L9fDN47BmFyeestGw3jIZz:blTDwQiZtlU6LtDNO4XXq |
MD5: | 7DAB8570684D6575F34F508645B9953F |
SHA1: | DA06B1764C8452D9BF2CE15F44D976D2A3B5A4EB |
SHA-256: | 0ECFBE99C21DFA73D727E51A4D9F7EA1CAF418E05BB941864108FB3542CF90CF |
SHA-512: | D62671D3F2D7A3885E64C905A7FA527575297669FBD9AA41156085C6A88329122D29C507C79505ABA748241878D7F0A084EF561B6B33D72FFD9A1D97B021B60D |
Malicious: | false |
Reputation: | low |
URL: | https://static.knowbe4.com/managed_services/CrateandBarrelLogo.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1471 |
Entropy (8bit): | 4.754611179426391 |
Encrypted: | false |
SSDEEP: | 24:y40r8CQo40agx40mC400XLaR404hZYmx40vGk40vG/I40vGhH40VhZ40UrCmn:xdDgCFEiBZgnTOHTn |
MD5: | 15E89F9684B18EC43EE51F8D62A787C3 |
SHA1: | 9CBAAACEAE96845ECD3497F41EE3B02588ABEC11 |
SHA-256: | 16F13E16A7EF02FB6F94250AA1931DED83DBEE5D9FAD278E33DD5792D085194F |
SHA-512: | 79E0110A045F28437D192290AC9789270CB0D4E676A985564746DB439992D867BA89639D7738E2A7F7D83BBF37D9A02CAA2AE1DC4E0EE2519797E5840A47FABE |
Malicious: | false |
Reputation: | low |
URL: | https://account.secured-login.net/assets/landing-watermark-8487e36eef1bec74f06631f19fea0aa171c208e2976373cda5bd0a4b9e230903.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5934 |
Entropy (8bit): | 4.931906350831601 |
Encrypted: | false |
SSDEEP: | 96:fiIg+VsCy59sZUAcYLoX9U0JePXOBaxAzi80JeaOV7Fzu/B3qn6dk/nGgje/mPFd:fiP+VbyPsZxcYLot7SXsaCQuu/Nq66/v |
MD5: | 134D934420B13974981A9634B7380865 |
SHA1: | 18C01D3711CF8C21C1CD0CF544002358C1C929C6 |
SHA-256: | B3C447F15FCE33DFA869B9D2190364509EDE3937AE05B51BA394A78E28C244BA |
SHA-512: | 7FAE93AD1895DCF7CC58FC2C477BA51D3EB7D7B2884FE117E21C0A7E0160981EB53D23A6ACDA07DA594AF6984F52E1B57B6F157F84220729C7EEBF9AE062C092 |
Malicious: | false |
Reputation: | low |
URL: | https://account.secured-login.net/assets/sei-styles-1837e0b6e1baaf1af90438028a176241b70a365a8a09ff4bf668cf3bf9e3c759.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 10296 |
Entropy (8bit): | 4.876678690742844 |
Encrypted: | false |
SSDEEP: | 192:WLgclXZtCZYjLHgQksZzRBc3quP4ydxioPB1ePvQnR9cT98jCKnhmb/y0UmWp2Nd:6NPf |
MD5: | 0893E60889D2172A6361B919D8C203DC |
SHA1: | EF83F5E4F31BE018DCD0B236FCAA28EF7F3FF8C8 |
SHA-256: | 23714601639230B9AD2BC2728040A5E760FA5B0500DFB76E552BCB29FCBB7A62 |
SHA-512: | D62DC11EC26C495F9AE8FBF91913CD924D9973A47CD73E147047059142C92F49EABF702C673237AD48A6E63BE68D27150DB4425D03B9BE13332C811A760C47F3 |
Malicious: | false |
Reputation: | low |
URL: | https://s3.amazonaws.com/helpimg/landing_pages/css/flags.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 380848 |
Entropy (8bit): | 5.202109831427653 |
Encrypted: | false |
SSDEEP: | 3072:sHNwcv9VBQpLl88SMBQ47GKYQa8ITLYI9fB8NJOD3EAjV2Uc9M1U+/uz+rSLyCAV:sHWK9VC78UBQ47GKXIvd9sOVAqtNX |
MD5: | 67A0C4DBD69561F3226243034423F1ED |
SHA1: | 88C1B5C7EBBFA24D8196290206BF544F28EEB406 |
SHA-256: | 74B9F1CFE7CAD31AE1C1901200890B76676E6D92AC817641F5EF9BFD552F2110 |
SHA-512: | D5326C46E2FC443AA0C75DB573B39957514BD025235ADB5F16797133394E1AFD0A6458B38DA8220BF7558333E8F2334532FBCC4CD9DD4DD5811AAC403B498542 |
Malicious: | false |
Reputation: | low |
URL: | https://account.secured-login.net/assets/application-237cb5c4f318687625f8ccf2f42de3fc20238bfe267384653491a6bba8c8f6f5.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26215 |
Entropy (8bit): | 7.9453849905719185 |
Encrypted: | false |
SSDEEP: | 768:HUac4ouUhUGBgwj/VrMXV8BYmbydDCAdx:04XUhVxNMXKBYjdndx |
MD5: | F8AC39EA88DB7F7B824BA6703458CB8E |
SHA1: | 5CA66C9C9941A149B4394C90AF81AB82110B14DE |
SHA-256: | 92A8C576146BC93A8C34BD32348CADEC152B3FE1DF030A358EC88C4F2FD07A34 |
SHA-512: | 80DBEFAAF01EA5B59344ABB2C54C03E933BD4F237539E9E19EFD342725C47788BF08F0831D8D2FC7AE367BB13F34F1B42E8B6A09D362397BCB0EAFB981D4193A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1666 |
Entropy (8bit): | 7.843362903299294 |
Encrypted: | false |
SSDEEP: | 48:1E3hTvNbvJkGGv0nnr5I2rk5boP0gD6EaTMN:1ERb+cr5Z1P0gD6/a |
MD5: | 29D583007FCD677AA31CA849478BC17A |
SHA1: | F354E323218A450060852C344927C3E79D8E7B66 |
SHA-256: | 120EE096F38C1E21083054C15F0F8CFBB02B6740A01D98068E3BE9581E83D453 |
SHA-512: | 4AFC2641D96D1C372D091FD795D39C1AF12149B5EB30DA7BEE6FBFEA0650841067B7D259473BF65706CDD42D1EDF1CC5673B5F5556D1E91F8AE32976490A7E4D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3168 |
Entropy (8bit): | 7.704911325185365 |
Encrypted: | false |
SSDEEP: | 48:37TcgUFv95NwPpK+adjaoVaqzGfYdIO+bExaLM2uO+xVwvpoP:ftUFvdy8dXVaGNdIb1Lz8PwvpY |
MD5: | A907E6E737788176B026FA71DFE8AFFE |
SHA1: | 6844236F638CEDCD652EB0A805476A1A13376CF5 |
SHA-256: | FC5E7621BA0E98C5C6728E3B2BDF802311C0A0953A05E60A7551CB0C7BED00A9 |
SHA-512: | 3A17E66931A15B5C6553DAE241C5A7BB40240699F0608F92ED940CB203CBEA3031CB0FAC23F9C962F50D573F56DB27A3369F1A38ED1AEA0168D7E707803CA27A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20217 |
Entropy (8bit): | 7.976064268012866 |
Encrypted: | false |
SSDEEP: | 384:xNlMKDW14cJB4Ri7iDmTvN0BOlU6L9fDN47BmFyeestGw3jIZz:blTDwQiZtlU6LtDNO4XXq |
MD5: | 7DAB8570684D6575F34F508645B9953F |
SHA1: | DA06B1764C8452D9BF2CE15F44D976D2A3B5A4EB |
SHA-256: | 0ECFBE99C21DFA73D727E51A4D9F7EA1CAF418E05BB941864108FB3542CF90CF |
SHA-512: | D62671D3F2D7A3885E64C905A7FA527575297669FBD9AA41156085C6A88329122D29C507C79505ABA748241878D7F0A084EF561B6B33D72FFD9A1D97B021B60D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4524 |
Entropy (8bit): | 5.108931295370594 |
Encrypted: | false |
SSDEEP: | 96:AG5XS7vBkRVkhmRaM44/HLPRaByA+zBRNI:AG5XABkAhmRaM44/H1CyrBRNI |
MD5: | DD05B711E15EF201B07E20CB5C87F5D8 |
SHA1: | 41B818B243140D90DA4CA917D454335B603A6BDA |
SHA-256: | 617F793D125F780AB7BB7C9E92AB427D9E757083E7368E241E8E8FA69F013E4F |
SHA-512: | 243C149BB8AAF5376EEBAC49833A59F75BA26BEC098AFD8A167D12BDACD3E80D98EE1DA1D82915CC7E4C7FAC747FBFF5D2D687D97F20BDF5C81D67CFA0620F39 |
Malicious: | false |
Reputation: | low |
URL: | https://s3.amazonaws.com/helpimg/landing_pages/css/dd.css |
Preview: |