Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Factura_Pendiente.html

Overview

General Information

Sample name:Factura_Pendiente.html
Analysis ID:1628109
MD5:16722de25b10aeab64dfde6204f83062
SHA1:399b17d37a0a8aa0bcc4d3b45235f7a322f1a2fa
SHA256:634198c17eb69fbc7b99c5fdf7a49afdd6297562417e0525c5e037874868ffba
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

AI detected suspicious Javascript
HTML file submission containing password form
Suspicious Javascript code found in HTML file
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6624 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Factura_Pendiente.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7036 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1952,i,13902536281009663608,8185007716233731132,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/Desktop/Factura_Pendiente.ht... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated URLs. It collects user credentials and sends them to a suspicious domain, and it also redirects the user to a domain derived from the email address after multiple failed login attempts. These behaviors are highly indicative of a malicious phishing script, posing a significant risk to user security and privacy.
Source: Factura_Pendiente.htmlHTTP Parser: location.href
Source: Factura_Pendiente.htmlHTTP Parser: .location
Source: Factura_Pendiente.htmlHTTP Parser: .location
Source: Factura_Pendiente.htmlHTTP Parser: Number of links: 0
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: Number of links: 0
Source: Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
Source: Factura_Pendiente.htmlHTTP Parser: Base64 decoded: https://acti0no0nine.ksiegihandlowe.pl/go/go.php
Source: Factura_Pendiente.htmlHTTP Parser: Title: Inicio de Sesin does not match URL
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: Title: Inicio de Sesin does not match URL
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: Has password / email / username input fields
Source: Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found
Source: Factura_Pendiente.htmlHTTP Parser: No favicon
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: No favicon
Source: Factura_Pendiente.htmlHTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: No <meta name="author".. found
Source: Factura_Pendiente.htmlHTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: No <meta name="copyright".. found
Source: chrome.exeMemory has grown: Private usage: 1MB later: 29MB
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.77.188
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.77.188
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.77.188
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: global trafficHTTP traffic detected: GET /4Wl0hAx.png HTTP/1.1Host: i.imgur.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /bm8Q6yAlsPsAAAAj/verified.gif HTTP/1.1Host: media.tenor.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /4Wl0hAx.png HTTP/1.1Host: i.imgur.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /bm8Q6yAlsPsAAAAj/verified.gif HTTP/1.1Host: media.tenor.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: media.tenor.com
Source: global trafficDNS traffic detected: DNS query: i.imgur.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: classification engineClassification label: mal52.phis.winHTML@14/8@10/112
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Factura_Pendiente.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1952,i,13902536281009663608,8185007716233731132,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1952,i,13902536281009663608,8185007716233731132,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk

Stealing of Sensitive Information

barindex
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: file:///C:/Users/user/Desktop/Factura_Pendiente.html
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Factura_Pendiente.html0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
file:///C:/Users/user/Desktop/Factura_Pendiente.html0%Avira URL Cloudsafe
https://media.tenor.com/bm8Q6yAlsPsAAAAj/verified.gif0%Avira URL Cloudsafe
https://i.imgur.com/4Wl0hAx.png0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
tenor.googleapis.com
142.250.186.138
truefalse
    unknown
    www.google.com
    142.250.184.196
    truefalse
      high
      ipv4.imgur.map.fastly.net
      199.232.196.193
      truefalse
        high
        media.tenor.com
        unknown
        unknownfalse
          high
          i.imgur.com
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            file:///C:/Users/user/Desktop/Factura_Pendiente.htmltrue
            • Avira URL Cloud: safe
            unknown
            https://media.tenor.com/bm8Q6yAlsPsAAAAj/verified.giffalse
            • Avira URL Cloud: safe
            unknown
            https://i.imgur.com/4Wl0hAx.pngfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            142.250.184.196
            www.google.comUnited States
            15169GOOGLEUSfalse
            142.250.110.84
            unknownUnited States
            15169GOOGLEUSfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            172.217.16.138
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.184.238
            unknownUnited States
            15169GOOGLEUSfalse
            199.232.196.193
            ipv4.imgur.map.fastly.netUnited States
            54113FASTLYUSfalse
            142.250.186.99
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.186.138
            tenor.googleapis.comUnited States
            15169GOOGLEUSfalse
            216.58.206.35
            unknownUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.16
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1628109
            Start date and time:2025-03-03 15:24:32 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            Analysis Mode:stream
            Analysis stop reason:Timeout
            Sample name:Factura_Pendiente.html
            Detection:MAL
            Classification:mal52.phis.winHTML@14/8@10/112
            Cookbook Comments:
            • Found application associated with file extension: .html
            • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 23.199.214.10
            • Excluded domains from analysis (whitelisted): fs.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • VT rate limit hit for: tenor.googleapis.com
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Mar 3 13:25:11 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.9741004209394823
            Encrypted:false
            SSDEEP:
            MD5:3692F41BA0F91113FF149E8ECD7E34FA
            SHA1:53DB0E53CC6AAC192B1C5F9856B382C780EC1D21
            SHA-256:6AAA3A15A84AD7E8C8109BA00165DC1827C8A583DC3FFFD8741F13B67EB4C935
            SHA-512:4CF0F2BE1CE5172EB744C959C336B43EA6EC5E9DE3BC623C1A9B927D9C6514F622E52810998B73A9AD8D17757FB4401A9BB076475692AD96D1F0AF56AD546C75
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....x.g.H...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ$s....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ$s....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ$s..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ&s...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+..i.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Mar 3 13:25:11 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):3.988935144891952
            Encrypted:false
            SSDEEP:
            MD5:EF587A850D9A972C7CD77AF7AB160254
            SHA1:CE99EF6B5528D721CB1EEFDE9B227CE1DE3F1811
            SHA-256:FED2705173E6556FFEA1FDBD53D02BC4DEADBFCC4A4188E34EF107E72B0778DE
            SHA-512:48E233CFBB6F5D27ADB79ACCE7C896BE670C972E032D48A8611678ADEA43F4B5204B90D754007738EA0C858FB854608336AC5C92F612C83C0BA90A9D557863E6
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....$oX.H...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ$s....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ$s....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ$s..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ&s...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+..i.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.0035498350727625
            Encrypted:false
            SSDEEP:
            MD5:E202BB33AFD9DD1B2ADB99B424C4C26F
            SHA1:39EC86E5853A584BCC8920DC1C36617E3752B5DE
            SHA-256:FFEE0DBE4786D7BC68684C6824F755F9F51067524E12E31B26BD3217EE0B16D1
            SHA-512:4DEF0A3226CD67B891FB51A19982421DECEAB56C9836E4B1201EDEA20BB7B1C2B82107E7CDE08CD171B1EDA121AD4D5B7D708F4523812185DC5BCB180BC3CCDA
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ$s....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ$s....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ$s..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+..i.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Mar 3 13:25:11 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9912304541689623
            Encrypted:false
            SSDEEP:
            MD5:9239B2F7B03612E465D9FE7840BE388C
            SHA1:F6187D1D6B00E4230C61E83983E84ACCE7770F67
            SHA-256:D27CED4136EDEF2F9D8E63EB7E42D54629EA4FF5408B06DCBDD2767F7B2A83B0
            SHA-512:E35E9A5C14C8FCC24BF6EDBA8392FB7EFA7A4C20A7ED84B63C74A967A9644CE0FEA7FEC84C573B90E4901488F11C136D9E7B7E6B7084151701951246C6E9AE19
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....7.Q.H...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ$s....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ$s....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ$s..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ&s...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+..i.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Mar 3 13:25:11 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9785517343730676
            Encrypted:false
            SSDEEP:
            MD5:E5969E1C97D3C3BD435148236F29962C
            SHA1:0015C21789CC269313D7B461CD4D7FFAE275DA65
            SHA-256:E42137D9A6FA548A34E466636A2D91DDEFCA89137D86E84982D5F9E5BA4F6BD0
            SHA-512:CF4D4C0FCBB2B22D42C7122A1D528B748725876413552A27EAF027508F14EE0F6BF3D33D1D4A61989844BA4986F5B4DA59BF83721D9FA70E578B4C16C5B259CF
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......`.H...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ$s....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ$s....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ$s..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ&s...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+..i.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Mar 3 13:25:10 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.989677633630305
            Encrypted:false
            SSDEEP:
            MD5:E754CE9B5F01FD892F81C6D7A15DDDDA
            SHA1:5DA3792A6FD98154C3CC466C956E1FBD54C8A138
            SHA-256:EDC8479DC8D45EF10ABF478D87B036A0C96A42085998CA3C2CCCC0BE83E62BBC
            SHA-512:03E251207C0CAC48C8B0EEF60BB017429C4EA2DDD34542E5672AB45EED7EC2D8B4212EC08A96DC8368973CC40DD37848877C6EE995DEFDC0171351AED48D0107
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......G.H...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ$s....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ$s....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ$s..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ&s...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........+..i.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):162544
            Entropy (8bit):7.97807338547275
            Encrypted:false
            SSDEEP:
            MD5:F4FE4B2BD12912A3A2D9D68191388EE5
            SHA1:0621F786CB4A17BF64DB6E6E4EF937F835F8A9F9
            SHA-256:1751B36EAFF8981AD19A42E41E2CBDEAD340ABAAF4B45D2461DC0B3B8DD15130
            SHA-512:383B5FB3DA67A7ED4DA7FAC780100F1F26D037353A7555329EDA75DC1AB46DBAB412D24D5587CE6DECC94524F4014619106F4DACA4E5ABB1898A6A7DE3DD08D9
            Malicious:false
            Reputation:unknown
            Preview:.PNG........IHDR....................IDATx......*...K.s.{]....v.Lc...@ dp...L;.......c'~#t.....YX...d2.L&...9.e........&..d2.L&.(.....w.poVq..d2.L&.......E.7....d2.L&..d.Xa...{;...d2.L&..d.<U.6...d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&....-.n..tF1.@T..7N..?.q...2...x=Z.....u.g....f.. .....&..d2u2....8R3..$..H%..!..m.:.....P...........su.......q..cz.g...s...6....=....g.D.5 ....!.....w.6P3.L&..e .......t....+. x..p./..R.$._....k..!.KP..}..C...3P..1...r...@.jP!...@<.t...A..>w.&90H....p..<....h.#.................G}.}[p.G. ?K}@.......&..d.L....2|7.....@......q..q.....{....}.O.Cx.....ia...#@#|..8:@7.q.........._^^*.C..m..^.u.[..>......u...d.W....8[....w ...6..E.]...g.....\...... ..A[...._h......&..d.<....$.o!.....,...a...d._...B.,K....%.3....p...>.....q..7...S...p.....`<..D..k...s..g>.C........w.).O.A..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:downloaded
            Size (bytes):55334
            Entropy (8bit):7.948000476472091
            Encrypted:false
            SSDEEP:
            MD5:4D4A965AEB96B7866C767E411BB0B13D
            SHA1:F0997FBD448DED4C0BEDC20495A12FFBB2F27F7A
            SHA-256:223F8DFA667924536916AC5AED8AFFD099270BCAC3EC90423403A00101BA5FF6
            SHA-512:640D1945C5DBAADC075945FF842D1E66969931DF2C185984600320EFB4B108176B27F30261A8FAEA4C128CB8CADD797A41A0A762BE5C3233963998651174182F
            Malicious:false
            Reputation:unknown
            URL:https://media.tenor.com/bm8Q6yAlsPsAAAAj/verified.gif
            Preview:GIF89a...........u.A...t.>v.Bw.B..W......u.=t.=......].....\..\..\w.C......t.<t.=......v.C...t.<.............\..........................................................................................!..NETSCAPE2.0.....!.......,...........`".di.h..l.p,.tm...|....pH,....[..N.4.l....5.>..xL.u[.ly.n...xi@.....q..E.............x&.8.z<.6......................j0...................8.+.C.............3.[.............>..h1.................G.............6N.~....E....3j.6aB.S."..@.^..(S.bt..Z..".4....8..l..W.,. 0.p1....2.`..F.r.EJ.(..H1.i....?fF.Z..Y.Jo...)...f..5..]...qu;......z.@.a.......o.@.n.=l.B.......o..Q...\........E.X.K.Fj.p.m.}C2..[.....im..:~...\.A.k?W..g.4a..B..w..=.8.bw..<....j...;V/jr..7..H....B5...h..Xcn.'.....W.M...........8....D!k".&O....q..."..RQ.v..(.....ZL.57..Q(_.....=...p."$.L.D......'MVy.>M."..Vv...H.q.\^z..q....e.).,y.2b.]....e....e.7..[x...|.#.....F.BqY.Q...X8......:...~:.F..dJ%~.2Y.YX1.`.-.....KB.*.&........2.*j...J[{.6...1..
            File type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
            Entropy (8bit):4.971049026873873
            TrID:
            • HyperText Markup Language (15015/1) 20.56%
            • HyperText Markup Language (12001/1) 16.44%
            • HyperText Markup Language (12001/1) 16.44%
            • HyperText Markup Language (11501/1) 15.75%
            • HyperText Markup Language (11501/1) 15.75%
            File name:Factura_Pendiente.html
            File size:3'781 bytes
            MD5:16722de25b10aeab64dfde6204f83062
            SHA1:399b17d37a0a8aa0bcc4d3b45235f7a322f1a2fa
            SHA256:634198c17eb69fbc7b99c5fdf7a49afdd6297562417e0525c5e037874868ffba
            SHA512:69459d1729643a9ea9984e5e64135ae24028e6be2b12417085a5c1b99ec5a3689384f9486630921a1a22a866facd8768f2f8f66dbe6b8e88bd01762643f93eb7
            SSDEEP:48:ta4+F33JQQgnOIOa53FKTDT9ANltSvGdHIdV1SNo5TtjGt7jfUuijz5bGj7Iukn:kR3h6FK3IDS0oryjPi/jj
            TLSH:2771325655C60A462877E3B86FE28309FB9240278741861D3F4C22979F79D49C9E3FC8
            File Content Preview:<!DOCTYPE html>..<html lang="es">..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title>Inicio de Sesi..n</title>.. <style>.. body {.. margin: 0;.. padding: 0;.. background
            Icon Hash:173149cccc490307