Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html

Overview

General Information

Sample URL:https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html
Analysis ID:1635529
Infos:

Detection

HTMLPhisher
Score:52
Range:0 - 100
Confidence:100%

Signatures

Yara detected HtmlPhish54
AI detected suspicious Javascript
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Form action URLs do not match main URL
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6232 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 6464 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2072,i,11883520060479385369,1920324618307650223,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2080 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 7136 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.4..script.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
    0.14..script.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
      0.2.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
        0.3.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
          0.4.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            Phishing

            barindex
            Source: Yara matchFile source: 0.4..script.csv, type: HTML
            Source: Yara matchFile source: 0.14..script.csv, type: HTML
            Source: Yara matchFile source: 0.2.pages.csv, type: HTML
            Source: Yara matchFile source: 0.3.pages.csv, type: HTML
            Source: Yara matchFile source: 0.4.pages.csv, type: HTML
            Source: Yara matchFile source: 0.6.pages.csv, type: HTML
            Source: 0.65.d.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: ... This script demonstrates high-risk behaviors, including dynamic code execution through the use of the `Function` constructor and the ability to modify the `sRandomBlob` property, which could potentially be used for data exfiltration or other malicious purposes. The script is also heavily obfuscated, making it difficult to analyze and understand its true intent. These factors contribute to a high-risk assessment.
            Source: 0.14..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://cpatronal.cardosonettoyages.website/?OsiC1... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and the use of obfuscated URLs. The script appears to be redirecting users to a suspicious login page and collecting sensitive user data, which is a clear indication of malicious intent. The combination of these factors results in a high-risk score.
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Form action: https://cpatronal.cardosonettoyages.website/common/login windows cardosonettoyages
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Form action: https://cpatronal.cardosonettoyages.website/common/login windows cardosonettoyages
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Number of links: 0
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Base64 decoded: b-ru%7D~tJ00hqoz%7D~tbu0dcse%7Ct%7Dph%7B~p%C2%82mxgt%3F%C2%84fn%7Bt%7Bm0H_t%7BD2BSQSWZ9%235.%23%7Bgsn~k%2C3/g%23jr%7Dq%C2%88%3Exbsi0~xzpu%7F%22%3D%21/bpr~%C2%865ux~%3E~bwvxozt~t%235.%23c%7D%7D%7C%C2%883q~ki%7D%7C%2C%3D%20%23bq%7D%7D%C2%870zosr~uu%23%3D-%2...
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Title: Sign in to your account does not match URL
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Iframe src: https://d50682cb-50824fa2.cardosonettoyages.website/Prefetch/Prefetch.aspx
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: Iframe src: https://d50682cb-50824fa2.cardosonettoyages.website/Prefetch/Prefetch.aspx
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: <input type="password" .../> found
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No favicon
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No favicon
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No favicon
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No favicon
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No favicon
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No favicon
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No <meta name="author".. found
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No <meta name="author".. found
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No <meta name="author".. found
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No <meta name="copyright".. found
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No <meta name="copyright".. found
            Source: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.htmlHTTP Parser: No <meta name="copyright".. found
            Source: chrome.exeMemory has grown: Private usage: 8MB later: 37MB
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:53253 -> 1.1.1.1:53
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.131
            Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.131
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
            Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
            Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.69
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: cpatronal.cardosonettoyages.website
            Source: global trafficDNS traffic detected: DNS query: www.google.com
            Source: global trafficDNS traffic detected: DNS query: 72a9db00-50824fa2.cardosonettoyages.website
            Source: global trafficDNS traffic detected: DNS query: 0a2f192d-50824fa2.cardosonettoyages.website
            Source: global trafficDNS traffic detected: DNS query: l1ve.cardosonettoyages.website
            Source: global trafficDNS traffic detected: DNS query: d50682cb-50824fa2.cardosonettoyages.website
            Source: global trafficDNS traffic detected: DNS query: 6758f79f-50824fa2.cardosonettoyages.website
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 53263 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
            Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53257
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53257 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53264
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53263
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53262
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 53262 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 53264 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir6232_2017771118
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\Google.Widevine.CDM.dll
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\manifest.json
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\_metadata\
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\_metadata\verified_contents.json
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\manifest.fingerprint
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir6232_1685396563
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir6232_2017771118
            Source: classification engineClassification label: mal52.phis.win@24/4@18/113
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2072,i,11883520060479385369,1920324618307650223,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2080 /prefetch:3
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html"
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2072,i,11883520060479385369,1920324618307650223,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2080 /prefetch:3
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\Google.Widevine.CDM.dllJump to dropped file
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\Google.Widevine.CDM.dllJump to dropped file
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Drive-by Compromise
            Windows Management Instrumentation1
            Browser Extensions
            1
            Process Injection
            2
            Masquerading
            OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Extra Window Memory Injection
            1
            Process Injection
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            File Deletion
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Extra Window Memory Injection
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html0%Avira URL Cloudsafe
            SourceDetectionScannerLabelLink
            C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6232_2010104423\Google.Widevine.CDM.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            cpatronal.cardosonettoyages.website
            194.76.226.237
            truetrue
              unknown
              d50682cb-50824fa2.cardosonettoyages.website
              194.76.226.237
              truefalse
                unknown
                www.google.com
                142.250.186.36
                truefalse
                  high
                  0a2f192d-50824fa2.cardosonettoyages.website
                  194.76.226.237
                  truefalse
                    unknown
                    l1ve.cardosonettoyages.website
                    194.76.226.237
                    truefalse
                      unknown
                      72a9db00-50824fa2.cardosonettoyages.website
                      194.76.226.237
                      truefalse
                        unknown
                        6758f79f-50824fa2.cardosonettoyages.website
                        194.76.226.237
                        truefalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          142.250.186.78
                          unknownUnited States
                          15169GOOGLEUSfalse
                          194.76.226.237
                          cpatronal.cardosonettoyages.websiteGermany
                          39378SERVINGADEtrue
                          1.1.1.1
                          unknownAustralia
                          13335CLOUDFLARENETUSfalse
                          142.250.186.36
                          www.google.comUnited States
                          15169GOOGLEUSfalse
                          74.125.133.84
                          unknownUnited States
                          15169GOOGLEUSfalse
                          216.58.206.78
                          unknownUnited States
                          15169GOOGLEUSfalse
                          142.250.185.131
                          unknownUnited States
                          15169GOOGLEUSfalse
                          142.250.184.206
                          unknownUnited States
                          15169GOOGLEUSfalse
                          142.250.185.74
                          unknownUnited States
                          15169GOOGLEUSfalse
                          172.217.16.195
                          unknownUnited States
                          15169GOOGLEUSfalse
                          142.250.186.99
                          unknownUnited States
                          15169GOOGLEUSfalse
                          57.150.154.65
                          unknownBelgium
                          2686ATGS-MMD-ASUSfalse
                          IP
                          192.168.2.16
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1635529
                          Start date and time:2025-03-11 18:35:37 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                          Sample URL:https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:14
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • EGA enabled
                          Analysis Mode:stream
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal52.phis.win@24/4@18/113
                          • Exclude process from analysis (whitelisted): svchost.exe
                          • Excluded IPs from analysis (whitelisted): 142.250.185.131, 216.58.206.78, 142.250.184.206, 74.125.133.84, 57.150.154.65
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenFile calls found.
                          • VT rate limit hit for: https://centrepatronal.blob.core.windows.net/heberhard/centrepatronal.html
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):2877728
                          Entropy (8bit):6.868480682648069
                          Encrypted:false
                          SSDEEP:
                          MD5:477C17B6448695110B4D227664AA3C48
                          SHA1:949FF1136E0971A0176F6ADEA8ADCC0DD6030F22
                          SHA-256:CB190E7D1B002A3050705580DD51EBA895A19EB09620BDD48D63085D5D88031E
                          SHA-512:1E267B01A78BE40E7A02612B331B1D9291DA8E4330DEA10BF786ACBC69F25E0BAECE45FB3BAFE1F4389F420EBAA62373E4F035A45E34EADA6F72C7C61D2302ED
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          Reputation:unknown
                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....fd.........." ......(..........A&.......................................,.......,...`A.........................................V*......V*......`,......`+..p....+. )...p,......D*.8....................C*.(.....(.8...........p\*..............................text.....(.......(................. ..`.rdata..h.....(.......(.............@..@.data....l....*..&....*.............@....pdata...p...`+..r....*.............@..@.00cfg..(.....+......p+.............@..@.gxfg....$....+..&...r+.............@..@.retplnel.... ,.......+..................tls.........0,.......+.............@....voltbl.D....@,.......+................._RDATA.......P,.......+.............@..@.rsrc........`,.......+.............@..@.reloc.......p,.......+.............@..B........................................................................................................................................
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:JSON data
                          Category:dropped
                          Size (bytes):1778
                          Entropy (8bit):6.02086725086136
                          Encrypted:false
                          SSDEEP:
                          MD5:3E839BA4DA1FFCE29A543C5756A19BDF
                          SHA1:D8D84AC06C3BA27CCEF221C6F188042B741D2B91
                          SHA-256:43DAA4139D3ED90F4B4635BD4D32346EB8E8528D0D5332052FCDA8F7860DB729
                          SHA-512:19B085A9CFEC4D6F1B87CC6BBEEB6578F9CBA014704D05C9114CFB0A33B2E7729AC67499048CB33823C884517CBBDC24AA0748A9BB65E9C67714E6116365F1AB
                          Malicious:false
                          Reputation:unknown
                          Preview:[{"description":"treehash per file","signed_content":{"payload":"eyJjb250ZW50X2hhc2hlcyI6W3siYmxvY2tfc2l6ZSI6NDA5NiwiZGlnZXN0Ijoic2hhMjU2IiwiZmlsZXMiOlt7InBhdGgiOiJHb29nbGUuV2lkZXZpbmUuQ0RNLmRsbCIsInJvb3RfaGFzaCI6Im9ZZjVLQ2Z1ai1MYmdLYkQyWFdBS1E5Nkp1bTR1Q2dCZTRVeEpGSExSNWMifSx7InBhdGgiOiJtYW5pZmVzdC5qc29uIiwicm9vdF9oYXNoIjoiYk01YTJOU1d2RkY1LW9Tdml2eFdqdXVwZ05pblVGakdPQXRrLTBJcGpDZyJ9XSwiZm9ybWF0IjoidHJlZWhhc2giLCJoYXNoX2Jsb2NrX3NpemUiOjQwOTZ9XSwiaXRlbV9pZCI6Im5laWZhb2luZGdnZmNqaWNmZmtncG1ubHBwZWZmYWJkIiwiaXRlbV92ZXJzaW9uIjoiMS4wLjI3MzguMCIsInByb3RvY29sX3ZlcnNpb24iOjF9","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"KTPeHzS0ybFaz3_br3ASYWHjb6Ctul92067u2JMwtNYYm-4KxLiSkJZNBIzhm6hNSEW2p5kUEvHD0TjhhFGCZnWm9titj2bqJayCOAGxZb5BO74JJCRfy5Kwr1KSS4nvocsZepnHBmCiG2OV3by-Lyf1h1uU3X3bDfD92O0vJzrA8rwL2LrwIk-BolLo5nlM0I_MZwg8DhZ8SFBu9GGRVB2XrailDrv4SgupFE9gqA1HY6kjRjoyoAHbRRxZdBNNt9IKNdxNyaF9NcNRY8dAedNQ9Tw3YNp5jB7R9lcjO4knn58RdH2h_GiJ4l96StcXA4e7cqbJ77P-c
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):66
                          Entropy (8bit):3.974403644129192
                          Encrypted:false
                          SSDEEP:
                          MD5:D30A5BBC00F7334EEDE0795D147B2E80
                          SHA1:78F3A6995856854CAD0C524884F74E182F9C3C57
                          SHA-256:A08C1BC41DE319392676C7389048D8B1C7424C4B74D2F6466BCF5732B8D86642
                          SHA-512:DACF60E959C10A3499D55DC594454858343BF6A309F22D73BDEE86B676D8D0CED10E86AC95ECD78E745E8805237121A25830301680BD12BFC7122A82A885FF4B
                          Malicious:false
                          Reputation:unknown
                          Preview:1.c900ba9a2d8318263fd43782ee6fd5fb50bad78bf0eb2c972b5922c458af45ed
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:JSON data
                          Category:dropped
                          Size (bytes):145
                          Entropy (8bit):4.595307058143632
                          Encrypted:false
                          SSDEEP:
                          MD5:BBC03E9C7C5944E62EFC9C660B7BD2B6
                          SHA1:83F161E3F49B64553709994B048D9F597CDE3DC6
                          SHA-256:6CCE5AD8D496BC5179FA84AF8AFC568EEBA980D8A75058C6380B64FB42298C28
                          SHA-512:FB80F091468A299B5209ACC30EDAF2001D081C22C3B30AAD422CBE6FEA7E5FE36A67A8E000D5DD03A30C60C30391C85FA31F3931E804C351AB0A71E9A978CC0F
                          Malicious:false
                          Reputation:unknown
                          Preview:{. "manifest_version": 2,. "name": "windows-mf-cdm",. "version": "1.0.2738.0",. "accept_arch": [. "x64",. "x86_64",. "x86_64h". ].}
                          No static file info