Click to jump to signature section
Source: Yara match | File source: 2.5.d.script.csv, type: HTML |
Source: Yara match | File source: 2.2.pages.csv, type: HTML |
Source: Yara match | File source: 2.1.pages.csv, type: HTML |
Source: Yara match | File source: 2.5.d.script.csv, type: HTML |
Source: Yara match | File source: 2.2.pages.csv, type: HTML |
Source: Yara match | File source: 2.1.pages.csv, type: HTML |
Source: Yara match | File source: 2.4.d.script.csv, type: HTML |
Source: Yara match | File source: 2.7..script.csv, type: HTML |
Source: Yara match | File source: 2.1.pages.csv, type: HTML |
Source: Yara match | File source: 2.2.pages.csv, type: HTML |
Source: 2.4.d.script.csv | Joe Sandbox AI: Detected suspicious JavaScript with source url: anonymous function... This script demonstrates several high-risk behaviors, including detecting browser automation tools, blocking keyboard shortcuts and right-click functionality, and redirecting the user to an external website after a delay. These behaviors are highly suspicious and indicate potential malicious intent, such as preventing the user from interacting with the page or redirecting them to a malicious site. |
Source: 2.3..script.csv | Joe Sandbox AI: Detected suspicious JavaScript with source url: https://tz35.rgxqzdkx.ru/BiLyqh/... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The use of `atob()` and `decodeURIComponent(escape())` to decode and execute remote code is a clear indicator of malicious intent. Additionally, the script appears to be sending user data to an untrusted domain, which poses a significant risk of data theft or other malicious activities. Overall, this script exhibits a high level of suspicion and should be treated as a potential security threat. |
Source: 2.5.d.script.csv | Joe Sandbox AI: Detected suspicious JavaScript with source url: anonymous function... This script demonstrates high-risk behavior by using the `eval()` function to execute dynamic code, which poses a significant security risk. The script also appears to be heavily obfuscated, further increasing the risk. Overall, this script should be considered highly suspicious and potentially malicious. |
Source: 2.7..script.csv | Joe Sandbox AI: Detected suspicious JavaScript with source url: https://tz35.rgxqzdkx.ru/BiLyqh/... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. It appears to be a malicious script that is attempting to collect sensitive user data and execute remote code. The script also includes a delayed behavior that hides and shows various DOM elements, which could be part of a phishing or social engineering attack. Overall, this script poses a significant security risk and should be treated with caution. |
Source: https://lumensuae.com/dr/ | HTTP Parser: (function(_0x1b6cde,_0x35cbf1){function _0x657c4(_0x3a44c5,_0x4722dc,_0x471cf7,_0x38ac9c){return |
Source: https://tz35.rgxqzdkx.ru/BiLyqh/#Msebastian.wehland@deutschebahn.com | HTTP Parser: Base64 decoded: <!DOCTYPE html><html lang="en"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Office 365 Documentation</title> <style> body { font-family: Arial, sans-serif... |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56355 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56357 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56358 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56359 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56356 version: TLS 1.2 |
Source: chrome.exe | Memory has grown: Private usage: 0MB later: 32MB |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: global traffic | TCP traffic: 192.168.2.17:57449 -> 1.1.1.1:53 |
Source: global traffic | TCP traffic: 192.168.2.17:56350 -> 162.159.36.2:53 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 51.132.193.104 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.109.28.46 |
Source: unknown | TCP traffic detected without corresponding DNS query: 51.132.193.104 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.109.28.46 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.123.128.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.123.128.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 51.132.193.104 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.109.28.46 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.123.128.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.123.128.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 51.132.193.104 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.109.28.46 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.123.128.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 51.132.193.104 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.109.28.46 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.123.128.14 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 51.132.193.104 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.109.28.46 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.3.187.198 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.3.187.198 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.3.187.198 |
Source: global traffic | HTTP traffic detected: GET /url?q=https%3A%2F%2Flumensuae.com%2Fdr%2F&sa=D&sntz=1&usg=AOvVaw2KI_ApWDL5c7f_do0UCJyx HTTP/1.1Host: www.google.com.mxConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Browser-Channel: stableX-Browser-Year: 2025X-Browser-Validation: wTKGXmLo+sPWz1JKKbFzUyHly1Q=X-Browser-Copyright: Copyright 2025 Google LLC. All rights reserved.X-Client-Data: CLf3ygE=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /dr/ HTTP/1.1Host: lumensuae.comConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://www.google.com.mx/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://tz35.rgxqzdkx.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /turnstile/v0/api.js?onload=onloadTurnstileCallback HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://tz35.rgxqzdkx.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://tz35.rgxqzdkx.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /turnstile/v0/g/f3b948d8acb8/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://tz35.rgxqzdkx.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /rules/rule704051v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | HTTP traffic detected: GET /rules/rule702051v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | HTTP traffic detected: GET /rules/rule701700v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | HTTP traffic detected: GET /rules/rule704050v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | HTTP traffic detected: GET /rules/rule701701v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | DNS traffic detected: DNS query: www.google.com.mx |
Source: global traffic | DNS traffic detected: DNS query: lumensuae.com |
Source: global traffic | DNS traffic detected: DNS query: www.google.com |
Source: global traffic | DNS traffic detected: DNS query: tz35.rgxqzdkx.ru |
Source: global traffic | DNS traffic detected: DNS query: code.jquery.com |
Source: global traffic | DNS traffic detected: DNS query: challenges.cloudflare.com |
Source: global traffic | DNS traffic detected: DNS query: cdnjs.cloudflare.com |
Source: global traffic | DNS traffic detected: DNS query: developers.cloudflare.com |
Source: global traffic | DNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49672 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 56358 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56356 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56357 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56358 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56359 |
Source: unknown | Network traffic detected: HTTP traffic on port 57453 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57453 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57454 |
Source: unknown | Network traffic detected: HTTP traffic on port 56351 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57455 |
Source: unknown | Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56362 |
Source: unknown | Network traffic detected: HTTP traffic on port 56355 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49713 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49682 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49698 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49697 |
Source: unknown | Network traffic detected: HTTP traffic on port 56359 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 57459 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49671 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57457 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57458 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56369 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57459 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 56356 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49726 |
Source: unknown | Network traffic detected: HTTP traffic on port 56352 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49725 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 56362 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49697 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 57458 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 57455 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 56369 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown | Network traffic detected: HTTP traffic on port 56353 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49713 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: unknown | Network traffic detected: HTTP traffic on port 49698 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49673 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 56357 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49726 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 57457 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56352 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56353 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56355 |
Source: unknown | Network traffic detected: HTTP traffic on port 57454 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 56351 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56355 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56357 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56358 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56359 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.17:56356 version: TLS 1.2 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | File created: C:\Windows\SystemTemp\scoped_dir5492_1618982154 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | File deleted: C:\Windows\SystemTemp\scoped_dir5492_1618982154 |
Source: classification engine | Classification label: mal80.phis.evad.win@24/5@19/188 |
Source: unknown | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1984,i,1279696983110911542,973338581128620726,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:3 |
Source: unknown | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.com.mx/url?q=https%3A%2F%2Flumensuae.com%2Fdr%2F&sa=D&sntz=1&usg=AOvVaw2KI_ApWDL5c7f_do0UCJyx#-SUREDERAc2ViYXN0aWFuLndlaGxhbmRAZGV1dHNjaGViYWhuLmNvbQ==" |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1984,i,1279696983110911542,973338581128620726,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:3 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: Yara match | File source: 2.4.d.script.csv, type: HTML |