Source: Yara match |
File source: dropped/chromecache_61, type: DROPPED |
Source: Yara match |
File source: 3661627172.svg, type: SAMPLE |
Source: 1.2..script.csv |
Joe Sandbox AI: Detected suspicious JavaScript with source url: https://kakhuy07co.woofradio.cfd/3IgjcDhi7bbLzyqNi... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and the use of obfuscated URLs. The script generates random alphanumeric strings, extracts subdomains from the current URL, and then redirects the user to a new URL with the subdomain or a random string, followed by a suspicious domain and encoded parameters. This behavior is highly indicative of a malicious script, likely used for phishing or other malicious purposes. |
Source: 0.1..script.csv |
Joe Sandbox AI: Detected suspicious JavaScript with source url: data:application/ecmascript;base64,dHJ5IHsKICAgIGZ... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The `duruwo` function appears to be decoding a heavily encoded string, which could be used to execute malicious code or redirect the user to a suspicious domain. Additionally, the script attempts to modify the DOM and the window location, which could be used for phishing or other malicious purposes. Overall, this script exhibits a high level of risk and should be thoroughly investigated before execution. |
Source: 2.3..script.csv |
Joe Sandbox AI: Detected suspicious JavaScript with source url: https://tonygraham.pwswrp.ru/8T8x6LF1E/... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The use of `atob()` and `decodeURIComponent()` to decode and execute remote code is a clear indicator of malicious intent. Additionally, the script appears to be sending user data to an untrusted domain, which poses a significant risk of data theft or other malicious activities. Overall, this script exhibits a high level of suspicion and should be treated as a potential security threat. |
Source: Yara match |
File source: 3661627172.svg, type: SAMPLE |
Source: https://tonygraham.pwswrp.ru/8T8x6LF1E/#3ddimaano%40tonygraham.com |
HTTP Parser: No favicon |
Source: unknown |
HTTPS traffic detected: 142.250.185.132:443 -> 192.168.2.6:49701 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.129.81:443 -> 192.168.2.6:49702 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.6:49705 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.6:49704 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 35.190.80.1:443 -> 192.168.2.6:49706 version: TLS 1.2 |
Source: Joe Sandbox View |
IP Address: 104.21.32.1 104.21.32.1 |
Source: Joe Sandbox View |
IP Address: 104.21.32.1 104.21.32.1 |
Source: Joe Sandbox View |
ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.42.65.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.186.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.186.99 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.20.57.35 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.20.57.35 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.20.57.35 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.20.57.35 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.20.57.35 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.227.208 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.77.188 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 217.20.57.35 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.227.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.227.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.77.188 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.190.159.68 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 2.23.77.188 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.190.159.68 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.191.45.158 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
HTTP traffic detected: GET /3IgjcDhi7bbLzyqNi74Dxtc1XOq0HV69zuTXLXqnhnYexhMqaslCucBcrtlUAvSaQSHXMHYR05jmstE6iCIFE9U9189WjNjjz6aD13nD5x0ol5cOZZSgb1syufIVGxpC2vKAj025i7NnVFZ9WFKa4eQvR2G4GQlt0NUGhxzukbWwHVKybFjbIYtqNcss36hvXYTTWP3N/YbDwc0zBR3huOXy35f8itseSalgK7rTTlIvJq1ijGxpNl40QvAaRigeNv9w4WgQtfwqU0MZf0ZjFmo6q1zQTQ4McS3cwVqHVdgJViZ0qzMmzR113GzSYhuROL0CvhNuzfR8MwDRER9IzVQyErpcLEotUxoDX7vUphdcT8zYuYxxljaaSPR7ffLs4A1GIZ6QkHtGNWsGY/ddimaano@tonygraham.com HTTP/1.1Host: kakhuy07co.woofradio.cfdConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /8T8x6LF1E/ HTTP/1.1Host: tonygraham.pwswrp.ruConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://kakhuy07co.woofradio.cfd/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: tonygraham.pwswrp.ruConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://tonygraham.pwswrp.ru/8T8x6LF1E/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9Cookie: XSRF-TOKEN=eyJpdiI6IjFJTU9NK21wdENOYWFzVzV2cjNqWEE9PSIsInZhbHVlIjoiSVZid21IWmo0cWJrT293NVlKME1MQ0F6d3N4Q2xOYWp0TzREcGNidGdyd0phbElhMm1FUHNPQmIzb3BwL3pHUFlFWlZEYnhhcmpQSkRxdUloRmRRRkJBdnVyQy9NRVNqTHRZUUVMVnlya0VmdWMzZDh2TitmQjcxWUZqLzJERU4iLCJtYWMiOiI0YzJmN2EwYzgwODUxYTMzNDhjMTBmZmE3N2JhZjI0ZDQyNWYyYjg3YTkwYzU1ZmEwYWI1ZjUyNTlmOGEyOGU1IiwidGFnIjoiIn0%3D; laravel_session=eyJpdiI6ImVCRzFMaVBrSEJaMWlvOTNyMXhGcnc9PSIsInZhbHVlIjoiZUR3dlJlcFB4SWFYNnkzaU1mYmMyVnlwdmJUNCtWS3E0QWVWc0tMRjdOc3NyTExhZkxBejE2OW03MmRpcHFkRUV5dWpUcXdnSEx1dkNQUUtSSE1NYzc1WEhmbWdDcHRRYWlrTzdWSmp1VkVkcUxRa0hvNE45bG9ya2tQOUtBYWciLCJtYWMiOiJlYzQxODdhNDkwMjIzZjY1MGI2OTY5Y2NmYWEyMDMxYTZiMGNjYzQwZTAzYjRlNDk2OWYxYzU1OTdhZGNjYzU0IiwidGFnIjoiIn0%3D |
Source: global traffic |
DNS traffic detected: DNS query: www.google.com |
Source: global traffic |
DNS traffic detected: DNS query: kakhuy07co.woofradio.cfd |
Source: global traffic |
DNS traffic detected: DNS query: tonygraham.pwswrp.ru |
Source: global traffic |
DNS traffic detected: DNS query: a.nel.cloudflare.com |
Source: unknown |
HTTP traffic detected: POST /report/v4?s=Nl%2BJeCS3dkb8Dff3IbH9YTD8fPx1d19BRmmJvN3eH0WTCo%2BpZ9qE35kkki8XMmdrDxXaTwBGr5CK0QkZQJjGXJPpNKWMLmpGidCObFOh%2BeHDDWUP8XASbUGApZ%2BPASX5k1hN HTTP/1.1Host: a.nel.cloudflare.comConnection: keep-aliveContent-Length: 438Content-Type: application/reports+jsonOrigin: https://tonygraham.pwswrp.ruUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 17 Mar 2025 17:18:22 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeServer: cloudflareReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Nl%2BJeCS3dkb8Dff3IbH9YTD8fPx1d19BRmmJvN3eH0WTCo%2BpZ9qE35kkki8XMmdrDxXaTwBGr5CK0QkZQJjGXJPpNKWMLmpGidCObFOh%2BeHDDWUP8XASbUGApZ%2BPASX5k1hN"}],"group":"cf-nel","max_age":604800}Nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Vary: Accept-EncodingServer-Timing: cfL4;desc="?proto=TCP&rtt=1110&min_rtt=1096&rtt_var=439&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=2245&delivery_rate=2397350&cwnd=251&unsent_bytes=0&cid=9b7795a91c0410be&ts=80&x=0"Cache-Control: max-age=14400Cf-Cache-Status: MISSCF-RAY: 921e2629fa5e8d3f-EWRalt-svc: h3=":443"; ma=86400 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49672 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49678 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49682 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49681 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49686 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49682 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49715 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49715 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49679 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49681 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: unknown |
HTTPS traffic detected: 142.250.185.132:443 -> 192.168.2.6:49701 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.129.81:443 -> 192.168.2.6:49702 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.6:49705 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.6:49704 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 35.190.80.1:443 -> 192.168.2.6:49706 version: TLS 1.2 |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
File created: C:\Windows\SystemTemp\scoped_dir7552_859829264 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
File deleted: C:\Windows\SystemTemp\scoped_dir7552_859829264 |
Jump to behavior |
Source: classification engine |
Classification label: mal64.phis.winSVG@27/4@10/6 |
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1924,i,10494982236509602108,7760536900289131602,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2092 /prefetch:3 |
|
Source: unknown |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\3661627172.svg" |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1924,i,10494982236509602108,7760536900289131602,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2092 /prefetch:3 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |