Loading ...

Play interactive tourEdit tour

Analysis Report https://myportfolio.umm.edu/MyChart/

Overview

General Information

Sample URL:https://myportfolio.umm.edu/MyChart/
Analysis ID:344133

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work
Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis



Startup

  • System is w10x64
  • iexplore.exe (PID: 4600 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 2616 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4600 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.3:49715 -> 134.192.254.1:443
Source: unknownDNS traffic detected: queries for: myportfolio.umm.edu
Source: ~DFB33D5E07F9321015.TMP.1.drString found in binary or memory: https://myportfolio.umm.edu/MyChart/
Source: {1BD09DBF-5FE6-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: https://myportfolio.umm.edu/MyChart/Root
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: classification engineClassification label: unknown0.win@3/11@2/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFE50478C6DEFE0505.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4600 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4600 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
https://myportfolio.umm.edu/MyChart/0%VirustotalBrowse
https://myportfolio.umm.edu/MyChart/0%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
myportfolio.umm.edu
134.192.254.1
truefalse
    high

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://myportfolio.umm.edu/MyChart/Root{1BD09DBF-5FE6-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
      high
      https://myportfolio.umm.edu/MyChart/~DFB33D5E07F9321015.TMP.1.drfalse
        high

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        134.192.254.1
        unknownUnited States
        46543UMBUSfalse

        General Information

        Joe Sandbox Version:31.0.0 Emerald
        Analysis ID:344133
        Start date:26.01.2021
        Start time:06:51:42
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 2m 8s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:https://myportfolio.umm.edu/MyChart/
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:UNKNOWN
        Classification:unknown0.win@3/11@2/1
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • URL browsing timeout or error
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): ielowutil.exe, backgroundTaskHost.exe
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.43.193.48, 104.83.120.32, 51.11.168.160
        • Excluded domains from analysis (whitelisted): e11290.dspg.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, arc.msn.com.nsatc.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, arc.msn.com, skypedataprdcolcus15.cloudapp.net
        Errors:
        • URL not reachable

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1BD09DBD-5FE6-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):30296
        Entropy (8bit):1.8600280839775682
        Encrypted:false
        SSDEEP:48:IweGcprHGwpLVG/ap8OrGIpct+GvnZpvtRGoAqp9tZGo4xpmt+GWOu9tsGWYuvt5:rCZRZx2O9Wtbttvft6xMtotqtGftVsX
        MD5:5132FB7529BAE5B6EF8BDA1CD3CA3544
        SHA1:F3AD3A6131DFC4C35EA44DA4F99752C2DA0ABB6E
        SHA-256:844FDB4C10DECC72258BA6C873B638E8B8B92E6290C27AEF54B52DDA3FEF6373
        SHA-512:AF18607285F4095B23E7886E26CA58CBC244D4BDEFFAD4519B2E3E07EF596856BF7DAC2D6CC96772EEC96974D63F2419054C3EAB465D3AAF4E0CBC8E060D8300
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1BD09DBF-5FE6-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):24184
        Entropy (8bit):1.6312518195666112
        Encrypted:false
        SSDEEP:48:IwcGcpr9GwpatG4pQZGrapbSjrGQpB6GHHpcnDsTGUp8SGzYpmn7YGopPmVjVHGZ:rAZnQP65BSjFjB2DkWuM7Y0j7g
        MD5:28A72333A73231F4C798CDA32386322D
        SHA1:8C695EFC808F78D1775E5E6FF0BA1A6BC3E99EE4
        SHA-256:F09A37EB5F21ED5D418B6563C95ADCA20F3D06D3ECFEA7867C4CA9B2B1A160C7
        SHA-512:78222850BA12802AE701995F5F601AD45453C70D389F8491F8D24B63AAE384A59F27A1E438E7035D1E61B1DBD29336C4D62015EA69E80C7B66EFD5EE6C58F295
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{25CED764-5FE6-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):16984
        Entropy (8bit):1.5650522043252202
        Encrypted:false
        SSDEEP:48:IwDhGcprl6GwpapG4pQtGrapbSirGQpKGG7HpRDTsTGIpG:rDZkQr6NBSiFAxTv4A
        MD5:918ECB4BB3DC5E4F513ED5E9CF9BCE1E
        SHA1:0FD78EA855D3C70AE1DF5E674B20A1B1BCF7632E
        SHA-256:6AC46CA8C2DFB618F8FD05CF44E77E3B946D49AB6035D31151E12165416F849A
        SHA-512:BBB7ECFF3B9B50EC4C7A0B623503F8D12A2E2E8516266E5E7669ED88413BB11CC16EB8B963A3318B1300C0EC9B89DCA1F2C2038912C4D5E0A7EDB1E7FCBB0FED
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):4720
        Entropy (8bit):5.164796203267696
        Encrypted:false
        SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
        MD5:D65EC06F21C379C87040B83CC1ABAC6B
        SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
        SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
        SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/errorPageStrings.js
        Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\NewErrorPageTemplate[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):1612
        Entropy (8bit):4.869554560514657
        Encrypted:false
        SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
        MD5:DFEABDE84792228093A5A270352395B6
        SHA1:E41258C9576721025926326F76063C2305586F76
        SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
        SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
        Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):12105
        Entropy (8bit):5.451485481468043
        Encrypted:false
        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
        MD5:9234071287E637F85D721463C488704C
        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
        Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\dnserror[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):2997
        Entropy (8bit):4.4885437940628465
        Encrypted:false
        SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
        MD5:2DC61EB461DA1436F5D22BCE51425660
        SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
        SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
        SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=9002
        Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\down[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
        Category:downloaded
        Size (bytes):748
        Entropy (8bit):7.249606135668305
        Encrypted:false
        SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
        MD5:C4F558C4C8B56858F15C09037CD6625A
        SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
        SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
        SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/down.png
        Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
        C:\Users\user\AppData\Local\Temp\~DF3FAC29BBE4F117C2.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):25441
        Entropy (8bit):0.28923456811343773
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAq:kBqoxxJhHWSVSEab
        MD5:C5FA5846EB3941001848939D58622F19
        SHA1:4D7141E5AC8F36517C9F1C2177FFB4AA8A2634C0
        SHA-256:19B83EA51F71C190E3B886E6576B58665DB83BC5637DFCD28D87FFA3519BA83B
        SHA-512:4640A79B9126AF82D01E1347469233620EF25185AC7364CB16BC2BE4F841BAE89D53DD398B662B3FEDE6272760A0CD88FC82AC1D9E4643B0D5E120298FC9B9E1
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\~DFB33D5E07F9321015.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):34377
        Entropy (8bit):0.3495271606069126
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw9D9lw9D9l2919l291H:kBqoxKAuvScS+eYSbnInxmVjV3
        MD5:04529645FD22A39A8C0913E9C7C0A88A
        SHA1:CF7E422FC6F98FC7788CE69417AA3BBB1545E123
        SHA-256:E4B35E620E3EDAE7FBE431DC27E1503028DBDCA62F38493D13079B9CA6DF84C2
        SHA-512:DEE9651C8F194705E3776660838284E0F72EF4FC3E604EF7CD06BB1DE9467772B3B5D0BF256B1FFCD31EA9506E954EC66FFCD4F342C25A68DF601516D2B1351F
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\~DFE50478C6DEFE0505.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):13029
        Entropy (8bit):0.48217856897681405
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9logF9loI9lWNuoYdLCCA:kBqoIzlNuoYFA
        MD5:E35AC7A6812B188CBBF001578E1C17AB
        SHA1:656713E43FCB3B3A1F45D77D92087285A74E62AA
        SHA-256:61934276268F6860686BE65B8C8DB319ABD52C5A650B1BE63781B34BE28A6436
        SHA-512:87A947025961DF21A8DEC4CF72035584EBDA594572A2F9D84E1C10902E821C4C7619EBBACEB9AAFAAE35E7EB8E1BB0BF6D11FA82F87943C1D5DAB475A3E201E8
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        No static file info

        Network Behavior

        Network Port Distribution

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jan 26, 2021 06:52:30.995661974 CET49715443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:30.996469975 CET49716443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:32.002966881 CET49715443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:32.003021002 CET49716443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:34.003222942 CET49715443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:34.003247976 CET49716443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:38.024384975 CET49721443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:39.034960032 CET49721443192.168.2.3134.192.254.1
        Jan 26, 2021 06:52:41.034986973 CET49721443192.168.2.3134.192.254.1

        UDP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jan 26, 2021 06:52:25.451845884 CET6010053192.168.2.38.8.8.8
        Jan 26, 2021 06:52:25.477901936 CET53601008.8.8.8192.168.2.3
        Jan 26, 2021 06:52:26.185156107 CET5319553192.168.2.38.8.8.8
        Jan 26, 2021 06:52:26.216557026 CET53531958.8.8.8192.168.2.3
        Jan 26, 2021 06:52:27.116228104 CET5014153192.168.2.38.8.8.8
        Jan 26, 2021 06:52:27.142407894 CET53501418.8.8.8192.168.2.3
        Jan 26, 2021 06:52:28.881023884 CET5302353192.168.2.38.8.8.8
        Jan 26, 2021 06:52:28.903968096 CET53530238.8.8.8192.168.2.3
        Jan 26, 2021 06:52:29.844413042 CET4956353192.168.2.38.8.8.8
        Jan 26, 2021 06:52:29.877249956 CET53495638.8.8.8192.168.2.3
        Jan 26, 2021 06:52:30.848287106 CET5135253192.168.2.38.8.8.8
        Jan 26, 2021 06:52:30.864753962 CET5934953192.168.2.38.8.8.8
        Jan 26, 2021 06:52:30.887773991 CET53593498.8.8.8192.168.2.3
        Jan 26, 2021 06:52:30.985155106 CET53513528.8.8.8192.168.2.3
        Jan 26, 2021 06:52:31.540956020 CET5708453192.168.2.38.8.8.8
        Jan 26, 2021 06:52:31.572267056 CET53570848.8.8.8192.168.2.3
        Jan 26, 2021 06:52:32.515832901 CET5882353192.168.2.38.8.8.8
        Jan 26, 2021 06:52:32.547146082 CET53588238.8.8.8192.168.2.3
        Jan 26, 2021 06:52:33.629400969 CET5756853192.168.2.38.8.8.8
        Jan 26, 2021 06:52:33.653295040 CET53575688.8.8.8192.168.2.3
        Jan 26, 2021 06:52:34.394292116 CET5054053192.168.2.38.8.8.8
        Jan 26, 2021 06:52:34.428379059 CET53505408.8.8.8192.168.2.3
        Jan 26, 2021 06:52:45.315305948 CET5436653192.168.2.38.8.8.8
        Jan 26, 2021 06:52:45.346951008 CET53543668.8.8.8192.168.2.3
        Jan 26, 2021 06:52:51.052620888 CET5303453192.168.2.38.8.8.8
        Jan 26, 2021 06:52:51.075793028 CET53530348.8.8.8192.168.2.3

        DNS Queries

        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Jan 26, 2021 06:52:30.848287106 CET192.168.2.38.8.8.80xef5fStandard query (0)myportfolio.umm.eduA (IP address)IN (0x0001)
        Jan 26, 2021 06:52:45.315305948 CET192.168.2.38.8.8.80x7410Standard query (0)myportfolio.umm.eduA (IP address)IN (0x0001)

        DNS Answers

        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Jan 26, 2021 06:52:30.985155106 CET8.8.8.8192.168.2.30xef5fNo error (0)myportfolio.umm.edu134.192.254.1A (IP address)IN (0x0001)
        Jan 26, 2021 06:52:45.346951008 CET8.8.8.8192.168.2.30x7410Server failure (2)myportfolio.umm.edunonenoneA (IP address)IN (0x0001)

        Code Manipulations

        Statistics

        CPU Usage

        Click to jump to process

        Memory Usage

        Click to jump to process

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:06:52:28
        Start date:26/01/2021
        Path:C:\Program Files\internet explorer\iexplore.exe
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
        Imagebase:0x7ff614ae0000
        File size:823560 bytes
        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        General

        Start time:06:52:29
        Start date:26/01/2021
        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        Wow64 process (32bit):true
        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4600 CREDAT:17410 /prefetch:2
        Imagebase:0x12d0000
        File size:822536 bytes
        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Disassembly

        Reset < >