Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://42.193.252.92:2095/

Overview

General Information

Sample URL:http://42.193.252.92:2095/
Analysis ID:1436592
Infos:
Errors
  • URL not reachable

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports

Classification

  • System is w10x64
  • chrome.exe (PID: 5264 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 2316 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1952,i,11363131595393151912,7246388466636725898,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6408 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://42.193.252.92:2095/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://42.193.252.92:2095/Avira URL Cloud: detection malicious, Label: malware
Source: http://42.193.252.92:2095/Virustotal: Detection: 10%Perma Link

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 2095
Source: unknownNetwork traffic detected: HTTP traffic on port 2095 -> 49735
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownTCP traffic detected without corresponding DNS query: 42.193.252.92
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 42.193.252.92:2095Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 6 May 2024 03:31:04 GMTContent-Type: text/plainContent-Length: 0
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: classification engineClassification label: mal60.troj.win@17/0@2/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1952,i,11363131595393151912,7246388466636725898,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://42.193.252.92:2095/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1952,i,11363131595393151912,7246388466636725898,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 2095
Source: unknownNetwork traffic detected: HTTP traffic on port 2095 -> 49735
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging3
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://42.193.252.92:2095/100%Avira URL Cloudmalware
http://42.193.252.92:2095/10%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.64.164
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.211.108
    truefalseunknown
    NameMaliciousAntivirus DetectionReputation
    http://42.193.252.92:2095/true
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.64.164
      www.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      42.193.252.92
      unknownChina
      4249LILLY-ASUSfalse
      IP
      192.168.2.4
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1436592
      Start date and time:2024-05-06 05:30:11 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 56s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:http://42.193.252.92:2095/
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal60.troj.win@17/0@2/4
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • URL browsing timeout or error
      • URL not reachable
      • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 192.178.50.67, 172.217.165.206, 173.194.213.84, 34.104.35.123, 23.196.177.159, 52.165.165.26, 72.21.81.240, 192.229.211.108, 52.165.164.15
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fs.microsoft.com, accounts.google.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, edgedl.me.gvt1.com, clients.l.google.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      No static file info
      TimestampSource PortDest PortSource IPDest IP
      May 6, 2024 05:30:53.325707912 CEST49675443192.168.2.4173.222.162.32
      May 6, 2024 05:30:53.482114077 CEST49678443192.168.2.4104.46.162.224
      May 6, 2024 05:31:02.933461905 CEST49675443192.168.2.4173.222.162.32
      May 6, 2024 05:31:03.688265085 CEST497352095192.168.2.442.193.252.92
      May 6, 2024 05:31:03.688420057 CEST497362095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.046808958 CEST20954973542.193.252.92192.168.2.4
      May 6, 2024 05:31:04.046920061 CEST497352095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.060477018 CEST20954973642.193.252.92192.168.2.4
      May 6, 2024 05:31:04.060558081 CEST497362095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.074722052 CEST497382095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.075249910 CEST497352095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.418351889 CEST20954973542.193.252.92192.168.2.4
      May 6, 2024 05:31:04.418895960 CEST20954973542.193.252.92192.168.2.4
      May 6, 2024 05:31:04.418931007 CEST20954973542.193.252.92192.168.2.4
      May 6, 2024 05:31:04.418992043 CEST497352095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.421998978 CEST20954973842.193.252.92192.168.2.4
      May 6, 2024 05:31:04.422065020 CEST497382095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.423398972 CEST497352095192.168.2.442.193.252.92
      May 6, 2024 05:31:04.774627924 CEST20954973542.193.252.92192.168.2.4
      May 6, 2024 05:31:05.817858934 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:05.817894936 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:05.817956924 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:05.818278074 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:05.818296909 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:06.057313919 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:06.058140993 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:06.058176994 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:06.059042931 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:06.059118032 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:06.063390017 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:06.063456059 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:06.215599060 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:06.215619087 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:06.325062990 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:16.046268940 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:16.046331882 CEST44349740142.250.64.164192.168.2.4
      May 6, 2024 05:31:16.046401978 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:17.592726946 CEST49740443192.168.2.4142.250.64.164
      May 6, 2024 05:31:17.592746973 CEST44349740142.250.64.164192.168.2.4
      TimestampSource PortDest PortSource IPDest IP
      May 6, 2024 05:31:01.459244013 CEST53526791.1.1.1192.168.2.4
      May 6, 2024 05:31:01.509268045 CEST53507311.1.1.1192.168.2.4
      May 6, 2024 05:31:02.148184061 CEST53565961.1.1.1192.168.2.4
      May 6, 2024 05:31:05.703618050 CEST5902153192.168.2.41.1.1.1
      May 6, 2024 05:31:05.703788996 CEST5140153192.168.2.41.1.1.1
      May 6, 2024 05:31:05.816306114 CEST53590211.1.1.1192.168.2.4
      May 6, 2024 05:31:05.816462994 CEST53514011.1.1.1192.168.2.4
      May 6, 2024 05:31:20.884927988 CEST53550221.1.1.1192.168.2.4
      May 6, 2024 05:31:24.002264977 CEST138138192.168.2.4192.168.2.255
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      May 6, 2024 05:31:05.703618050 CEST192.168.2.41.1.1.10xc9deStandard query (0)www.google.comA (IP address)IN (0x0001)false
      May 6, 2024 05:31:05.703788996 CEST192.168.2.41.1.1.10xfd3eStandard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      May 6, 2024 05:31:05.816306114 CEST1.1.1.1192.168.2.40xc9deNo error (0)www.google.com142.250.64.164A (IP address)IN (0x0001)false
      May 6, 2024 05:31:05.816462994 CEST1.1.1.1192.168.2.40xfd3eNo error (0)www.google.com65IN (0x0001)false
      May 6, 2024 05:31:16.839808941 CEST1.1.1.1192.168.2.40x7383No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      May 6, 2024 05:31:16.839808941 CEST1.1.1.1192.168.2.40x7383No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
      • 42.193.252.92:2095
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.44973542.193.252.9220952316C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      May 6, 2024 05:31:04.075249910 CEST433OUTGET / HTTP/1.1
      Host: 42.193.252.92:2095
      Connection: keep-alive
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      Accept-Encoding: gzip, deflate
      Accept-Language: en-US,en;q=0.9
      May 6, 2024 05:31:04.418895960 CEST107INHTTP/1.1 404 Not Found
      Date: Mon, 6 May 2024 03:31:04 GMT
      Content-Type: text/plain
      Content-Length: 0


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:05:30:55
      Start date:06/05/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:05:30:59
      Start date:06/05/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1952,i,11363131595393151912,7246388466636725898,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:05:31:01
      Start date:06/05/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://42.193.252.92:2095/"
      Imagebase:0x7ff76e190000
      File size:3'242'272 bytes
      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      No disassembly