URL: | https://track.pstmrk.it/3s/gamma.app/JjV-/Qia9AQ/AQ/89998c6f-6f2f-48ef-988b-2c71a9f4b078/1/JFTYCTDiR- |
Full analysis: | https://app.any.run/tasks/22f68cc6-d922-4de7-9817-5a712e02d25f |
Verdict: | Malicious activity |
Analysis date: | May 10, 2025, 01:06:37 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
MD5: | 55F79D963305BC6B350BE498B0FDF914 |
SHA1: | C47A903FC2C0AE502EF065DC1EB6F0C538D3048E |
SHA256: | 17BF9132522F55CDF1FD0AE9A2811444D7BB5080A0E19ED89B92BC5ED133E0C9 |
SSDEEP: | 3:N8fv83WnEV9Bd0dmIcdFqGSdyyyNv:2n8OE1d0AhdF9ScyyNv |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1396 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --webtransport-developer-mode --no-appcompat-clear --mojo-platform-channel-handle=2532 --field-trial-handle=2372,i,8504447382059928769,14367336096275567116,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c1 | binary | |
MD5:764B65B8EAF71782F3B389974BE9EA7E | SHA256:4D127F796E8889D049DA1719E0C1EB38A5D76E1F48B785B0A2811E941490BC0C | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c3 | binary | |
MD5:0806F2DFF681C394B6CA341D5AA6572E | SHA256:86F876127D7F6EC4015FA945AE3F318A915F6CFE1D75E26C239093C0C918DC9D | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bb | compressed | |
MD5:10B84D6DDEFB33D0D3F0615CA3E91C5A | SHA256:C69A6E50A300D39721F9AE8FC5B40600DD90093F65E3A4650C9540C58C071144 | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c6 | binary | |
MD5:671E5511F5F667E1102B5C1E04D4190A | SHA256:1E654302AF010F94C994F3980F582B7748E727771C6492A7EEB14BB400D8DC2A | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000be | binary | |
MD5:C5D7E80F7C76F707B76846A20B28907C | SHA256:1F482A1F82A4A00C308A9DAFC7B40E043B7180ADB2D1468297167FC9DFCE695F | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\f8d1aa49-2914-4dfc-bc6b-f1d6a63e7ad4.tmp | binary | |
MD5:3140CB797498137E330D3CAE1AD5970A | SHA256:B4C87E65FB18FF2E4028E934653089C7DE70D854E7D861D9A1063189C5212119 | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bd | binary | |
MD5:AB632DA2E04EA311E078D0456E185873 | SHA256:63E996CE464BC817E49F5116FA2A1B2A2CA25340768E92157EEE4E889C7C8A90 | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c2 | binary | |
MD5:0C3E693586754A02975071A720746336 | SHA256:2C608D956FB5138EF176B125E04E3E4961799E92C2928DFFCD9BA05BBF812565 | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c8 | binary | |
MD5:BEAA20C255BE9E38AEBF09A31D3CBFAE | SHA256:F064B90551FD55D59A4DBE39C5ECF461D60B8D7D0EE9B4364B652B9ED21E9CBC | |||
1396 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c7 | binary | |
MD5:6DB9016B26D4FEB8960AC1495477E9D6 | SHA256:63C688633C5DA0872B180A311760ED4A16353B67BA643A75AFC22F15BE87E9F5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 302 | 3.130.226.128:443 | https://track.pstmrk.it/3s/gamma.app/JjV-/Qia9AQ/AQ/89998c6f-6f2f-48ef-988b-2c71a9f4b078/1/JFTYCTDiR- | unknown | — | — | — |
— | — | GET | 302 | 3.13.46.171:443 | https://track.pstmrk.it/3s/gamma.app/JjV-/Qia9AQ/AQ/89998c6f-6f2f-48ef-988b-2c71a9f4b078/1/JFTYCTDiR- | unknown | — | — | — |
4940 | RUXIMICS.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3080 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
468 | svchost.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4940 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
3080 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
468 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.160.17:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 20.190.160.17:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
4940 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3080 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
468 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1396 | msedge.exe | 54.155.60.93:443 | track.pstmrk.it | AMAZON-02 | IE | shared |
7040 | svchost.exe | 40.126.31.69:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1396 | msedge.exe | 104.18.10.200:443 | gamma.app | CLOUDFLARENET | — | suspicious |
4940 | RUXIMICS.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3080 | MoUsoCoreWorker.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
468 | svchost.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
track.pstmrk.it |
| shared |
login.live.com |
| whitelisted |
gamma.app |
| unknown |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
challenges.cloudflare.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Gamma app |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Gamma app |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Gamma app |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Gamma app |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Gamma app |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing Gamma app |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] An application monitoring request to sentry .io |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] An application monitoring request to sentry .io |