URL: | https://url.us.m.mimecastprotect.com/s/Ef5SCzpyz3u0Xr6ZHKslc9l72q?domain=urldefense.proofpoint.com |
Full analysis: | https://app.any.run/tasks/07a0f527-79a9-4854-bea8-f0dfffde7595 |
Verdict: | Malicious activity |
Analysis date: | April 15, 2025, 17:43:20 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
MD5: | F79E90D60508E4A69B5D2BBA862A0CFE |
SHA1: | 523CD4A40F4DB6260BA140728D768515F15F942F |
SHA256: | 20C263CD18A772D0BC0E28F461C33A19454B53CE711916DB6BC9102A7B95AB64 |
SSDEEP: | 3:N8UjmTSC8DUVc+QV9D0WJ9StKIE7ALhPKKR2:2UjwSUVcvVZ0OwtKIEENP12 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 307 | 13.107.253.45:443 | https://url.us.m.mimecastprotect.com/s/Ef5SCzpyz3u0Xr6ZHKslc9l72q?domain=urldefense.proofpoint.com | unknown | — | — | — |
1060 | svchost.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | — | 92.123.104.43:443 | https://www.bing.com/bloomfilterfiles/ExpandedDomainsFilterGlobal.json | unknown | — | — | — |
3272 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.159.128:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 20.190.159.128:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | — | 23.35.229.160:443 | https://go.microsoft.com/fwlink/?LinkID=2257403&clcid=0x409 | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3272 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
3080 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1060 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1396 | msedge.exe | 207.211.31.64:443 | url.us.m.mimecastprotect.com | NAVISITE-EAST-2 | US | whitelisted |
4940 | svchost.exe | 20.190.159.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1396 | msedge.exe | 52.71.28.102:443 | urldefense.proofpoint.com | AMAZON-AES | US | whitelisted |
3272 | RUXIMICS.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
1060 | svchost.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
1396 | msedge.exe | 172.233.49.32:443 | 2.timheinrichlaw.com | Akamai International B.V. | US | unknown |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
url.us.m.mimecastprotect.com |
| whitelisted |
login.live.com |
| whitelisted |
urldefense.proofpoint.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
2.timheinrichlaw.com |
| unknown |
www.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | ET PHISHING Javascript Browser Fingerprinting POST Request |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |