URL: | http://elproman-ab-1.jimdosite.com/ |
Full analysis: | https://app.any.run/tasks/525f8da6-b8ff-426c-a081-32428bcc04c3 |
Verdict: | Malicious activity |
Analysis date: | January 10, 2025, 19:19:44 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | FE6C76122F911C2D2EB90ADFDD44BF6C |
SHA1: | 56C41BB222370F041F7464EF113FA3A02C3AD661 |
SHA256: | 26399417EAB5D1E573A7E5C44364300FDE6BB86B16A2553EE6F90E8A5EDC5A2C |
SSDEEP: | 3:N1KbbYLIEfQAt:CnoQc |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
7172 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --webtransport-developer-mode --no-appcompat-clear --mojo-platform-channel-handle=2496 --field-trial-handle=2204,i,13280900864495260754,3672259324373187194,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000fb | binary | |
MD5:311F1298863858C8334BD7A8A0E34014 | SHA256:846351F83ED17838A1DE223EAD4E9900D1E127B3243695DAF5A4988E965C44CC | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000ff | woff2 | |
MD5:9A01B69183A9604AB3A439E388B30501 | SHA256:20B535FA80C8189E3B87D1803038389960203A886D502BC2EF1857AFFC2F38D2 | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF296e43.TMP | binary | |
MD5:D2615E0C4F6C46045EDB3EAA0ACE252A | SHA256:48EFA073914F67BCCE305DECBC121BE7FA6D343982BE00A666B4C5FB6A30A7A9 | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:8B7DC31671329A88EC662F3400D9437D | SHA256:4D20E8624BD4F4C72150241A27DA5D78949959DF7259BCBCD8B6F26A5B1D57BF | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\95b894c8-6dfa-48b2-947c-400e737bde70.tmp | binary | |
MD5:589AF3F8D054F5D042AA01FBDC953903 | SHA256:2F8550440C0F36C8F5523AF3C363E60EE7D8F49CB22E49F0A3475D5AAA4451E6 | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2952eb.TMP | binary | |
MD5:D0453075479429FE52D8FB780A7DA8E9 | SHA256:574112CCCB36E004E93B2BCBBA7F6CEB8FF3B12E3E462BEF80F1B57044E035B1 | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\5f991da9-c0bd-4c4f-b71e-6746b27ccdeb.tmp | binary | |
MD5:8D83231E8A754047AD0E3C098E567BE9 | SHA256:FFC0F658ECD66ED6D630EB43625194D7210FB5130DD2614B96FA48E5CFFC8DBB | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\0a7e8b97-7cb2-4585-b05e-bf40c30cdc3e.tmp | binary | |
MD5:8B7DC31671329A88EC662F3400D9437D | SHA256:4D20E8624BD4F4C72150241A27DA5D78949959DF7259BCBCD8B6F26A5B1D57BF | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity | binary | |
MD5:8D83231E8A754047AD0E3C098E567BE9 | SHA256:FFC0F658ECD66ED6D630EB43625194D7210FB5130DD2614B96FA48E5CFFC8DBB | |||
7172 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2a57f7.TMP | binary | |
MD5:8B7DC31671329A88EC662F3400D9437D | SHA256:4D20E8624BD4F4C72150241A27DA5D78949959DF7259BCBCD8B6F26A5B1D57BF |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
7172 | msedge.exe | GET | 301 | 162.159.128.70:80 | http://elproman-ab-1.jimdosite.com/ | unknown | — | — | whitelisted |
3024 | svchost.exe | GET | 206 | 199.232.214.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/d50ccf3e-dd06-4e6f-bb20-931c8ce33527?P1=1736814260&P2=404&P3=2&P4=c74md5vA8A8wi4acyq6DMmPDX3GddhWIn%2bL%2f7%2b6BpVBviByf5g1XKo4G6PSKoyOiXLcwyySZa83Ad3F6D5NhzA%3d%3d | unknown | — | — | whitelisted |
3024 | svchost.exe | GET | 206 | 199.232.214.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/d50ccf3e-dd06-4e6f-bb20-931c8ce33527?P1=1736814260&P2=404&P3=2&P4=c74md5vA8A8wi4acyq6DMmPDX3GddhWIn%2bL%2f7%2b6BpVBviByf5g1XKo4G6PSKoyOiXLcwyySZa83Ad3F6D5NhzA%3d%3d | unknown | — | — | whitelisted |
3024 | svchost.exe | GET | 206 | 199.232.214.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/d50ccf3e-dd06-4e6f-bb20-931c8ce33527?P1=1736814260&P2=404&P3=2&P4=c74md5vA8A8wi4acyq6DMmPDX3GddhWIn%2bL%2f7%2b6BpVBviByf5g1XKo4G6PSKoyOiXLcwyySZa83Ad3F6D5NhzA%3d%3d | unknown | — | — | whitelisted |
3024 | svchost.exe | HEAD | 200 | 199.232.214.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/d50ccf3e-dd06-4e6f-bb20-931c8ce33527?P1=1736814260&P2=404&P3=2&P4=c74md5vA8A8wi4acyq6DMmPDX3GddhWIn%2bL%2f7%2b6BpVBviByf5g1XKo4G6PSKoyOiXLcwyySZa83Ad3F6D5NhzA%3d%3d | unknown | — | — | whitelisted |
3024 | svchost.exe | GET | 206 | 199.232.214.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/d50ccf3e-dd06-4e6f-bb20-931c8ce33527?P1=1736814260&P2=404&P3=2&P4=c74md5vA8A8wi4acyq6DMmPDX3GddhWIn%2bL%2f7%2b6BpVBviByf5g1XKo4G6PSKoyOiXLcwyySZa83Ad3F6D5NhzA%3d%3d | unknown | — | — | whitelisted |
3024 | svchost.exe | GET | 206 | 199.232.214.172:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/d50ccf3e-dd06-4e6f-bb20-931c8ce33527?P1=1736814260&P2=404&P3=2&P4=c74md5vA8A8wi4acyq6DMmPDX3GddhWIn%2bL%2f7%2b6BpVBviByf5g1XKo4G6PSKoyOiXLcwyySZa83Ad3F6D5NhzA%3d%3d | unknown | — | — | whitelisted |
— | — | GET | 200 | 104.18.94.41:443 | https://challenges.cloudflare.com/turnstile/v0/b/e0c90b6a3ed1/api.js?onload=JgQlg5&render=explicit | unknown | binary | 46.4 Kb | whitelisted |
— | — | GET | 200 | 172.64.146.218:443 | https://fonts.jimstatic.com/css?display=swap&family=Poppins:600,700 | unknown | text | 1.66 Kb | whitelisted |
— | — | POST | 200 | 204.79.197.239:443 | https://edge.microsoft.com/componentupdater/api/v1/update?cup2key=7:O3Kv54BMp5x5OPCTMqS04scm0vUv5HwJBzAb0fSsfW8&cup2hreq=dbc3c9d8ae815cc174e4002c5891ac4f1dca5cdd08e15deba77dd48a55ce57e9 | unknown | text | 18.4 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
3080 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5776 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6028 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4668 | msedge.exe | 224.0.0.251:5353 | — | — | — | unknown |
7172 | msedge.exe | 2.23.227.215:443 | www.bing.com | Ooredoo Q.S.C. | QA | whitelisted |
7172 | msedge.exe | 162.159.128.70:80 | elproman-ab-1.jimdosite.com | CLOUDFLARENET | — | whitelisted |
7172 | msedge.exe | 162.159.128.70:443 | elproman-ab-1.jimdosite.com | CLOUDFLARENET | — | whitelisted |
7172 | msedge.exe | 104.18.95.41:443 | challenges.cloudflare.com | — | — | whitelisted |
7172 | msedge.exe | 162.159.129.70:443 | elproman-ab-1.jimdosite.com | CLOUDFLARENET | — | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
elproman-ab-1.jimdosite.com |
| whitelisted |
challenges.cloudflare.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
msedge.b.tlu.dl.delivery.mp.microsoft.com |
| whitelisted |
jimdo-dolphin-static-assets-prod.freetls.fastly.net |
| whitelisted |
fonts.jimstatic.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspicious RDGA Subdomain ( .jimdosite .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspicious RDGA Subdomain ( .jimdosite .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspicious RDGA Subdomain ( .jimdosite .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspicious RDGA Subdomain ( .jimdosite .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspicious RDGA Subdomain ( .jimdosite .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspicious RDGA Subdomain ( .jimdosite .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (saudigraphco .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (saudigraphco .com) |