URL: | https://google.co.ve/url?q=xbcopwnJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fs%2Fwdsoft.com.br%2F8yoya%2Fnivhumng6xtplgl%C3%A3%E2%82%AC%E2%80%9A%2FbGl2aW8ucmFpbW9uZGlAYW5pbWFzZ3IuaXQ%3D%C3%A3%E2%82%AC%E2%80%9A%24%24%24%C3%A3%E2%82%AC%E2%80%9A |
Full analysis: | https://app.any.run/tasks/7011d7ab-679e-4f26-8d83-3a8820ce53a9 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 02:22:13 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 35EB078F1AE815E57F966A774E29FE5F |
SHA1: | 8EC5EA8F0CA1C47D3B10CB31F111B9A3091C6F2E |
SHA256: | 34C31A28B40CC74C053942065EE43AE1214DD000C3C666F7403B2C6396CF1404 |
SSDEEP: | 6:2LuJLQkpRtMqfaZYxAvAgIq8jVMwcAvAgIq1B9BxAvAgIqV:2yjrfaZYxVxq8jcVxq1fVxqV |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b6437.TMP | binary | |
MD5:15D26FA4E16467BE658F42074AC0DBAA | SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\6672df29-fc3c-4bdd-a522-810615235361.tmp | binary | |
MD5:8C1117220C10B502CC69A93B668721A7 | SHA256:3DD2CD570D4C300771A7B4B97FB5E61D271E8D4ADE3CF51D85EF3B9F514817CA | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity | binary | |
MD5:8C1117220C10B502CC69A93B668721A7 | SHA256:3DD2CD570D4C300771A7B4B97FB5E61D271E8D4ADE3CF51D85EF3B9F514817CA | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000ba | binary | |
MD5:9D3A86131A0DB3FE3C8DA961A9375437 | SHA256:25169B42169BB50686D2F56EBD79F58B88761B3CC492F5AC15B1841F27C9DECE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
2700 | svchost.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2660 | RUXIMICS.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2660 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2700 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | — | 191.252.141.125:443 | https://wdsoft.com.br/8yoya/nivhumng6xtplgl%C3%A3%E2%82%AC%E2%80%9A/bGl2aW8ucmFpbW9uZGlAYW5pbWFzZ3IuaXQ=%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A | unknown | — | — | — |
— | — | GET | — | 191.252.141.125:443 | https://wdsoft.com.br/favicon.ico | unknown | — | — | — |
— | — | GET | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | binary | 55 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2700 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 224.0.0.251:5353 | — | — | — | unknown |
4792 | msedge.exe | 104.208.16.88:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
2660 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4304 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4792 | msedge.exe | 172.217.18.99:443 | google.co.ve | GOOGLE | US | whitelisted |
5348 | svchost.exe | 184.28.90.27:443 | fs.microsoft.com | AKAMAI-AS | US | whitelisted |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4792 | msedge.exe | 142.250.185.227:443 | www.google.co.ve | GOOGLE | US | whitelisted |
2700 | svchost.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
google.co.ve |
| whitelisted |
fs.microsoft.com |
| whitelisted |
www.google.co.ve |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
wdsoft.com.br |
| unknown |
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |