File name:

Spyware.zip

Full analysis: https://app.any.run/tasks/ade80e18-85da-432b-a362-7bf5d3abc361
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 10, 2024, 23:53:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
chimera
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v4.5 to extract, compression method=deflate
MD5:

02017DAB46A248B6C69982C35AFDFA21

SHA1:

2958978BE43FA2B1AB2C7076182282B15D17E2DC

SHA256:

4D104F2A3CB1812C62F80E35F7287D91B68C0163377001779B10E88C974F038D

SSDEEP:

98304:j8BCqQ11cdi1Kvn5m01NZ8SwGYi1jVnVicrFiYM33dKGmOCROFjYEIR/2gX+rlKe:+iV767g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3700)
      • butterflyondesktop.exe (PID: 3276)
      • butterflyondesktop.exe (PID: 3460)
      • butterflyondesktop.tmp (PID: 3964)
      • AgentTesla.exe (PID: 2016)
    • Changes the autorun value in the registry

      • butterflyondesktop.tmp (PID: 3964)
    • Microsoft Office executes commands via PowerShell or Cmd

      • WINWORD.EXE (PID: 548)
    • Unusual execution from MS Office

      • WINWORD.EXE (PID: 548)
    • Starts CMD.EXE for commands execution

      • WINWORD.EXE (PID: 548)
    • CHIMERA has been detected (SURICATA)

      • msedge.exe (PID: 1808)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • butterflyondesktop.exe (PID: 3460)
      • butterflyondesktop.exe (PID: 3276)
      • butterflyondesktop.tmp (PID: 3964)
      • AgentTesla.exe (PID: 2016)
    • Process drops legitimate windows executable

      • butterflyondesktop.tmp (PID: 3964)
    • Reads the Internet Settings

      • butterflyondesktop.tmp (PID: 3964)
      • powershell.exe (PID: 2868)
    • Reads the Windows owner or organization settings

      • butterflyondesktop.tmp (PID: 3964)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 2740)
    • Runs shell command (SCRIPT)

      • WINWORD.EXE (PID: 548)
    • Non-standard symbols in registry

      • WINWORD.EXE (PID: 548)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 2740)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 2740)
  • INFO

    • Checks supported languages

      • butterflyondesktop.tmp (PID: 2332)
      • butterflyondesktop.exe (PID: 3460)
      • butterflyondesktop.exe (PID: 3276)
      • ButterflyOnDesktop.exe (PID: 2792)
      • butterflyondesktop.tmp (PID: 3964)
      • HawkEye.exe (PID: 3632)
      • AgentTesla.exe (PID: 2016)
    • Reads the computer name

      • butterflyondesktop.tmp (PID: 2332)
      • butterflyondesktop.tmp (PID: 3964)
      • HawkEye.exe (PID: 3632)
      • AgentTesla.exe (PID: 2016)
    • Create files in a temporary directory

      • butterflyondesktop.exe (PID: 3460)
      • butterflyondesktop.exe (PID: 3276)
      • butterflyondesktop.tmp (PID: 3964)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3700)
    • Manual execution by a user

      • butterflyondesktop.exe (PID: 3460)
      • WINWORD.EXE (PID: 548)
      • msedge.exe (PID: 2100)
      • HawkEye.exe (PID: 3632)
      • AgentTesla.exe (PID: 2016)
      • msedge.exe (PID: 2124)
      • AgentTesla.exe (PID: 4020)
    • Application launched itself

      • msedge.exe (PID: 2064)
      • msedge.exe (PID: 2100)
      • msedge.exe (PID: 2124)
    • Creates files in the program directory

      • butterflyondesktop.tmp (PID: 3964)
      • AgentTesla.exe (PID: 2016)
    • Creates a software uninstall entry

      • butterflyondesktop.tmp (PID: 3964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Spyware/
ZipUncompressedSize: -
ZipCompressedSize: 2
ZipCRC: 0x00000000
ZipModifyDate: 2024:03:03 01:03:36
ZipCompression: Deflated
ZipBitFlag: 0x0800
ZipRequiredVersion: 45
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
98
Monitored processes
50
Malicious processes
6
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe butterflyondesktop.exe butterflyondesktop.tmp no specs butterflyondesktop.exe butterflyondesktop.tmp butterflyondesktop.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winword.exe no specs cmd.exe no specs powershell.exe no specs hawkeye.exe no specs agenttesla.exe no specs agenttesla.exe msedge.exe msedge.exe no specs msedge.exe no specs #CHIMERA msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3700"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Spyware.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3460"C:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exe" C:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exe
explorer.exe
User:
admin
Company:
Drive Software Company
Integrity Level:
MEDIUM
Description:
Butterfly on Desktop Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\spyware\spyware\butterflyondesktop.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2332"C:\Users\admin\AppData\Local\Temp\is-CHHLE.tmp\butterflyondesktop.tmp" /SL5="$120160,2719719,54272,C:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exe" C:\Users\admin\AppData\Local\Temp\is-CHHLE.tmp\butterflyondesktop.tmpbutterflyondesktop.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-chhle.tmp\butterflyondesktop.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3276"C:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exe" /SPAWNWND=$5020E /NOTIFYWND=$120160 C:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exe
butterflyondesktop.tmp
User:
admin
Company:
Drive Software Company
Integrity Level:
HIGH
Description:
Butterfly on Desktop Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\spyware\spyware\butterflyondesktop.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3964"C:\Users\admin\AppData\Local\Temp\is-4V63K.tmp\butterflyondesktop.tmp" /SL5="$80240,2719719,54272,C:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exe" /SPAWNWND=$5020E /NOTIFYWND=$120160 C:\Users\admin\AppData\Local\Temp\is-4V63K.tmp\butterflyondesktop.tmp
butterflyondesktop.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-4v63k.tmp\butterflyondesktop.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2792"C:\Program Files\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files\Butterfly on Desktop\ButterflyOnDesktop.exebutterflyondesktop.tmp
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\program files\butterfly on desktop\butterflyondesktop.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2064"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.htmlC:\Program Files\Microsoft\Edge\Application\msedge.exebutterflyondesktop.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2364"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd8,0x6a42f598,0x6a42f5a8,0x6a42f5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1768"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1328 --field-trial-handle=1392,i,1948850662048884830,8835101865411008669,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3324"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1580 --field-trial-handle=1392,i,1948850662048884830,8835101865411008669,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
32 905
Read events
31 980
Write events
676
Delete events
249

Modification events

(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3700) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Spyware.zip
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3700) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
28
Suspicious files
111
Text files
138
Unknown types
83

Dropped files

PID
Process
Filename
Type
3276butterflyondesktop.exeC:\Users\admin\AppData\Local\Temp\is-4V63K.tmp\butterflyondesktop.tmpexecutable
MD5:C765336F0DCF4EFDCC2101EED67CD30C
SHA256:C5177FDC6031728E10141745CD69EDBC91C92D14411A2DEC6E8E8CAA4F74AB28
3964butterflyondesktop.tmpC:\Users\admin\AppData\Local\Temp\is-3BMB7.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
3964butterflyondesktop.tmpC:\Program Files\Butterfly on Desktop\is-1RIM5.tmptext
MD5:F68621DA9CCBE320AEBB5807C6F733CB
SHA256:0479A712A54ADA76EAF0BC5F3B57C764880D1540CBE266724D35C4DCBF40E4E2
3964butterflyondesktop.tmpC:\Program Files\Butterfly on Desktop\is-AP3PA.tmpexecutable
MD5:1FEE4DB19D9F5AF7834EC556311E69DD
SHA256:3D550C908D5A8DE143C5CD5F4FE431528CD5FA20B77F4605A9B8CA063E83FC36
3964butterflyondesktop.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Butterfly on Desktop\Butterfly on Desktop.lnkbinary
MD5:1972905944021A8E8E0FB97CB89556F0
SHA256:7B8BFD0D4F38E25A56E6C6B058C2913CB16508827764E266D67064C5C86981C4
3700WinRAR.exeC:\Users\admin\AppData\Local\Temp\Spyware\Spyware\butterflyondesktop.exeexecutable
MD5:1535AA21451192109B86BE9BCC7C4345
SHA256:4641AF6A0071E11E13AD3B1CD950E01300542C2B9EFB6AE92FFECEDDE974A4A6
3964butterflyondesktop.tmpC:\Users\admin\Desktop\Butterfly on Desktop.lnklnk
MD5:40597788D35B84035FAEB096014FC8E5
SHA256:15FD6E8F20004D35F35C7052EF1F8A254562B5D6ECFE62E2B7C33AE88C7C428C
3700WinRAR.exeC:\Users\admin\AppData\Local\Temp\Spyware\Spyware\Kakwa.docdocument
MD5:9A039302B3F3109607DFA7C12CFBD886
SHA256:31CA294DDD253E4258A948CF4D4B7AAAA3E0AA1457556E0E62EE53C22B4EB6F0
3460butterflyondesktop.exeC:\Users\admin\AppData\Local\Temp\is-CHHLE.tmp\butterflyondesktop.tmpexecutable
MD5:C765336F0DCF4EFDCC2101EED67CD30C
SHA256:C5177FDC6031728E10141745CD69EDBC91C92D14411A2DEC6E8E8CAA4F74AB28
3964butterflyondesktop.tmpC:\Program Files\Butterfly on Desktop\unins000.exeexecutable
MD5:1FEE4DB19D9F5AF7834EC556311E69DD
SHA256:3D550C908D5A8DE143C5CD5F4FE431528CD5FA20B77F4605A9B8CA063E83FC36
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
89
DNS requests
138
Threats
23

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/button.css
unknown
text
2.71 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/main.css
unknown
text
4.15 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/slider/slider.js
unknown
text
3.00 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/images/superman_likeus.gif
unknown
image
30.8 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/slider/slider.css
unknown
text
6.40 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/images/banner_bg2.jpg
unknown
image
2.50 Kb
3800
msedge.exe
GET
200
142.250.179.174:80
http://www.google-analytics.com/ga.js
unknown
text
16.7 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/images/menubackgroundside2.jpg
unknown
image
1.35 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/images/banner3.jpg
unknown
image
41.3 Kb
3800
msedge.exe
GET
200
78.46.117.95:80
http://freedesktopsoft.com/butterflyondesktoplike.html
unknown
html
6.04 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
224.0.0.252:5355
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3800
msedge.exe
78.46.117.95:80
freedesktopsoft.com
Hetzner Online GmbH
DE
unknown
2100
msedge.exe
239.255.255.250:1900
unknown
3800
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3800
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3800
msedge.exe
142.251.36.34:443
pagead2.googlesyndication.com
GOOGLE
US
unknown
3800
msedge.exe
142.250.179.174:80
www.google-analytics.com
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
freedesktopsoft.com
  • 78.46.117.95
unknown
edge.microsoft.com
  • 204.79.197.239
unknown
config.edge.skype.com
  • 13.107.42.16
unknown
pagead2.googlesyndication.com
  • 142.251.36.34
unknown
www.google-analytics.com
  • 142.250.179.174
unknown
connect.facebook.net
  • 157.240.247.8
unknown
googleads.g.doubleclick.net
  • 216.58.214.2
unknown
fundingchoicesmessages.google.com
  • 172.217.23.206
unknown
www.bing.com
  • 2.16.27.225
unknown
megabytemantom.com
  • 151.106.100.61
unknown

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (mega .nz)
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (mega .nz)
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (mega .nz)
Potential Corporate Privacy Violation
ET POLICY Bitmessage Activity
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (mega .nz)
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (mega .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1 ETPRO signatures available at the full report
No debug info