URL:

https://google.co.ve/url?q=kbbwpmpJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2fthelatewire.com%2f8yoya%2fqxh11oli6prujvm%E3%80%82%E3%80%82%2fYmluaXRhLmJodXRhQGNvdmF0aW9uYmlvLmNvbQ==%E3%80%82$$%E3%80%82

Full analysis: https://app.any.run/tasks/5676bab2-79e3-47a1-aad4-a4627cd7632b
Verdict: Malicious activity
Analysis date: December 14, 2024, 07:36:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
Indicators:
MD5:

7BE6E93AC867D08EE0620BFF316FF31F

SHA1:

EFA3D39B42C699F0DFCD385B34D9D489F61BBA63

SHA256:

4E36E80B1159DA3EE2DD410DF65CD2A094BA4B84C23E259AC5D57337DD0148E3

SSDEEP:

6:2LuJLQk4otRtMqfSU7d9qVWVqpXTAGSwVAVn:2yj4oXfSkws81CV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 4792)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#PHISHING msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
4792"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
16
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\39d41481-a82b-4a8e-9b12-9d4ff38a5114.tmpbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b6550.TMPbinary
MD5:15D26FA4E16467BE658F42074AC0DBAA
SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent Statebinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b7202.TMPbinary
MD5:2A21453795942FD88CBB06714604B9FD
SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecuritybinary
MD5:96C84325E942344531B2415062A04849
SHA256:FED464AAA09BBDFF3555DF8BEFB3285956B2DD80E6CE7C1F730E2F59C8900E6A
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c0compressed
MD5:9E7C4D9BBAED7E44F7E4A8BDFA526C43
SHA256:BEDC9C2C4B54E876B4717A7ADF9A0F784804B5267B8F20B0B56A6991FD9279C9
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000becompressed
MD5:39C777C1153FE4B4EA210EDBFD6F313B
SHA256:5FCB3A86E179102AE9460A3BD8094099A7ED15C740C67280FD17272E52A8C4D0
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\1741dc09-9810-466c-af74-3355d3ccb6dd.tmpbinary
MD5:96C84325E942344531B2415062A04849
SHA256:FED464AAA09BBDFF3555DF8BEFB3285956B2DD80E6CE7C1F730E2F59C8900E6A
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bfcompressed
MD5:3E0A86D839E7A7080205A787F9A14210
SHA256:2AF934D750278ECB69E1F6FB21B204CE5009FBB3179A07827412161334994E49
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2bc2b2.TMPbinary
MD5:96C84325E942344531B2415062A04849
SHA256:FED464AAA09BBDFF3555DF8BEFB3285956B2DD80E6CE7C1F730E2F59C8900E6A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
46
TCP/UDP connections
55
DNS requests
36
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
184.30.17.174:443
https://fs.microsoft.com/fs/windows/config.json
unknown
GET
200
208.115.219.174:443
https://thelatewire.com/8yoya/qxh11oli6prujvm%E3%80%82%E3%80%82/YmluaXRhLmJodXRhQGNvdmF0aW9uYmlvLmNvbQ==%E3%80%82$$%E3%80%82
unknown
4304
MoUsoCoreWorker.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
404
208.115.219.174:443
https://thelatewire.com/favicon.ico
unknown
4304
MoUsoCoreWorker.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2392
svchost.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7144
RUXIMICS.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7144
RUXIMICS.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2392
svchost.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
101
46.101.100.125:443
https://microsfts0uygh0utllk8u8.grupomti.com.br/17bea9f116ea4f6c9ce9dd2a7a4adaa3/
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.251:5353
unknown
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4792
msedge.exe
51.11.192.50:443
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
4792
msedge.exe
142.250.185.163:443
google.co.ve
GOOGLE
US
whitelisted
5988
svchost.exe
239.255.255.250:1900
whitelisted
7064
svchost.exe
184.30.17.174:443
fs.microsoft.com
AKAMAI-AS
DE
whitelisted
4792
msedge.exe
216.58.206.35:443
www.google.co.ve
GOOGLE
US
whitelisted
184.30.17.174:443
fs.microsoft.com
AKAMAI-AS
DE
whitelisted
2392
svchost.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
7144
RUXIMICS.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.23.110
whitelisted
google.co.ve
  • 142.250.185.163
whitelisted
fs.microsoft.com
  • 184.30.17.174
whitelisted
www.google.co.ve
  • 216.58.206.35
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.138
  • 2.16.164.97
  • 2.16.164.49
whitelisted
thelatewire.com
  • 208.115.219.174
unknown
www.microsoft.com
  • 23.38.73.129
  • 95.101.149.131
whitelisted
microsfts0uygh0utllk8u8.grupomti.com.br
  • 46.101.100.125
unknown
www.bing.com
  • 2.19.80.56
  • 2.19.80.80
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted

Threats

PID
Process
Class
Message
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected phishing domain name created with Leet (l1ve)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected phishing domain name created with Leet (l1ve)
No debug info