URL: | https://google.co.ve/url?q=kbbwpmpJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2fthelatewire.com%2f8yoya%2fqxh11oli6prujvm%E3%80%82%E3%80%82%2fYmluaXRhLmJodXRhQGNvdmF0aW9uYmlvLmNvbQ==%E3%80%82$$%E3%80%82 |
Full analysis: | https://app.any.run/tasks/5676bab2-79e3-47a1-aad4-a4627cd7632b |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 07:36:32 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 7BE6E93AC867D08EE0620BFF316FF31F |
SHA1: | EFA3D39B42C699F0DFCD385B34D9D489F61BBA63 |
SHA256: | 4E36E80B1159DA3EE2DD410DF65CD2A094BA4B84C23E259AC5D57337DD0148E3 |
SSDEEP: | 6:2LuJLQk4otRtMqfSU7d9qVWVqpXTAGSwVAVn:2yj4oXfSkws81CV |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\39d41481-a82b-4a8e-9b12-9d4ff38a5114.tmp | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b6550.TMP | binary | |
MD5:15D26FA4E16467BE658F42074AC0DBAA | SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b7202.TMP | binary | |
MD5:2A21453795942FD88CBB06714604B9FD | SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity | binary | |
MD5:96C84325E942344531B2415062A04849 | SHA256:FED464AAA09BBDFF3555DF8BEFB3285956B2DD80E6CE7C1F730E2F59C8900E6A | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c0 | compressed | |
MD5:9E7C4D9BBAED7E44F7E4A8BDFA526C43 | SHA256:BEDC9C2C4B54E876B4717A7ADF9A0F784804B5267B8F20B0B56A6991FD9279C9 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000be | compressed | |
MD5:39C777C1153FE4B4EA210EDBFD6F313B | SHA256:5FCB3A86E179102AE9460A3BD8094099A7ED15C740C67280FD17272E52A8C4D0 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\1741dc09-9810-466c-af74-3355d3ccb6dd.tmp | binary | |
MD5:96C84325E942344531B2415062A04849 | SHA256:FED464AAA09BBDFF3555DF8BEFB3285956B2DD80E6CE7C1F730E2F59C8900E6A | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bf | compressed | |
MD5:3E0A86D839E7A7080205A787F9A14210 | SHA256:2AF934D750278ECB69E1F6FB21B204CE5009FBB3179A07827412161334994E49 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2bc2b2.TMP | binary | |
MD5:96C84325E942344531B2415062A04849 | SHA256:FED464AAA09BBDFF3555DF8BEFB3285956B2DD80E6CE7C1F730E2F59C8900E6A |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
— | — | GET | 200 | 208.115.219.174:443 | https://thelatewire.com/8yoya/qxh11oli6prujvm%E3%80%82%E3%80%82/YmluaXRhLmJodXRhQGNvdmF0aW9uYmlvLmNvbQ==%E3%80%82$$%E3%80%82 | unknown | — | — | — |
4304 | MoUsoCoreWorker.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 404 | 208.115.219.174:443 | https://thelatewire.com/favicon.ico | unknown | — | — | — |
4304 | MoUsoCoreWorker.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2392 | svchost.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7144 | RUXIMICS.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7144 | RUXIMICS.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2392 | svchost.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 101 | 46.101.100.125:443 | https://microsfts0uygh0utllk8u8.grupomti.com.br/17bea9f116ea4f6c9ce9dd2a7a4adaa3/ | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4792 | msedge.exe | 51.11.192.50:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | FR | unknown |
4792 | msedge.exe | 142.250.185.163:443 | google.co.ve | GOOGLE | US | whitelisted |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
7064 | svchost.exe | 184.30.17.174:443 | fs.microsoft.com | AKAMAI-AS | DE | whitelisted |
4792 | msedge.exe | 216.58.206.35:443 | www.google.co.ve | GOOGLE | US | whitelisted |
— | — | 184.30.17.174:443 | fs.microsoft.com | AKAMAI-AS | DE | whitelisted |
2392 | svchost.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
7144 | RUXIMICS.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
google.co.ve |
| whitelisted |
fs.microsoft.com |
| whitelisted |
www.google.co.ve |
| whitelisted |
crl.microsoft.com |
| whitelisted |
thelatewire.com |
| unknown |
www.microsoft.com |
| whitelisted |
microsfts0uygh0utllk8u8.grupomti.com.br |
| unknown |
www.bing.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected phishing domain name created with Leet (l1ve) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected phishing domain name created with Leet (l1ve) |