File name:

.exe

Full analysis: https://app.any.run/tasks/7fabf29d-1292-45c7-97ba-10ff17739e61
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: December 16, 2024, 13:19:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
rat
quasar
remote
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

A6BE8A62C7F7D595DB6AC9DC6E93DA02

SHA1:

5F2E5D543B91A01055AB1263611C9DF49E2A5E45

SHA256:

4FA2387A8A7D3C19888B5A07B5897F344BE8E4364D5F5130F257715AD2A97FCA

SSDEEP:

98304:WPEL9qSytNpIkNtOQXFQem6VpLUL1MF6scvZFlnLk6WB0ZPvK0gCOYtd4HLI0aC+:fSe/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • cmd.exe (PID: 6204)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2676)
    • AutoIt loader has been detected (YARA)

      • Interviews.com (PID: 2448)
    • QUASAR has been detected (SURICATA)

      • RegAsm.exe (PID: 5536)
    • Connects to the CnC server

      • RegAsm.exe (PID: 5536)
    • QUASAR has been detected (YARA)

      • RegAsm.exe (PID: 5536)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
      • RegAsm.exe (PID: 5536)
    • Starts CMD.EXE for commands execution

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
      • cmd.exe (PID: 6584)
    • Executing commands from ".cmd" file

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
    • Get information on the list of running processes

      • cmd.exe (PID: 6584)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6584)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 6584)
      • Interviews.com (PID: 2448)
    • Application launched itself

      • cmd.exe (PID: 6584)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6584)
    • The executable file from the user directory is run by the CMD process

      • Interviews.com (PID: 2448)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6584)
    • Process drops legitimate windows executable

      • Interviews.com (PID: 2448)
    • Starts a Microsoft application from unusual location

      • RegAsm.exe (PID: 5536)
    • The process creates files with name similar to system file names

      • Interviews.com (PID: 2448)
    • Contacting a server suspected of hosting an CnC

      • RegAsm.exe (PID: 5536)
    • Connects to unusual port

      • RegAsm.exe (PID: 5536)
  • INFO

    • Checks supported languages

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
      • Interviews.com (PID: 2448)
      • RegAsm.exe (PID: 5536)
    • Process checks computer location settings

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
    • Reads the computer name

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
      • RegAsm.exe (PID: 5536)
    • Create files in a temporary directory

      • 7fabf29d-1292-45c7-97ba-10ff17739e61.exe (PID: 6480)
      • Interviews.com (PID: 2448)
    • Creates a new folder

      • cmd.exe (PID: 7160)
    • Reads mouse settings

      • Interviews.com (PID: 2448)
    • Manual execution by a user

      • cmd.exe (PID: 2676)
      • cmd.exe (PID: 6204)
      • RegAsm.exe (PID: 5536)
    • Creates files or folders in the user directory

      • Interviews.com (PID: 2448)
    • The sample compiled with english language support

      • Interviews.com (PID: 2448)
    • Reads the machine GUID from the registry

      • RegAsm.exe (PID: 5536)
    • Sends debugging messages

      • WINWORD.EXE (PID: 3620)
    • Reads Microsoft Office registry keys

      • RegAsm.exe (PID: 5536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:20:04+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 682496
UninitializedDataSize: 16896
EntryPoint: 0x38af
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
21
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 7fabf29d-1292-45c7-97ba-10ff17739e61.exe no specs cmd.exe conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs interviews.com choice.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe conhost.exe no specs #QUASAR regasm.exe winword.exe ai.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
524cmd /c copy /b ..\Live + ..\Tales + ..\Wrestling + ..\Probe + ..\Maiden + ..\Becomes + ..\Revolution + ..\Solved + ..\Jesus + ..\Occasional + ..\Aluminum + ..\Cited + ..\Shades + ..\Increased + ..\Constitutional + ..\Camel + ..\Margaret + ..\Diana + ..\Similarly + ..\Attachment + ..\Curves + ..\Beginners + ..\Meaning + ..\Searchcom + ..\Counties + ..\Hammer + ..\Relevance + ..\Arg + ..\Hydraulic + ..\Prot + ..\Router + ..\Photographic + ..\Water + ..\Caution + ..\Plants + ..\Market + ..\Worlds + ..\Countries + ..\Tool U C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2448Interviews.com U C:\Users\admin\AppData\Local\Temp\638390\Interviews.com
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Version:
3, 3, 15, 5
Modules
Images
c:\users\admin\appdata\local\temp\638390\interviews.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\version.dll
2676cmd /c schtasks.exe /create /tn "Aluminium" /tr "wscript //B 'C:\Users\admin\AppData\Local\SecureInno Technologies Co\InnoSecureX.js'" /sc minute /mo 5 /FC:\Windows\SysWOW64\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3608choice /d y /t 5C:\Windows\SysWOW64\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Offers the user a choice
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3620"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Долговая нагрузка.docx" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4052schtasks.exe /create /tn "Aluminium" /tr "wscript //B 'C:\Users\admin\AppData\Local\SecureInno Technologies Co\InnoSecureX.js'" /sc minute /mo 5 /FC:\Windows\SysWOW64\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5004"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "C5CD63B4-2C09-4D12-BD7D-F5AA3A8C6CF4" "3295A138-B0B4-4C39-A0BC-5068BFB3F056" "3620"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
5032\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5536C:\Users\admin\AppData\Local\Temp\638390\RegAsm.exe C:\Users\admin\AppData\Local\Temp\638390\RegAsm.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\users\admin\appdata\local\temp\638390\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
18 367
Read events
18 019
Write events
327
Delete events
21

Modification events

(PID) Process:(5536) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Operation:writeName:Word.Document.12
Value:
(PID) Process:(5536) RegAsm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
Value:
01000000000000007F977F38BD4FDB01
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:tr-tr
Value:
1
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:writeName:wn)
Value:
776E2900240E00000100000000000000E1C8D738BD4FDB0100000000
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\3620
Operation:writeName:0
Value:
0B0E104D1901B956575546A53AF6ED06C73861230046F189A6C6D3F7D3ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511A41CD2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(3620) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
Executable files
31
Suspicious files
166
Text files
24
Unknown types
2

Dropped files

PID
Process
Filename
Type
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Awesomebinary
MD5:04004EA6D57F002898B42A39518EAA2C
SHA256:F337E6B745F20D333DF0C78EFE71CB6D5C5E180F6E4F2111B28C8D0E6C6DB75A
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Increasedbinary
MD5:8408F0D3CC03EB46518463558144E5C0
SHA256:0DCB4132A9C354337F70A26EF9A2517A4078669C6184382E1D055014A7E7FA64
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Routerbinary
MD5:A6FFF6B593061C3E8B9EB350CD5A35A7
SHA256:2E9524F350DE758E373D0BA1BECEE240AEC4671EC14BEDEAB842F91EA555A9F0
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Cleartext
MD5:186213091BAB1BCAA1E01A594553EE57
SHA256:6465BB2DAAA40ACE47C20FB2039F509C00A2329AE944960CC8DC782236555E3E
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Disputesbinary
MD5:A70624A95B1CEEC90F93279CDB0A5481
SHA256:F07DC04911F805B88F0D5DE5F5CAB349A9BF6D64C3B77074FBDC2571904A016A
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Talesbinary
MD5:8233AEF38E2CE4F31CA31F320458305E
SHA256:1CF9E56D1050FFD23EA569DAE2529079B7DD5C7C2F1FE7D560915AFB571AD8DA
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Camelbinary
MD5:E9B3CCE3183551FBE0FF715B5D59C4F7
SHA256:4058CE58BA9A07F8F491A2107674E4C9279862A4B5478B801F600C0797CA9E30
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Countriesbinary
MD5:36616874CECC8BE4A08896A872E44981
SHA256:9F922F54206685D67BD969EC5DDDA75958B7460A32C3B231ABC0143D848BBA5D
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Becomesbinary
MD5:4C31648FA2BC40EBF69D4C41C380FEFF
SHA256:3F517210B9EC4E9DD4D532BD5CDC77E50AE7EA608421EFF61DAB96BC46A6D4B7
64807fabf29d-1292-45c7-97ba-10ff17739e61.exeC:\Users\admin\AppData\Local\Temp\Protbinary
MD5:7DEDA2E884103266D6FE4A7934344D46
SHA256:CE9F479F36C1CD62ED8DAFA3ABCBCB802B541258306C923EC0CCEB7E80226454
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
71
TCP/UDP connections
110
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5732
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2092
RUXIMICS.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2092
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
52.111.243.12:443
https://messaging.lifecycle.office.com/getcustommessage16?app=0&ui=en-US&src=BizBar&messagetype=BizBar&hwid=04111-083-043729&ver=16.0.16026&lc=en-US&platform=10%3A0%3A19045%3A2%3A0%3A0%3A256%3A1%3A&productid=%7B1717C1E0-47D3-4899-A6D3-1022DB7415E0%7D%3A00411-10830-43729-AA720%3AOffice%2019%2C%20Office19Professional2019R_Retail%20edition&clientsessionid=%7BB901194D-5756-4655-A53A-F6ED06C73861%7D&datapropertybag=%7B%22Audience%22%3A%22Production%22%2C%22AudienceGroup%22%3A%22Production%22%2C%22AudienceChannel%22%3A%22CC%22%2C%22Flight%22%3A%22ofsh6c2b1tla1a31%2Cofcrui4yvdulbf31%2Cofhpex3jznepoo31%2Cofpioygfqmufst31%2Cofjhlwlmoc1pz531%22%7D
unknown
text
542 b
whitelisted
POST
200
20.42.65.89:443
https://self.events.data.microsoft.com/OneCollector/1.0/
unknown
binary
9 b
whitelisted
GET
200
23.48.23.6:443
https://omex.cdn.office.net/addinclassifier/officesharedentities
unknown
text
314 Kb
whitelisted
GET
200
184.24.77.4:443
https://binaries.templates.cdn.office.net/support/templates/en-us/tp02851219.cab
unknown
compressed
30.8 Kb
whitelisted
GET
200
52.109.32.97:443
https://officeclient.microsoft.com/config16/?syslcid=1033&build=16.0.16026&crev=3
unknown
xml
178 Kb
whitelisted
GET
200
52.113.194.132:443
https://ecs.office.com/config/v2/Office/word/16.0.16026.20146/Production/CC?&Clientid=%7bD61AB268-C26A-439D-BB15-2A0DEDFCA6A3%7d&Application=word&Platform=win32&Version=16.0.16026.20146&MsoVersion=16.0.16026.20002&SDX=fa000000002.2.0.1907.31003&SDX=fa000000005.1.0.1909.30011&SDX=fa000000006.1.0.1909.13002&SDX=fa000000008.1.0.1908.16006&SDX=fa000000009.1.0.1908.6002&SDX=fa000000016.1.0.1810.13001&SDX=fa000000029.1.0.1906.25001&SDX=fa000000033.1.0.1908.24001&SDX=wa104381125.1.0.1810.9001&ProcessName=winword.exe&Audience=Production&Build=ship&Architecture=x64&Language=en-US&SubscriptionLicense=false&PerpetualLicense=2019&LicenseCategory=6&LicenseSKU=Professional2019Retail&OsVersion=10.0&OsBuild=19045&Channel=CC&InstallType=C2R&SessionId=%7bB901194D-5756-4655-A53A-F6ED06C73861%7d&LabMachine=false
unknown
binary
398 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
2092
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
92.123.104.19:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5732
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
5732
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2092
RUXIMICS.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2092
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 92.123.104.19
  • 92.123.104.29
  • 92.123.104.17
  • 92.123.104.21
  • 92.123.104.23
  • 92.123.104.31
  • 92.123.104.20
  • 92.123.104.18
  • 92.123.104.16
  • 92.123.104.45
  • 92.123.104.35
  • 92.123.104.37
  • 92.123.104.43
  • 92.123.104.39
  • 92.123.104.38
  • 92.123.104.46
  • 92.123.104.36
  • 92.123.104.42
whitelisted
google.com
  • 172.217.16.142
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 88.221.169.152
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
LONkxZSODhNO.LONkxZSODhNO
unknown
crostech.ru
  • 5.8.11.91
malicious
officeclient.microsoft.com
  • 52.109.28.46
whitelisted
omex.cdn.office.net
  • 23.48.23.66
  • 23.48.23.63
  • 23.48.23.65
  • 23.48.23.52
  • 23.48.23.18
  • 23.48.23.42
  • 23.48.23.25
  • 23.48.23.11
  • 23.48.23.6
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted

Threats

PID
Process
Class
Message
5536
RegAsm.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.