File name:

Zagreus Builder.exe

Full analysis: https://app.any.run/tasks/94a09bb2-498b-459a-b70e-8b15dba42736
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 24, 2025, 15:33:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
stealer
telegram
confuser
neshta
discordgrabber
generic
ims-api
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

88CD6943FC236ACFD406B339FFACBE46

SHA1:

0F736349C4FD9189F9235AA38B064838FF283636

SHA256:

5E0F46628ECEC878ED244BCCEAA2981B947DB254CF34DFC0B7F4A8D5C211A842

SSDEEP:

49152:oUpLxivo6RKPQS6r7vwNYR8nU/NX+dwZPVqXPbVwuDk/kTsxPSc1lLr2f29UNlkL:6rRyQJnoNYR8eNuWPIPSuDNTZ2N8GP20

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • NESHTA mutex has been found

      • ZagreuS Builder.exe (PID: 6048)
    • Actions looks like stealing of personal data

      • Cicada.exe (PID: 6108)
      • ZagreuS Builder.exe (PID: 6048)
    • Executing a file with an untrusted certificate

      • FileCoAuth.exe (PID: 7664)
    • DISCORDGRABBER has been detected (YARA)

      • Cicada.exe (PID: 6108)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Zagreus Builder.exe (PID: 4108)
      • ZagreuS Builder.exe (PID: 6048)
    • Reads security settings of Internet Explorer

      • ZagreuS Builder.exe (PID: 6048)
      • Zagreus Builder.exe (PID: 4108)
    • Reads the date of Windows installation

      • Zagreus Builder.exe (PID: 4108)
    • Mutex name with non-standard characters

      • ZagreuS Builder.exe (PID: 6048)
    • Checks for external IP

      • Cicada.exe (PID: 6108)
      • svchost.exe (PID: 2196)
    • Write to the desktop.ini file (may be used to cloak folders)

      • Cicada.exe (PID: 6108)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • Cicada.exe (PID: 6108)
    • Starts a Microsoft application from unusual location

      • FileCoAuth.exe (PID: 7664)
    • There is functionality for taking screenshot (YARA)

      • ZagreuS Builder.exe (PID: 6048)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Cicada.exe (PID: 6108)
  • INFO

    • Reads the computer name

      • ZagreuS Builder.exe (PID: 6048)
      • Zagreus Builder.exe (PID: 4108)
      • ZagreuS Builder.exe (PID: 5936)
    • Reads the machine GUID from the registry

      • Zagreus Builder.exe (PID: 4108)
      • ZagreuS Builder.exe (PID: 5936)
      • Cicada.exe (PID: 6108)
    • Checks supported languages

      • ZagreuS Builder.exe (PID: 5936)
      • Zagreus Builder.exe (PID: 4108)
      • ZagreuS Builder.exe (PID: 6048)
      • Cicada.exe (PID: 6108)
    • Process checks computer location settings

      • Zagreus Builder.exe (PID: 4108)
      • ZagreuS Builder.exe (PID: 6048)
    • Creates files in the program directory

      • Cicada.exe (PID: 6108)
    • Disables trace logs

      • Cicada.exe (PID: 6108)
    • Reads the software policy settings

      • Cicada.exe (PID: 6108)
    • Create files in a temporary directory

      • Cicada.exe (PID: 6108)
    • Reads CPU info

      • Cicada.exe (PID: 6108)
    • Checks proxy server information

      • Cicada.exe (PID: 6108)
    • Confuser has been detected (YARA)

      • Cicada.exe (PID: 6108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(6108) Cicada.exe
Telegram-Tokens (1)7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
Telegram-Info-Links
7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
Get info about bothttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/getMe
Get incoming updateshttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/getUpdates
Get webhookhttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
chat_id (1)6068287209
caption (1)==== RL STEALER ==== ⏰ Date => 03/24/2025 3:33 💻System => Windows 10 Pro (64 Bit) 👤 User =%3
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
chat_id (1)6068287209
caption (1)==== RL STEALER ==== ⏰ Date => 03/24/2025 3:33 💻System => Windows 10 Pro (64 Bit) 👤 User => admin 🆔 PC => DESKTOP-JGLLJLD 🏴 Country => [Norway] 🔍 IP => 45.13.191.92 📝 Language => 🇺🇸 en-US 🔓 Antivirus => Windows De
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
chat_id (1)6068287209
caption (1)==== RL STEALER ====
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:02 02:46:12+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 1333248
InitializedDataSize: 6656
UninitializedDataSize: -
EntryPoint: 0x14774e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: Zagreus Builder.exe
LegalCopyright:
OriginalFileName: Zagreus Builder.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
8
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start zagreus builder.exe #NESHTA zagreus builder.exe #DISCORDGRABBER cicada.exe zagreus builder.exe no specs svchost.exe sppextcomobj.exe no specs slui.exe no specs filecoauth.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2140C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4108"C:\Users\admin\Desktop\Zagreus Builder.exe" C:\Users\admin\Desktop\Zagreus Builder.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\zagreus builder.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5936"C:\Users\admin\AppData\Local\Temp\3582-490\ZagreuS Builder.exe" C:\Users\admin\AppData\Local\Temp\3582-490\ZagreuS Builder.exeZagreuS Builder.exe
User:
admin
Company:
ZagreuS Corporation
Integrity Level:
MEDIUM
Description:
ZagreuS Builder
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\zagreus builder.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6048"C:\Users\admin\AppData\Local\Temp\ZagreuS Builder.exe" C:\Users\admin\AppData\Local\Temp\ZagreuS Builder.exe
Zagreus Builder.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\zagreus builder.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6108"C:\Users\admin\AppData\Local\Temp\Cicada.exe" C:\Users\admin\AppData\Local\Temp\Cicada.exe
Zagreus Builder.exe
User:
admin
Integrity Level:
MEDIUM
Description:
RL
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\cicada.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
ims-api
(PID) Process(6108) Cicada.exe
Telegram-Tokens (1)7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
Telegram-Info-Links
7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
Get info about bothttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/getMe
Get incoming updateshttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/getUpdates
Get webhookhttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
chat_id (1)6068287209
caption (1)==== RL STEALER ==== ⏰ Date => 03/24/2025 3:33 💻System => Windows 10 Pro (64 Bit) 👤 User =%3
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
chat_id (1)6068287209
caption (1)==== RL STEALER ==== ⏰ Date => 03/24/2025 3:33 💻System => Windows 10 Pro (64 Bit) 👤 User => admin 🆔 PC => DESKTOP-JGLLJLD 🏴 Country => [Norway] 🔍 IP => 45.13.191.92 📝 Language => 🇺🇸 en-US 🔓 Antivirus => Windows De
Token7382141956:AAEtnjwughN0sZTQ_wzEG2EuQEvAFP_LdF8
End-PointsendDocument
Args
chat_id (1)6068287209
caption (1)==== RL STEALER ====
7176"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7664"C:\Users\admin\AppData\Local\Temp\3582-490\FileCoAuth.exe" -EmbeddingC:\Users\admin\AppData\Local\Temp\3582-490\FileCoAuth.exeFileCoAuth.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
Total events
4 018
Read events
4 004
Write events
14
Delete events
0

Modification events

(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6108) Cicada.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cicada_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
11
Suspicious files
16
Text files
39
Unknown types
0

Dropped files

PID
Process
Filename
Type
6108Cicada.exeC:\Users\admin\AppData\Local\Temp\places.raw
MD5:
SHA256:
6108Cicada.exeC:\ProgramData\DESKTOP-JGLLJLD\InstalledSoftware.txttext
MD5:9FE3E9FBA5C9F39C7C244BD808A9777F
SHA256:6FD5F361A1FEAA428050DA60111432F85E03ED3D7571D5B86CEC3C77296C9D10
4108Zagreus Builder.exeC:\Users\admin\AppData\Local\Temp\ZagreuS Builder.exeexecutable
MD5:D7D116EC9489D35220BB884A3F8CDBE1
SHA256:6E55F637030B2F16A872169E7C6B1C70B76C761A5BB34170761FCB2079122577
6108Cicada.exeC:\ProgramData\DESKTOP-JGLLJLD\FileGrabber\Desktop\behindlearn.pngimage
MD5:BD063635ADDE4F63F960E07234F6A0CE
SHA256:CC01C207014C62C42D77914E086B2B433090BCB116054D78E1882DB436030C1F
6048ZagreuS Builder.exeC:\Users\admin\AppData\Local\Temp\3582-490\ZagreuS Builder.exeexecutable
MD5:E538C0DF99242DB4EEBEDB0EAF655CCA
SHA256:38551A319BF73A435F849C42A52818236BFB59C2F73F3658198C0C2F5773D383
6108Cicada.exeC:\ProgramData\DESKTOP-JGLLJLD\FileGrabber\Desktop\secretaryplanning.jpgimage
MD5:057131F5BB5B04E60FBEF99074108E04
SHA256:260E2AA78CBA8274DE6A3E3F215E3647B4052A0C01106B7B5305BE4F5A29792F
6108Cicada.exeC:\ProgramData\DESKTOP-JGLLJLD\FileGrabber\Desktop\desktop.initext
MD5:9E36CC3537EE9EE1E3B10FA4E761045B
SHA256:4B9D687AC625690FD026ED4B236DAD1CAC90EF69E7AD256CC42766A065B50026
6108Cicada.exeC:\ProgramData\DESKTOP-JGLLJLD\FileGrabber\Desktop\majorworkers.rtftext
MD5:1357CF51218BA3D26B950F4EC5D5F80F
SHA256:F6C3E54B29511C21F04B3EDB3368ABBB8CC04918139FA3F3DE4B8AB984A12558
6108Cicada.exeC:\ProgramData\DESKTOP-JGLLJLD\FileGrabber\Desktop\contentsstrategy.rtftext
MD5:479DB88820D16ED959258989B7F02017
SHA256:9C054DBC09E282917E9A20FEDDEB109A78BD77B84DC3D3395FA66C39D0544B24
4108Zagreus Builder.exeC:\Users\admin\AppData\Local\Temp\Cicada.exeexecutable
MD5:9400A5310BB2DE623439B244CBEF49B8
SHA256:3CDEF3A60769CE6B68A9200A4A4BCBBDADD374D8CECE69C14FF24B2B3869F192
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
40
DNS requests
20
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.22.242.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6108
Cicada.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
GET
200
2.22.242.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6108
Cicada.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6108
Cicada.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
7792
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7792
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6108
Cicada.exe
GET
200
208.95.112.1:80
http://ip-api.com/xml
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.22.242.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6108
Cicada.exe
162.125.72.15:443
dl.dropboxusercontent.com
DROPBOX
US
whitelisted
6108
Cicada.exe
104.21.48.1:443
freegeoip.app
CLOUDFLARENET
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6108
Cicada.exe
104.21.85.189:443
ipbase.com
CLOUDFLARENET
suspicious

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.22.242.90
  • 2.22.242.121
whitelisted
dl.dropboxusercontent.com
  • 162.125.72.15
whitelisted
freegeoip.app
  • 104.21.48.1
  • 104.21.32.1
  • 104.21.80.1
  • 104.21.16.1
  • 104.21.64.1
  • 104.21.96.1
  • 104.21.112.1
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
ipbase.com
  • 104.21.85.189
  • 172.67.209.71
unknown
login.live.com
  • 40.126.31.71
  • 20.190.159.4
  • 40.126.31.69
  • 40.126.31.0
  • 20.190.159.64
  • 40.126.31.129
  • 20.190.159.68
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
api.ipify.org
  • 104.26.13.205
  • 172.67.74.152
  • 104.26.12.205
shared

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Checker Domain (freegeoip .app)
6108
Cicada.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] SNI External IP Domain Lookup (freegeoip .app)
6108
Cicada.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
6108
Cicada.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
2196
svchost.exe
Potentially Bad Traffic
ET INFO External IP Lookup Domain Domain in DNS Lookup (ipbase .com)
6108
Cicada.exe
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (ipbase .com in TLS SNI)
6108
Cicada.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
6108
Cicada.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
6108
Cicada.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
6108
Cicada.exe
Misc activity
ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI)
No debug info