File name:

OverdriveNtool.rar

Full analysis: https://app.any.run/tasks/5ceb63e3-c984-47f8-b0e5-46b0ec526657
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: November 03, 2023, 02:05:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
stealer
redline
evasion
quasar
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

79A849A75BD349C6BACBB5D8437D2B54

SHA1:

376DDF81B8A00F1B415F0F94D5934C1C8265E945

SHA256:

6ACDB63E2320DD3FE7E9254562157AD90D61FBF872707BDC84C66675C71FA7DE

SSDEEP:

98304:EMmL9Ta3W9Zne+y1UpuW/jsFVVuRLlNHo7vLTnLCtBng0gRzkMTxIIToY1I+X619:uRKetfyyn5q8kW6lpCX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • cmd.exe (PID: 4148)
      • a9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe (PID: 4024)
      • 351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exe (PID: 4352)
      • cmd.exe (PID: 4516)
      • Beats.pif (PID: 4540)
      • Full.pif (PID: 4172)
    • Create files in the Startup directory

      • cmd.exe (PID: 4572)
    • REDLINE has been detected (SURICATA)

      • jsc.exe (PID: 4864)
    • Connects to the CnC server

      • jsc.exe (PID: 4864)
    • QUASAR has been detected (YARA)

      • jsc.exe (PID: 4856)
    • Steals credentials from Web Browsers

      • jsc.exe (PID: 4864)
    • Actions looks like stealing of personal data

      • jsc.exe (PID: 4864)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • a9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe (PID: 4024)
      • cmd.exe (PID: 948)
      • cmd.exe (PID: 968)
      • 351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exe (PID: 4352)
      • cmd.exe (PID: 4396)
      • cmd.exe (PID: 4428)
      • jsc.exe (PID: 4856)
    • Application launched itself

      • cmd.exe (PID: 968)
      • cmd.exe (PID: 948)
      • cmd.exe (PID: 4396)
      • cmd.exe (PID: 4428)
    • Get information on the list of running processes

      • cmd.exe (PID: 948)
      • cmd.exe (PID: 4428)
    • Drops the AutoIt3 executable file

      • cmd.exe (PID: 4148)
      • cmd.exe (PID: 4516)
      • Beats.pif (PID: 4540)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 948)
      • cmd.exe (PID: 4428)
      • cmd.exe (PID: 4984)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 948)
      • cmd.exe (PID: 4428)
    • Starts application with an unusual extension

      • cmd.exe (PID: 948)
      • cmd.exe (PID: 4428)
      • cmd.exe (PID: 4984)
    • Process drops legitimate windows executable

      • Beats.pif (PID: 4540)
      • Full.pif (PID: 4172)
    • Connects to unusual port

      • jsc.exe (PID: 4864)
      • jsc.exe (PID: 4856)
    • Reads the Internet Settings

      • jsc.exe (PID: 4856)
      • jsc.exe (PID: 5224)
    • Executing commands from a ".bat" file

      • jsc.exe (PID: 4856)
    • Checks for external IP

      • jsc.exe (PID: 4856)
    • Searches for installed software

      • jsc.exe (PID: 4864)
    • Reads browser cookies

      • jsc.exe (PID: 4864)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3448)
      • firefox.exe (PID: 3080)
    • Checks supported languages

      • wmpnscfg.exe (PID: 600)
      • a9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe (PID: 4024)
      • Full.pif (PID: 4172)
      • 0856dd07f6efa48729888ba519e2a3fd4eaa37de3463eb7bc838e45d2b5790e6.exe (PID: 4224)
      • 351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exe (PID: 4352)
      • Beats.pif (PID: 4540)
      • jsc.exe (PID: 4856)
      • jsc.exe (PID: 4864)
      • chcp.com (PID: 5008)
      • jsc.exe (PID: 5224)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 600)
      • firefox.exe (PID: 3184)
      • a9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe (PID: 4024)
      • msedge.exe (PID: 3576)
      • 0856dd07f6efa48729888ba519e2a3fd4eaa37de3463eb7bc838e45d2b5790e6.exe (PID: 4224)
      • 351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exe (PID: 4352)
      • cmd.exe (PID: 4572)
      • jsc.exe (PID: 4856)
      • jsc.exe (PID: 4864)
    • Application launched itself

      • firefox.exe (PID: 3184)
      • msedge.exe (PID: 3576)
      • firefox.exe (PID: 3080)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 600)
      • jsc.exe (PID: 4864)
      • jsc.exe (PID: 4856)
      • jsc.exe (PID: 5224)
    • Create files in a temporary directory

      • a9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe (PID: 4024)
      • 351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exe (PID: 4352)
      • Beats.pif (PID: 4540)
      • Full.pif (PID: 4172)
      • jsc.exe (PID: 4856)
    • The executable file from the user directory is run by the CMD process

      • Full.pif (PID: 4172)
      • Beats.pif (PID: 4540)
      • jsc.exe (PID: 5224)
    • Reads the computer name

      • Full.pif (PID: 4172)
      • 0856dd07f6efa48729888ba519e2a3fd4eaa37de3463eb7bc838e45d2b5790e6.exe (PID: 4224)
      • wmpnscfg.exe (PID: 600)
      • Beats.pif (PID: 4540)
      • jsc.exe (PID: 4864)
      • jsc.exe (PID: 4856)
      • jsc.exe (PID: 5224)
    • Reads mouse settings

      • Full.pif (PID: 4172)
      • Beats.pif (PID: 4540)
    • Creates files or folders in the user directory

      • Beats.pif (PID: 4540)
    • Reads Environment values

      • jsc.exe (PID: 4856)
      • jsc.exe (PID: 4864)
    • Reads product name

      • jsc.exe (PID: 4864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Quasar

(PID) Process(4856) jsc.exe
Version1.4.0.0
C2 (2)135.181.11.41:2424
Sub_DirSubDir
Install_Namecsrss.exe
MutexQpjXdwKWwAWi8fR2WYfnvnfjnvjbgh
StartupNET framework
TagOffice
LogDirLogs
Signature
Certificate
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
69
Malicious processes
9
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs a9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe ftp.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs full.pif no specs ping.exe no specs 0856dd07f6efa48729888ba519e2a3fd4eaa37de3463eb7bc838e45d2b5790e6.exe 351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exe ftp.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs beats.pif no specs ping.exe no specs cmd.exe #QUASAR jsc.exe #REDLINE jsc.exe cmd.exe no specs chcp.com no specs ping.exe no specs jsc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
276"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4940 --field-trial-handle=1380,i,16149519403048093654,4725570579187075524,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
536"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1128 --field-trial-handle=1380,i,16149519403048093654,4725570579187075524,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
600"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
948cmd C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
968cmd /k cmd < Frequent & exitC:\Windows\System32\cmd.exea9631afc55292a5c013799dd1fdfa4eaaf1ef7faa97174cc3c3fdc85cf71f1e6.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1348"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4012 --field-trial-handle=1380,i,16149519403048093654,4725570579187075524,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1432findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
1452tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1560"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2460 --field-trial-handle=1380,i,16149519403048093654,4725570579187075524,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1584"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3080.6.1810596506\719489244" -childID 5 -isForBrowser -prefsHandle 3996 -prefMapHandle 3988 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 876 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b713b1ed-41d1-43b5-8fee-264e25e21b55} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" 4008 17908560 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
24 312
Read events
24 214
Write events
92
Delete events
6

Modification events

(PID) Process:(3448) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(3448) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
78
Suspicious files
1 575
Text files
118
Unknown types
0

Dropped files

PID
Process
Filename
Type
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF1699d3.TMP
MD5:
SHA256:
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF1699f3.TMP
MD5:
SHA256:
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF169a02.TMP
MD5:
SHA256:
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF169a41.TMP
MD5:
SHA256:
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
3448WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3448.12991\0856dd07f6efa48729888ba519e2a3fd4eaa37de3463eb7bc838e45d2b5790e6.exeexecutable
MD5:9D0B0D3CE4B1479EE0AD3AB659691DC9
SHA256:0856DD07F6EFA48729888BA519E2A3FD4EAA37DE3463EB7BC838E45D2B5790E6
3576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:C7352A0E98449CC8AEDC1D6954C4CCD9
SHA256:3A1591F52AD31B5B0B48F97AB5E1361D0AD0FA0F584E8FE8EFD482801DC2B9B5
3448WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3448.12991\351a74c692706f6aff7968e2cec0781caef986344160bd66e5d19852a2e908df.exeexecutable
MD5:0FB34A9FA6324CE1F025B4CFFD46216B
SHA256:351A74C692706F6AFF7968E2CEC0781CAEF986344160BD66E5D19852A2E908DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
35
TCP/UDP connections
135
DNS requests
266
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3080
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
3080
firefox.exe
POST
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
3080
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
unknown
binary
471 b
unknown
3080
firefox.exe
POST
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3
unknown
binary
471 b
unknown
3080
firefox.exe
POST
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
3080
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
3080
firefox.exe
GET
301
142.250.185.229:80
http://gmail.com/
unknown
html
230 b
unknown
3080
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
3080
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
3080
firefox.exe
POST
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3928
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3576
msedge.exe
239.255.255.250:1900
whitelisted
3928
msedge.exe
204.79.197.203:443
ntp.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3928
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3928
msedge.exe
23.53.42.121:443
assets.msn.com
Akamai International B.V.
DE
unknown
3928
msedge.exe
2.21.20.136:443
img-s-msn-com.akamaized.net
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.42.16
whitelisted
ntp.msn.com
  • 204.79.197.203
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
assets.msn.com
  • 23.53.42.121
  • 23.53.42.120
  • 34.120.158.37
whitelisted
img-s-msn-com.akamaized.net
  • 2.21.20.136
  • 2.21.20.134
whitelisted
sb.scorecardresearch.com
  • 18.245.60.53
  • 18.245.60.72
  • 18.245.60.107
  • 18.245.60.76
shared
th.bing.com
  • 23.36.162.84
  • 23.36.162.68
whitelisted
www.bing.com
  • 23.36.162.68
  • 23.36.162.84
  • 204.79.197.200
  • 13.107.21.200
whitelisted
c.msn.com
  • 68.219.88.97
whitelisted
c.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
4864
jsc.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
4864
jsc.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
4864
jsc.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization)
4864
jsc.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC - Id1Response
4856
jsc.exe
A Network Trojan was detected
ET MALWARE Common RAT Connectivity Check Observed
4856
jsc.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
4856
jsc.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
4864
jsc.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
4864
jsc.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
4864
jsc.exe
A Network Trojan was detected
ET MALWARE Redline Stealer Activity (Response)
No debug info