| File name: | winupd.exe |
| Full analysis: | https://app.any.run/tasks/ca589059-a359-4f4b-8cc3-0e27a5664575 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | February 15, 2025, 21:35:07 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 2ECF13B2FFDEC170C8C741B8BC4A20C5 |
| SHA1: | D40C32E97D65A877816A015CFFE2A8940DEBEA0D |
| SHA256: | 70C558209D7201E690991BE17A01C6EF7F5B14775F2CFB288F0ABAFA43187FE2 |
| SSDEEP: | 98304:ZFrKdQOUq0sil6vpFol2Zj0UJNdnuRa7OTuvF7/N/i1AS1lNPOJISy4EwWBQdVEK:ZUK4yPlT38 |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:12:01 18:00:55+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 201216 |
| InitializedDataSize: | 114176 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1ec40 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 440 | schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\PCHealthCheck\kk-KZ\dllhost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 444 | "C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\a2544bd3-86cd-4b84-aac7-a7b49dd1df48.vbs" | C:\Windows\System32\wscript.exe | — | RuntimeBroker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 904 | "C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\comServer.exe" | C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\comServer.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 5.15.2.0 Modules
| |||||||||||||||
| 1348 | schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\OEM\fontdrvhost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1544 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\JftB588kS8HFRKWqxhl.bat" " | C:\Windows\SysWOW64\cmd.exe | — | winupd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 255 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1556 | schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Application Data\winlogon.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1616 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1668 | schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\found.000\dir_00000002.chk\RuntimeBroker.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1876 | schtasks.exe /create /tn "uhssvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Services\uhssvc.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1876 | reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f | C:\Windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3984) winupd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (3984) winupd.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids |
| Operation: | write | Name: | VBSFile |
Value: | |||
| (PID) Process: | (4740) comServer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (4740) comServer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (4740) comServer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | PromptOnSecureDesktop |
Value: 0 | |||
| (PID) Process: | (4740) comServer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F00620000000000000000000000010000000000000000000000 | |||
| (PID) Process: | (2136) ShellExperienceHost.exe | Key: | \REGISTRY\A\{5990eaaa-9b89-2e14-ce82-5d4afb9ebbe0}\LocalState |
| Operation: | write | Name: | PeekBadges |
Value: 5B005D00000060E89688F17FDB01 | |||
| (PID) Process: | (4740) comServer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\3645904f5767e188620c7a665cb0a97161785213 |
| Operation: | write | Name: | a9a2250d8cd79de1542cb78d3d051e7b79af13d9 |
Value: WyJDOlxcVXNlcnNcXGFkbWluXFxBcHBEYXRhXFxSb2FtaW5nXFxTdXJyb2dhdGVhZ2VudHdpbmhvc3RTdmNcXGNvbVNlcnZlci5leGUiLCJDOlxcUHJvZ3JhbSBGaWxlc1xcV2luZG93cyBOVFxcbHNhc3MuZXhlIiwiQzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXENvbW1vbiBGaWxlc1xcU2VydmljZXNcXHVoc3N2Yy5leGUiLCJDOlxcVXNlcnNcXERlZmF1bHRcXEFwcGxpY2F0aW9uIERhdGFcXHdpbmxvZ29uLmV4ZSIsIkM6XFxQcm9ncmFtIEZpbGVzXFxQQ0hlYWx0aENoZWNrXFxray1LWlxcZGxsaG9zdC5leGUiLCJDOlxcVXNlcnNcXFB1YmxpY1xcTXVzaWNcXFN5c3RlbVNldHRpbmdzLmV4ZSJd | |||
| (PID) Process: | (1876) reg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | DisableTaskMgr |
Value: 1 | |||
| (PID) Process: | (4320) comServer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3984 | winupd.exe | C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\file.vbs | text | |
MD5:677CC4360477C72CB0CE00406A949C61 | SHA256:F1CCCB5AE4AA51D293BD3C7D2A1A04CB7847D22C5DB8E05AC64E9A6D7455AA0B | |||
| 3984 | winupd.exe | C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\JftB588kS8HFRKWqxhl.bat | text | |
MD5:B67C9BB396B21E0E95E7DD8F7C60D663 | SHA256:EA9788B3ACCECECD55CBAC9547BDEACC5FFCA6AFCC539F3EBCA6E6E145A628EE | |||
| 3984 | winupd.exe | C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\7ZvVvN50EFKnm8Vgdn5X9sFuUOtSV.bat | text | |
MD5:CAEBABADF1F6DF734E1A4461A666B6C2 | SHA256:1E104EF21547EEFDD1FC0E85629824A10192C91F6BA9C6C58CFFC0C423A387C1 | |||
| 4320 | comServer.exe | C:\Program Files\PCHealthCheck\42af1c969fbb7b | text | |
MD5:47589F84C40BD7F9D18F01B261698CC3 | SHA256:A33C21B73CEE0ED0F505EE2943ABF8337FAECC90922C6E5D7E71993F6CB8199A | |||
| 4740 | comServer.exe | C:\Users\Default\AppData\Roaming\cc11b995f2a76d | text | |
MD5:AF13FD13AF2EEDB33768D18F213CB7A6 | SHA256:A902F8672CCD7A5971BD5E29AF4A5B51D658A9D982F5F2345F35FC4323A3FCC9 | |||
| 4740 | comServer.exe | C:\Program Files (x86)\Common Files\Services\105eec298f1910 | text | |
MD5:0CF00A9D1A9A48C063C9F74AC5FD3C59 | SHA256:0AA99036FFC7B068E800E61F9ECC9AF5F398FF9AB014E08EF17CD37627A42BE1 | |||
| 4740 | comServer.exe | C:\Program Files\Windows NT\lsass.exe | executable | |
MD5:19AD0B4DE848E37C6CF895F988A4506E | SHA256:A2E44A635BBB801F6CC86FC389159FBD90B7C79D45DDC357AA243F2E4299935C | |||
| 4320 | comServer.exe | C:\Windows\InputMethod\SHARED\5b884080fd4f94 | text | |
MD5:8CFC8C28BB4950B8234AEACD2FB9D96A | SHA256:0ACE73A57235432CF87B3BDA4B4EFF44566D7926E5FCA1DF2629EBD106335673 | |||
| 3984 | winupd.exe | C:\Users\admin\AppData\Roaming\SurrogateagentwinhostSvc\comServer.exe | executable | |
MD5:19AD0B4DE848E37C6CF895F988A4506E | SHA256:A2E44A635BBB801F6CC86FC389159FBD90B7C79D45DDC357AA243F2E4299935C | |||
| 4740 | comServer.exe | C:\Program Files (x86)\Common Files\Services\uhssvc.exe | executable | |
MD5:19AD0B4DE848E37C6CF895F988A4506E | SHA256:A2E44A635BBB801F6CC86FC389159FBD90B7C79D45DDC357AA243F2E4299935C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4300 | svchost.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2972 | RuntimeBroker.exe | GET | 200 | 185.176.43.100:80 | http://sigmabioaef.atwebpages.com/12884306.php?EPgL9azSH=HcZc7&MIt7vNySOctMRmSz37z8xkXzx5K=MsoPwW&76e092120dcc2716a0bf904405c3bb60=8322613b920ea533a4ee10ee219e2de4&d730d9f9ce4aee48722b12e1fd23db7e=AZkFWYwUDN3AzNxMTM5MjM5cTYzImZ4YTYlVzM4EWY0ATM3EDN0U2N&EPgL9azSH=HcZc7&MIt7vNySOctMRmSz37z8xkXzx5K=MsoPwW | unknown | — | — | malicious |
2972 | RuntimeBroker.exe | GET | — | 185.176.43.100:80 | http://sigmabioaef.atwebpages.com/12884306.php?JA9TOLhMg23Nt=vZdicV3JZAzJjJ&E5Yw7RONjUIjg2wwh3P9l=LK8fAk8eEmYg&6eavHhL4OTvWQnN=QUKDsuNxcR&2ec73fa4edc1d49c853df1815b7014c2=5QzYjRDN4YjN5UzNyQWZjdjZkVWNkNDZ5IGN5YTYwUTZhZTM1IGZzITO1UDN0MzMyYDNwUjM&d730d9f9ce4aee48722b12e1fd23db7e=QOkZWOhJjZ4UjNjFWO5QTMmdjNwkDMwMWNwIGNyQzY0I2M2ImN5EmZ&714839bee31f9c5256b219d4a9de7452=d1nI4EWMhFjZmFzYwUjMjZjNxYGMwEGO3YjNwMWN0kjZ5MWNxgTNjRWM5IiOiUjMjdjY4Y2N1MmN2IjYwQmNjhjYkRWMzU2MxQTZ5UGOiwiI2YDZlBDNlVzNhNGN0UGM3cjY3QWNilDMhVGZklTYiVDO0EzM1IWMhJiOiAjZ3kDZzEjMzQmNmFWO2cjZiVzY3YTO0UDMzMDZ2EmNis3W | unknown | — | — | malicious |
4300 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2972 | RuntimeBroker.exe | GET | 200 | 185.176.43.100:80 | http://sigmabioaef.atwebpages.com/12884306.php?JA9TOLhMg23Nt=vZdicV3JZAzJjJ&E5Yw7RONjUIjg2wwh3P9l=LK8fAk8eEmYg&6eavHhL4OTvWQnN=QUKDsuNxcR&2ec73fa4edc1d49c853df1815b7014c2=5QzYjRDN4YjN5UzNyQWZjdjZkVWNkNDZ5IGN5YTYwUTZhZTM1IGZzITO1UDN0MzMyYDNwUjM&d730d9f9ce4aee48722b12e1fd23db7e=QOkZWOhJjZ4UjNjFWO5QTMmdjNwkDMwMWNwIGNyQzY0I2M2ImN5EmZ&cf8ea13bf03810691a09f6ee9c86037a=0VfiIiOicDZjZGZiNTOiVjY0QDM0EWOzMDZiNWMwcjNlhzNxIGNiwiIkNjNxQmY1EmMhlDOxIWM2ImY5czY2AjNmZ2MmBjYmdTNwYTM1QWYlJiOiUjMjdjY4Y2N1MmN2IjYwQmNjhjYkRWMzU2MxQTZ5UGOiwiI2YDZlBDNlVzNhNGN0UGM3cjY3QWNilDMhVGZklTYiVDO0EzM1IWMhJiOiAjZ3kDZzEjMzQmNmFWO2cjZiVzY3YTO0UDMzMDZ2EmNis3W | unknown | — | — | malicious |
2972 | RuntimeBroker.exe | GET | 200 | 185.176.43.100:80 | http://sigmabioaef.atwebpages.com/12884306.php?JA9TOLhMg23Nt=vZdicV3JZAzJjJ&E5Yw7RONjUIjg2wwh3P9l=LK8fAk8eEmYg&6eavHhL4OTvWQnN=QUKDsuNxcR&2ec73fa4edc1d49c853df1815b7014c2=5QzYjRDN4YjN5UzNyQWZjdjZkVWNkNDZ5IGN5YTYwUTZhZTM1IGZzITO1UDN0MzMyYDNwUjM&d730d9f9ce4aee48722b12e1fd23db7e=QOkZWOhJjZ4UjNjFWO5QTMmdjNwkDMwMWNwIGNyQzY0I2M2ImN5EmZ&8840cb222f57329aad528a7e4bfbb468=d1nIkJ1VaBjSYlFMOhUS1xmMaFDeHV1ZwMUSOJkRJdXVq9UMNp2T1E0UOlXQq1kdVRVT2lkeXJiOicDZjZGZiNTOiVjY0QDM0EWOzMDZiNWMwcjNlhzNxIGNiwiIkNjNxQmY1EmMhlDOxIWM2ImY5czY2AjNmZ2MmBjYmdTNwYTM1QWYlJiOiUjMjdjY4Y2N1MmN2IjYwQmNjhjYkRWMzU2MxQTZ5UGOiwiI2YDZlBDNlVzNhNGN0UGM3cjY3QWNilDMhVGZklTYiVDO0EzM1IWMhJiOiAjZ3kDZzEjMzQmNmFWO2cjZiVzY3YTO0UDMzMDZ2EmNis3W | unknown | — | — | malicious |
2972 | RuntimeBroker.exe | GET | 200 | 185.176.43.100:80 | http://sigmabioaef.atwebpages.com/12884306.php?JA9TOLhMg23Nt=vZdicV3JZAzJjJ&E5Yw7RONjUIjg2wwh3P9l=LK8fAk8eEmYg&6eavHhL4OTvWQnN=QUKDsuNxcR&2ec73fa4edc1d49c853df1815b7014c2=5QzYjRDN4YjN5UzNyQWZjdjZkVWNkNDZ5IGN5YTYwUTZhZTM1IGZzITO1UDN0MzMyYDNwUjM&d730d9f9ce4aee48722b12e1fd23db7e=QOkZWOhJjZ4UjNjFWO5QTMmdjNwkDMwMWNwIGNyQzY0I2M2ImN5EmZ&cf8ea13bf03810691a09f6ee9c86037a=0VfiIiOicDZjZGZiNTOiVjY0QDM0EWOzMDZiNWMwcjNlhzNxIGNiwiI5ATMykzM0MjNhJDOmhTZ4MDMkRGNhJGM5UmY1YWNhRDOiRGO5QGZlJiOiUjMjdjY4Y2N1MmN2IjYwQmNjhjYkRWMzU2MxQTZ5UGOiwiI2YDZlBDNlVzNhNGN0UGM3cjY3QWNilDMhVGZklTYiVDO0EzM1IWMhJiOiAjZ3kDZzEjMzQmNmFWO2cjZiVzY3YTO0UDMzMDZ2EmNis3W | unknown | — | — | malicious |
2972 | RuntimeBroker.exe | GET | 200 | 185.176.43.100:80 | http://sigmabioaef.atwebpages.com/12884306.php?JA9TOLhMg23Nt=vZdicV3JZAzJjJ&E5Yw7RONjUIjg2wwh3P9l=LK8fAk8eEmYg&6eavHhL4OTvWQnN=QUKDsuNxcR&2ec73fa4edc1d49c853df1815b7014c2=5QzYjRDN4YjN5UzNyQWZjdjZkVWNkNDZ5IGN5YTYwUTZhZTM1IGZzITO1UDN0MzMyYDNwUjM&d730d9f9ce4aee48722b12e1fd23db7e=QOkZWOhJjZ4UjNjFWO5QTMmdjNwkDMwMWNwIGNyQzY0I2M2ImN5EmZ&714839bee31f9c5256b219d4a9de7452=d1nI2UzY4YTN5YjZyUWOwQDNxEWNwcjN1czM1IWN0UTN3ATMmhTNiNWMxIiOiUjMjdjY4Y2N1MmN2IjYwQmNjhjYkRWMzU2MxQTZ5UGOiwiI2YDZlBDNlVzNhNGN0UGM3cjY3QWNilDMhVGZklTYiVDO0EzM1IWMhJiOiAjZ3kDZzEjMzQmNmFWO2cjZiVzY3YTO0UDMzMDZ2EmNis3W | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4300 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.23.227.215:443 | — | Ooredoo Q.S.C. | QA | unknown |
4300 | svchost.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
4300 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
sigmabioaef.atwebpages.com |
| malicious |
ipinfo.io |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2972 | RuntimeBroker.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
2972 | RuntimeBroker.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup SSL Cert Observed (ipinfo .io) |
2972 | RuntimeBroker.exe | Device Retrieving External IP Address Detected | ET INFO Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2192 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ipinfo.io |
2972 | RuntimeBroker.exe | Misc activity | ET HUNTING Suspicious HTTP POST to Free Web Host Atwebpages |
2972 | RuntimeBroker.exe | A Network Trojan was detected | ET HUNTING Observed Malicious Filename in Outbound POST Request (Information.txt) |