URL:

https://systemsupports.co/_initiallogin.aspx?v=hrnothr%40firstambank.com

Full analysis: https://app.any.run/tasks/d2f811d8-9e06-4cd0-999c-3ff4584b1f91
Verdict: Malicious activity
Analysis date: December 13, 2024, 21:03:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
Indicators:
MD5:

610C546CDC652D2BB193F80AFE5957B7

SHA1:

AD285FAB1372D329A1585308033326691754BE3A

SHA256:

8294EF8962851A89190F602B3DBAD04948C47C3AF94DA252E285BA58B575F52E

SSDEEP:

3:N8RWtFiWZhKtfaUFLKARtLK:2kGqAtfz5K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 4792)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#PHISHING msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
4792"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
10
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\13cb8304-c302-4e89-b4b3-134dac646429.tmp
MD5:
SHA256:
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bdimage
MD5:12E3DAC858061D088023B2BD48E2FA96
SHA256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b6b6a.TMPbinary
MD5:15D26FA4E16467BE658F42074AC0DBAA
SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c55da.TMPbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\8768d093-fc5c-4f28-8857-117a5a51e1f2.tmpbinary
MD5:94C8AA5D5F72ED65F880D09C1FC78D61
SHA256:DC32D37447F3A15621F60179BC5E94765BDE287651BDAB71529EB58D92E1197B
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bacompressed
MD5:FECB1A07E5CF6C41A176CB3CCC0390D3
SHA256:8ECAF60C5FE8A4F7FE33D3BB616B96889D01428F140D2ABE207FF1580466A7E4
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecuritybinary
MD5:54142908BC3AFC903609E310C8D8B3E5
SHA256:312BDD59164560CE2411ED75F89E347F52B15A9BD72EF9CDE869D2828E26969F
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent Statebinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\26ec7a3f-f85d-4dce-99dc-8e8fae8ca209.tmpbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b7b78.TMPbinary
MD5:2A21453795942FD88CBB06714604B9FD
SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
36
DNS requests
18
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
23.35.236.109:443
https://fs.microsoft.com/fs/windows/config.json
unknown
5192
RUXIMICS.exe
GET
200
184.24.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3804
svchost.exe
GET
200
184.24.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5192
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4304
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4304
MoUsoCoreWorker.exe
GET
200
184.24.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3804
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
152.199.21.175:443
https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
unknown
image
1.82 Kb
whitelisted
2856
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
GET
200
23.35.236.109:443
https://fs.microsoft.com/fs/windows/config.json
unknown
binary
55 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.251:5353
unknown
5192
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4304
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4792
msedge.exe
20.42.65.90:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3804
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4792
msedge.exe
20.118.40.3:443
systemsupports.co
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5988
svchost.exe
239.255.255.250:1900
whitelisted
3704
svchost.exe
23.35.236.109:443
fs.microsoft.com
AKAMAI-AS
DE
whitelisted
3804
svchost.exe
184.24.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5192
RUXIMICS.exe
184.24.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.174
whitelisted
systemsupports.co
  • 20.118.40.3
unknown
fs.microsoft.com
  • 23.35.236.109
whitelisted
crl.microsoft.com
  • 184.24.77.42
  • 184.24.77.11
  • 184.24.77.12
  • 184.24.77.10
  • 184.24.77.15
  • 184.24.77.7
  • 184.24.77.17
  • 184.24.77.38
  • 184.24.77.27
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 88.221.169.152
whitelisted
aadcdn.msftauth.net
  • 152.199.21.175
whitelisted
www.bing.com
  • 92.123.104.18
  • 92.123.104.23
  • 92.123.104.26
  • 92.123.104.29
  • 92.123.104.28
  • 92.123.104.30
  • 92.123.104.14
  • 92.123.104.22
  • 92.123.104.17
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
xpaywalletcdn.azureedge.net
  • 13.107.246.45
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Request to Azure content delivery network (aadcdn .msauth .net)
Not Suspicious Traffic
INFO [ANY.RUN] Request to Azure content delivery network (aadcdn .msauth .net)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Possible Domain chain identified as Phishing (authisnotlogin)
No debug info