URL: | http://email.mailgun.waiverforever.com/c/eJxMz8FqAyEQxvGn0WMYZ43Rg4dA2XOhFHoLro7RZt0pu2ZL3r6k9ND7j-_jn7zLxgYlyauT1sYAAsjinSKbdAKCkwbI0aEzNhtl7TBESElWj4BH0EordwSAAxJNIcIQJ0pKuUloaKHO1_ty-A51pzXzSjuth8hNzr70_rWJ4SxwFDjWvHHjhToXCvOTCBzfXhEFjnL1JbQWbpQrAoDQ8AiF-Xdoi7SQD_fO9HyTW70ulC6J4-VGD18_93M1_PH-8lennJb9n989_gQAAP__qFtQ0w |
Full analysis: | https://app.any.run/tasks/15437712-b164-4dc7-b0e6-dc0f415c19ca |
Verdict: | Malicious activity |
Analysis date: | April 15, 2025, 17:32:59 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 8998B956F131BB007E091F38E57A792C |
SHA1: | DB17B4C1BD2E181FB67BF2E91E3EE82A757D460A |
SHA256: | 86CB09CB037A9D7A21AD7DACA508FBCF03F9EE5D1EEEC7A522BAF376F911B274 |
SSDEEP: | 6:CyYMWWWGlbtEKnVQXAWP0jtNf50GJNAgG1sA1oVxve12mnSzBjR+86Fz:eWnln8xAn0eNFoRgpe1RShIF |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1396 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --webtransport-developer-mode --no-appcompat-clear --mojo-platform-channel-handle=2532 --field-trial-handle=2372,i,8504447382059928769,14367336096275567116,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1396 | msedge.exe | GET | 302 | 34.110.180.34:80 | http://email.mailgun.waiverforever.com/c/eJxMz8FqAyEQxvGn0WMYZ43Rg4dA2XOhFHoLro7RZt0pu2ZL3r6k9ND7j-_jn7zLxgYlyauT1sYAAsjinSKbdAKCkwbI0aEzNhtl7TBESElWj4BH0EordwSAAxJNIcIQJ0pKuUloaKHO1_ty-A51pzXzSjuth8hNzr70_rWJ4SxwFDjWvHHjhToXCvOTCBzfXhEFjnL1JbQWbpQrAoDQ8AiF-Xdoi7SQD_fO9HyTW70ulC6J4-VGD18_93M1_PH-8lennJb9n989_gQAAP__qFtQ0w | unknown | — | — | whitelisted |
3256 | RUXIMICS.exe | GET | 200 | 23.53.40.178:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3080 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.178:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1876 | svchost.exe | GET | 200 | 23.53.40.178:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1876 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
3256 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.160.14:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 16.7 Kb | whitelisted |
— | — | POST | 200 | 20.190.160.14:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 403 | 184.30.21.171:443 | https://go.microsoft.com/fwlink/?LinkID=2257403&clcid=0x409 | unknown | — | — | whitelisted |
— | — | POST | 403 | 184.30.21.171:443 | https://go.microsoft.com/fwlink/?LinkID=2257403&clcid=0x409 | unknown | html | 384 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3256 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3080 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1876 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
1396 | msedge.exe | 2.19.96.49:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
1396 | msedge.exe | 34.110.180.34:80 | email.mailgun.waiverforever.com | GOOGLE | US | whitelisted |
1396 | msedge.exe | 188.114.96.3:443 | ifsomonetoheal.com | — | — | unknown |
6124 | svchost.exe | 40.126.31.67:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3256 | RUXIMICS.exe | 23.53.40.178:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3080 | MoUsoCoreWorker.exe | 23.53.40.178:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
email.mailgun.waiverforever.com |
| whitelisted |
ifsomonetoheal.com |
| unknown |
login.live.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
v10.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain ( .waiverforever .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain ( .waiverforever .com) |