URL: | https://google.co.ve/url?6q=jwr6yyqJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fs%2Fwdsoft.com.br%2F7yoya%2Fkwwflxzwdzjpvo%2FZGhpcmVuX3BhdGVsQGFybm90dHMuY29t%E3%80%82%24%24%24%E3%80%82 |
Full analysis: | https://app.any.run/tasks/8b2c7a62-b157-4436-8524-b1a1d507afe9 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 06:43:04 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | E087325D0C74D97FF37165D13ABC7D9E |
SHA1: | B50E54E9FC6F0E4C19F07E3C1AA69140B91FA7C9 |
SHA256: | 970C93B095DFBE83821CF2372DE9398BB803DD2300039D8EF93589C7123F5600 |
SSDEEP: | 6:2LuJLQkFSDcwTpRtMqfaDEW8eP/rVXWVlHAQVn:2yjIcorfaDzRrZWTHtV |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b6deb.TMP | binary | |
MD5:2A21453795942FD88CBB06714604B9FD | SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\649fc9fc-5bd6-40cd-a69f-148cfc9c86ab.tmp | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c4705.TMP | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b610a.TMP | binary | |
MD5:15D26FA4E16467BE658F42074AC0DBAA | SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity | binary | |
MD5:136E06A537F6847D6F44B39B13D4B912 | SHA256:CEEB00B547CB8BA327E4F49C5DC571F0D1FA33889058074521BD2236E40EFC30 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\f4554409-dc87-4b6f-b6a9-6f792e2eaa3c.tmp | binary | |
MD5:136E06A537F6847D6F44B39B13D4B912 | SHA256:CEEB00B547CB8BA327E4F49C5DC571F0D1FA33889058074521BD2236E40EFC30 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\19dc8e8f-ae8c-4209-93cb-8304c302fe89.tmp | binary | |
MD5:64AC458BD93D9858CA454E1764DB36D2 | SHA256:8EBA248C4E730FF92C7A9B45CB77ADF77453CF202E8B7BE0D63436C75EC86C7F | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2f65ca.TMP | binary | |
MD5:64AC458BD93D9858CA454E1764DB36D2 | SHA256:8EBA248C4E730FF92C7A9B45CB77ADF77453CF202E8B7BE0D63436C75EC86C7F | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\c5b28f16-dd66-4c7a-8768-d093fc5c7f28.tmp | binary | |
MD5:09125E8D5AAFDD772806D5B282D482AA | SHA256:F5D3DAE7CDAED447DE010811A9497D4ECAF97C3CB170E74D2CF9D912EF59BD64 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
— | — | GET | 404 | 46.101.100.125:443 | https://microsfts0uygh0utllk8u8.grupomti.com.br/favicon.ico | unknown | — | — | — |
— | — | GET | — | 46.101.100.125:443 | https://microsfts0uygh0utllk8u8.grupomti.com.br/?bb=ZGhpcmVuX3BhdGVsQGFybm90dHMuY29t%C3%A3%C2%80%C2%82$$%C3%A3%C2%80%C2%82 | unknown | — | — | — |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
6572 | RUXIMICS.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4668 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4668 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 224.0.0.251:5353 | — | — | — | unknown |
6572 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4792 | msedge.exe | 104.208.16.89:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4304 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4792 | msedge.exe | 172.217.16.131:443 | google.co.ve | GOOGLE | US | whitelisted |
3704 | svchost.exe | 184.30.17.174:443 | fs.microsoft.com | AKAMAI-AS | DE | whitelisted |
4792 | msedge.exe | 142.250.185.131:443 | www.google.co.ve | GOOGLE | US | whitelisted |
4668 | svchost.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
google.co.ve |
| whitelisted |
fs.microsoft.com |
| whitelisted |
www.google.co.ve |
| whitelisted |
crl.microsoft.com |
| whitelisted |
wdsoft.com.br |
| unknown |
www.microsoft.com |
| whitelisted |
microsfts0uygh0utllk8u8.grupomti.com.br |
| unknown |
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |