URL:

https://google.co.ve/url?6q=jwr6yyqJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fs%2Fwdsoft.com.br%2F7yoya%2Fkwwflxzwdzjpvo%2FZGhpcmVuX3BhdGVsQGFybm90dHMuY29t%E3%80%82%24%24%24%E3%80%82

Full analysis: https://app.any.run/tasks/8b2c7a62-b157-4436-8524-b1a1d507afe9
Verdict: Malicious activity
Analysis date: December 14, 2024, 06:43:04
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
Indicators:
MD5:

E087325D0C74D97FF37165D13ABC7D9E

SHA1:

B50E54E9FC6F0E4C19F07E3C1AA69140B91FA7C9

SHA256:

970C93B095DFBE83821CF2372DE9398BB803DD2300039D8EF93589C7123F5600

SSDEEP:

6:2LuJLQkFSDcwTpRtMqfaDEW8eP/rVXWVlHAQVn:2yjIcorfaDzRrZWTHtV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 4792)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#PHISHING msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
4792"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
13
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b6deb.TMPbinary
MD5:2A21453795942FD88CBB06714604B9FD
SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\649fc9fc-5bd6-40cd-a69f-148cfc9c86ab.tmpbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c4705.TMPbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent Statebinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b610a.TMPbinary
MD5:15D26FA4E16467BE658F42074AC0DBAA
SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecuritybinary
MD5:136E06A537F6847D6F44B39B13D4B912
SHA256:CEEB00B547CB8BA327E4F49C5DC571F0D1FA33889058074521BD2236E40EFC30
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\f4554409-dc87-4b6f-b6a9-6f792e2eaa3c.tmpbinary
MD5:136E06A537F6847D6F44B39B13D4B912
SHA256:CEEB00B547CB8BA327E4F49C5DC571F0D1FA33889058074521BD2236E40EFC30
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\19dc8e8f-ae8c-4209-93cb-8304c302fe89.tmpbinary
MD5:64AC458BD93D9858CA454E1764DB36D2
SHA256:8EBA248C4E730FF92C7A9B45CB77ADF77453CF202E8B7BE0D63436C75EC86C7F
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2f65ca.TMPbinary
MD5:64AC458BD93D9858CA454E1764DB36D2
SHA256:8EBA248C4E730FF92C7A9B45CB77ADF77453CF202E8B7BE0D63436C75EC86C7F
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\c5b28f16-dd66-4c7a-8768-d093fc5c7f28.tmpbinary
MD5:09125E8D5AAFDD772806D5B282D482AA
SHA256:F5D3DAE7CDAED447DE010811A9497D4ECAF97C3CB170E74D2CF9D912EF59BD64
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
31
TCP/UDP connections
49
DNS requests
32
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
184.30.17.174:443
https://fs.microsoft.com/fs/windows/config.json
unknown
GET
404
46.101.100.125:443
https://microsfts0uygh0utllk8u8.grupomti.com.br/favicon.ico
unknown
GET
46.101.100.125:443
https://microsfts0uygh0utllk8u8.grupomti.com.br/?bb=ZGhpcmVuX3BhdGVsQGFybm90dHMuY29t%C3%A3%C2%80%C2%82$$%C3%A3%C2%80%C2%82
unknown
2856
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2856
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2856
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
6572
RUXIMICS.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2856
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4304
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4668
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4668
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
224.0.0.251:5353
unknown
6572
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4792
msedge.exe
104.208.16.89:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4304
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5988
svchost.exe
239.255.255.250:1900
whitelisted
4792
msedge.exe
172.217.16.131:443
google.co.ve
GOOGLE
US
whitelisted
3704
svchost.exe
184.30.17.174:443
fs.microsoft.com
AKAMAI-AS
DE
whitelisted
4792
msedge.exe
142.250.185.131:443
www.google.co.ve
GOOGLE
US
whitelisted
4668
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 216.58.212.174
whitelisted
google.co.ve
  • 172.217.16.131
whitelisted
fs.microsoft.com
  • 184.30.17.174
whitelisted
www.google.co.ve
  • 142.250.185.131
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
  • 2.16.164.49
  • 2.16.164.106
whitelisted
wdsoft.com.br
  • 191.252.141.125
unknown
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
microsfts0uygh0utllk8u8.grupomti.com.br
  • 46.101.100.125
unknown
www.bing.com
  • 104.126.37.144
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.186
  • 104.126.37.162
  • 104.126.37.171
  • 104.126.37.155
  • 104.126.37.163
  • 2.19.96.115
  • 2.19.96.83
  • 2.19.96.90
  • 2.19.96.107
  • 2.19.96.91
  • 2.19.96.121
  • 2.19.96.88
  • 2.19.96.120
  • 2.19.96.104
  • 2.23.209.177
  • 2.23.209.130
  • 2.23.209.179
  • 2.23.209.189
  • 2.23.209.185
  • 2.23.209.176
  • 2.23.209.140
  • 2.23.209.187
  • 2.23.209.148
whitelisted

Threats

PID
Process
Class
Message
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br)
No debug info