File name:

oftendesignpro.zip

Full analysis: https://app.any.run/tasks/e1ddd498-78ba-4a32-9cd8-9d0d54ccb44e
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: December 09, 2024, 05:45:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
opendir
rat
asyncrat
remote
stealer
purecrypter
netreactor
purelogs
exfiltration
purehvnc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

E5F783E5D5924CA35B54BEAB212DFD4B

SHA1:

BF53426BEE1D8F4D087ECE7F270D1B0CAF4D2869

SHA256:

99A88D463CB08F6198DC45A3793EF0BDA999A314023EF2784C2CD6F5B937EC94

SSDEEP:

98304:uPNz/a1BxKIiYAiahaJYa0I3EcJmNCyW8KtVvGT+flHQjSBqZt15NnZC1H4kgfyR:6MQwrpMfFXPe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 3532)
    • Antivirus name has been found in the command line (generic signature)

      • MpCmdRun.exe (PID: 4672)
      • MpCmdRun.exe (PID: 4400)
    • Create files in the Startup directory

      • oftendesign.exe (PID: 4708)
    • PURECRYPTER has been detected (YARA)

      • oftendesign.exe (PID: 4708)
    • ASYNCRAT has been detected (SURICATA)

      • InstallUtil.exe (PID: 4136)
    • Actions looks like stealing of personal data

      • InstallUtil.exe (PID: 4136)
      • InstallUtil.exe (PID: 4580)
    • PUREHVNC has been detected (YARA)

      • InstallUtil.exe (PID: 4136)
    • PURECRYPTER has been detected (SURICATA)

      • InstallUtil.exe (PID: 4580)
    • Connects to the CnC server

      • InstallUtil.exe (PID: 4580)
    • Steals credentials from Web Browsers

      • InstallUtil.exe (PID: 4580)
    • Scans artifacts that could help determine the target

      • InstallUtil.exe (PID: 4580)
    • PURELOGS has been detected (SURICATA)

      • InstallUtil.exe (PID: 4580)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • oftendesignpropre.exe (PID: 5572)
      • oftendesignpro.exe (PID: 5888)
    • Executable content was dropped or overwritten

      • oftendesignpro.exe (PID: 5888)
      • oftendesignpropre.exe (PID: 5572)
      • oftendesign.exe (PID: 4708)
    • Process drops legitimate windows executable

      • oftendesignpro.exe (PID: 5888)
      • WinRAR.exe (PID: 3532)
    • Connects to the server without a host name

      • oftendesign.exe (PID: 4708)
      • offtendesign.exe (PID: 556)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 3532)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3532)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 3532)
    • The process creates files with name similar to system file names

      • oftendesign.exe (PID: 4708)
    • Contacting a server suspected of hosting an CnC

      • InstallUtil.exe (PID: 4136)
      • InstallUtil.exe (PID: 4580)
    • Connects to unusual port

      • InstallUtil.exe (PID: 4136)
      • InstallUtil.exe (PID: 4580)
    • Removes files via Powershell

      • powershell.exe (PID: 4624)
    • PowerShell delay command usage (probably sleep evasion)

      • powershell.exe (PID: 4624)
    • Starts POWERSHELL.EXE for commands execution

      • InstallUtil.exe (PID: 4580)
  • INFO

    • Manual execution by a user

      • oftendesignpro.exe (PID: 5888)
      • InstallUtil.exe (PID: 4136)
      • InstallUtil.exe (PID: 4580)
    • Checks supported languages

      • oftendesignpro.exe (PID: 5888)
      • everyonetechnollogyovlres.exe (PID: 836)
      • oftendesignpropre.exe (PID: 5572)
      • oftendesign.exe (PID: 4708)
      • MpCmdRun.exe (PID: 4672)
      • InstallUtil.exe (PID: 4136)
      • offtendesign.exe (PID: 556)
      • InstallUtil.exe (PID: 4580)
      • MpCmdRun.exe (PID: 4400)
    • Reads the machine GUID from the registry

      • everyonetechnollogyovlres.exe (PID: 836)
      • oftendesign.exe (PID: 4708)
      • offtendesign.exe (PID: 556)
      • InstallUtil.exe (PID: 4136)
      • InstallUtil.exe (PID: 4580)
    • Create files in a temporary directory

      • oftendesignpropre.exe (PID: 5572)
      • oftendesignpro.exe (PID: 5888)
      • MpCmdRun.exe (PID: 4672)
    • Reads the computer name

      • everyonetechnollogyovlres.exe (PID: 836)
      • oftendesign.exe (PID: 4708)
      • MpCmdRun.exe (PID: 4672)
      • InstallUtil.exe (PID: 4136)
      • MpCmdRun.exe (PID: 4400)
      • InstallUtil.exe (PID: 4580)
      • offtendesign.exe (PID: 556)
    • Disables trace logs

      • oftendesign.exe (PID: 4708)
      • offtendesign.exe (PID: 556)
    • Checks proxy server information

      • oftendesign.exe (PID: 4708)
      • offtendesign.exe (PID: 556)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3532)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 3532)
    • .NET Reactor protector has been detected

      • oftendesign.exe (PID: 4708)
      • InstallUtil.exe (PID: 4136)
    • Creates files or folders in the user directory

      • oftendesign.exe (PID: 4708)
    • Reads the software policy settings

      • InstallUtil.exe (PID: 4136)
    • Reads Microsoft Office registry keys

      • InstallUtil.exe (PID: 4580)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4624)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:12:08 07:23:08
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: oftendesignpro/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
16
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe oftendesignpro.exe everyonetechnollogyovlres.exe no specs oftendesignpropre.exe #PURECRYPTER oftendesign.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs #ASYNCRAT installutil.exe offtendesign.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs #PURECRYPTER installutil.exe powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR3532.45605\Rar$Scan9373.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
556C:\Users\admin\AppData\Local\Temp\IXP001.TMP\offtendesign.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\offtendesign.exe
oftendesignpropre.exe
User:
admin
Integrity Level:
MEDIUM
Description:
offtendesign
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ixp001.tmp\offtendesign.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
836C:\Users\admin\AppData\Local\Temp\IXP000.TMP\everyonetechnollogyovlres.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\everyonetechnollogyovlres.exeoftendesignpro.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Proxy.Client
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\everyonetechnollogyovlres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3532"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\oftendesignpro.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4128C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR3532.1763\Rar$Scan70966.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
4136"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4188\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4400"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR3532.1763"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
4580"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4624"powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -ForceC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeInstallUtil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
12 543
Read events
12 505
Write events
38
Delete events
0

Modification events

(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\oftendesignpro.zip
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3532) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4708) oftendesign.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oftendesign_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4708) oftendesign.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\oftendesign_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
7
Suspicious files
2
Text files
6
Unknown types
1

Dropped files

PID
Process
Filename
Type
5572oftendesignpropre.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\offtendesign.exeexecutable
MD5:85C8006A42A12B496E1A65E2198F0A49
SHA256:C3D81F54C4F75FF0A42B0DC356B323BEEFD945B6891C8F1C7FD83FD62084B4BF
5888oftendesignpro.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\oftendesignpropre.exeexecutable
MD5:490864B581CFD93592B1D47E7C0B7C8F
SHA256:3DDEC7574B24A9D26A450C8CC725B347606FF33B9346A812D3012EB6F359D5F9
5888oftendesignpro.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\everyonetechnollogyovlres.exeexecutable
MD5:1903D7D11D73AFA8DD27D21BF148FC2A
SHA256:389259EDAFB04ED410E74813E0378910C4EEC9CA066A9C4B3E9928AA50B18136
836everyonetechnollogyovlres.exeC:\Users\admin\AppData\Local\Temp\Tmp74D5.tmpder
MD5:CBC6B2AD4BF883EA7ECB41D8D86B0964
SHA256:C8844BA7CA7DF3C75532044792065C3D2B742C389FC9FA1A6E2776ED425917AF
4708oftendesign.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvchost.vbstext
MD5:388B9D6488E0D6999A6F9D1DEC8DD729
SHA256:7404B936F50F23AD5D699072FD142DD23788F7CC7DDB164AC4CC67E8CDF0BA5B
4672MpCmdRun.exeC:\Users\admin\AppData\Local\Temp\MpCmdRun.logtext
MD5:C08F5A10AC184375F5EC894711325F83
SHA256:6EBEBA252F79077F70D52A28FDEF7A2C30594C73911891EB5626E1CA062D9204
3532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR3532.45605\oftendesignpro.zip\oftendesignpro\oftendesignpro.exeexecutable
MD5:3A11B7A8FBF64B684369AEEA7CD08E17
SHA256:CCACAF0BD975EA2B7CB9E03986419EF04947ED39BFE3B18BAE3577A3890DDADA
5572oftendesignpropre.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\oftendesign.exeexecutable
MD5:0F4BC1FB5D736A617A8733F62266945B
SHA256:C8222B9D3F4E6D8E2B9D9FC7A027BAC9D826572DA7F05ECC8AE8BA8E00F7CE91
4624powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_xhakxo3r.4hk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3532WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR3532.1763\Rar$Scan70966.battext
MD5:F8DD588179F341A4F3B9B2759BDCF560
SHA256:9DCBFA62FA80DAD6B6F70EA485FA43E2E4F6EDEE216B9346517B63BBEF6DA94C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
24
DNS requests
6
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3220
svchost.exe
GET
200
2.20.245.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5208
RUXIMICS.exe
GET
200
2.20.245.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.20.245.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3220
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5208
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4708
oftendesign.exe
GET
200
185.226.181.36:80
http://185.226.181.36/count/Curbjjrrn.vdf
unknown
unknown
556
offtendesign.exe
GET
200
185.226.181.36:80
http://185.226.181.36/count/Rgfbp.vdf
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3220
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5208
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3220
svchost.exe
2.20.245.138:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4712
MoUsoCoreWorker.exe
2.20.245.138:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
5208
RUXIMICS.exe
2.20.245.138:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
3220
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 2.20.245.138
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
self.events.data.microsoft.com
  • 52.168.117.170
whitelisted

Threats

PID
Process
Class
Message
4136
InstallUtil.exe
Domain Observed Used for C2 Detected
ET MALWARE Generic AsyncRAT Style SSL Cert
4136
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] AsyncRAT Successful Connection
4580
InstallUtil.exe
A Network Trojan was detected
LOADER [ANY.RUN] PureLogs Download Attempt (LOAD)
4580
InstallUtil.exe
A Network Trojan was detected
STEALER [ANY.RUN] PureLogs Stealer Exfiltration
1 ETPRO signatures available at the full report
No debug info