| URL: | https://openai.index-sora.com |
| Full analysis: | https://app.any.run/tasks/fd35a22b-9b08-475c-add8-581b9ee68ce5 |
| Verdict: | Malicious activity |
| Analysis date: | July 20, 2024, 17:44:52 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MD5: | D5DA44DA34E86624FF44191590BC118F |
| SHA1: | F57AB762A11E5FACFDEAD4678261170B0432C2C7 |
| SHA256: | A15F8A4726D3F7A7CFBEEB80B6D6CF8E0CAF796BDA03A29E5784A8E02AB20EBD |
| SSDEEP: | 3:N8cuEKaDiGT:2cuRaDiK |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 796 | C:\WINDOWS\system32\cmd.exe /d /s /c "powershell.exe -ExecutionPolicy Bypass -Command "& { . 'C:\Users\admin\AppData\Local\vdyqy\lono.ps1'; ODW -path "C:\Users\admin\AppData\Local\uchlnzuwtz\vdyqy\npp.8.6.6.Installer.exe" }"" | C:\Windows\System32\cmd.exe | — | sora.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3108 | "C:\Users\admin\AppData\Local\uchlnzuwtz\vdyqy\npp.8.6.6.Installer.exe" | C:\Users\admin\AppData\Local\uchlnzuwtz\vdyqy\npp.8.6.6.Installer.exe | — | powershell.exe | |||||||||||
User: admin Company: Don HO don.h@free.fr Integrity Level: MEDIUM Description: Notepad++ : a free (GNU) source code editor Exit code: 3221226540 Version: 8.6.6.0 Modules
| |||||||||||||||
| 4016 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4076 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4896 | C:\WINDOWS\system32\cmd.exe /d /s /c "powershell.exe -ExecutionPolicy Bypass -Command "& { . 'C:\Users\admin\AppData\Local\ehlmm\gkky.ps1'; ODW -path "C:\Users\admin\AppData\Local\hjdwbxutnc\ehlmm\npp.8.6.6.Installer.exe" }"" | C:\Windows\System32\cmd.exe | — | index-win.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4928 | "C:\Users\admin\AppData\Local\hjdwbxutnc\ehlmm\npp.8.6.6.Installer.exe" | C:\Users\admin\AppData\Local\hjdwbxutnc\ehlmm\npp.8.6.6.Installer.exe | powershell.exe | ||||||||||||
User: admin Company: Don HO don.h@free.fr Integrity Level: HIGH Description: Notepad++ : a free (GNU) source code editor Exit code: 1 Version: 8.6.6.0 Modules
| |||||||||||||||
| 5124 | "C:\Users\admin\Downloads\gW8h5aYT\index-win.exe" | C:\Users\admin\Downloads\gW8h5aYT\index-win.exe | explorer.exe | ||||||||||||
User: admin Company: Node.js Integrity Level: MEDIUM Description: Sora creating video from text Exit code: 0 Version: 1.1.2.0 Modules
| |||||||||||||||
| 5772 | regsvr32 /s "C:\Program Files (x86)\Notepad++\contextMenu\NppShell.dll" | C:\Windows\SysWOW64\regsvr32.exe | — | npp.8.6.6.Installer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6028 | powershell.exe -ExecutionPolicy Bypass -Command "& { . 'C:\Users\admin\AppData\Local\ehlmm\gkky.ps1'; ODW -path "C:\Users\admin\AppData\Local\hjdwbxutnc\ehlmm\npp.8.6.6.Installer.exe" }" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6204 | "C:\Program Files (x86)\Notepad++\updater\gup.exe" -v8.66 | C:\Program Files (x86)\Notepad++\updater\GUP.exe | notepad++.exe | ||||||||||||
User: admin Company: Don HO don.h@free.fr Integrity Level: MEDIUM Description: WinGup for Notepad++ Version: 5.28 Modules
| |||||||||||||||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 04000000000000000E000000030000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\4\0 |
| Operation: | write | Name: | MRUListEx |
Value: 0100000000000000FFFFFFFF | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar |
| Operation: | write | Name: | Locked |
Value: 1 | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Ribbon |
| Operation: | write | Name: | MinimizedStateTabletModeOff |
Value: 0 | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Ribbon |
| Operation: | write | Name: | QatItems |
Value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| |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser |
| Operation: | write | Name: | ITBar7Layout |
Value: 13000000000000000000000020000000100000000000000001000000010700005E01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\208\Shell |
| Operation: | write | Name: | SniffedFolderType |
Value: Downloads | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\208\Shell |
| Operation: | write | Name: | SniffedFolderType |
Value: Pictures | |||
| (PID) Process: | (4016) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\2\ApplicationViewManagement\W32:00000000000503C6 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456A1F1CCF85B06E3419214046A96D63B00 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6560 | WinRAR.exe | C:\Users\admin\Downloads\gW8h5aYT\index-win.exe | — | |
MD5:— | SHA256:— | |||
| 4016 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 4016 | explorer.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1 | binary | |
MD5:7A3B8457313A521E0D44F91765A4E041 | SHA256:2B08ECF53BB8B6C430659926148F896102DC80B5F38B0EC5EFE122199659651C | |||
| 4016 | explorer.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\248DDD9FCF61002E219645695E3FFC98_A760EAA2E953AFA35215FFF9ABFB1165 | binary | |
MD5:2EE81775C8E2B3A11C5C1BF55797A26F | SHA256:130B0796492BCFF548B9AFE27C61810DB2006B0BA54C367A4CF97F8C451EEAB2 | |||
| 7816 | sora.exe | C:\Users\admin\AppData\Local\uchlnzuwtz\lono.zip | compressed | |
MD5:5BF4E16C2EB9AE256E65B16988D04301 | SHA256:9F8294C7E3FDE74834C1886AB57E54AE7BFC3DEF3544CB2A5635528D92EBA456 | |||
| 7816 | sora.exe | C:\Users\admin\AppData\Local\uchlnzuwtz\vdyqy\npp.8.6.6.Installer.exe | executable | |
MD5:48563A2720422C9ACA0B0071C2947234 | SHA256:732574CD602BEB41C5BC74DA6D660B3CE0FE53DEED400E7D712073479129C99C | |||
| 4016 | explorer.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\248DDD9FCF61002E219645695E3FFC98_A760EAA2E953AFA35215FFF9ABFB1165 | binary | |
MD5:CEEFD0F8C5F96DA7A91D67D2679E8B6A | SHA256:B8875583E0E7EAC4C4F3E31BA4825EE440F6A6FD9B67FA311F0078C4F0E46AE9 | |||
| 4016 | explorer.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1 | binary | |
MD5:8A599135410835006B16492674023151 | SHA256:AEA5568ECB19B01C541DAF8648BD213DCF138EE34B6F3D9855AC18049A78C652 | |||
| 7444 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hkllayab.ene.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7816 | sora.exe | C:\Users\admin\AppData\Local\dtrc\olxgnw.zip | compressed | |
MD5:5BF4E16C2EB9AE256E65B16988D04301 | SHA256:9F8294C7E3FDE74834C1886AB57E54AE7BFC3DEF3544CB2A5635528D92EBA456 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 34.107.221.82:80 | http://detectportal.firefox.com/canonical.html | unknown | — | — | whitelisted |
— | — | GET | 200 | 34.107.221.82:80 | http://detectportal.firefox.com/success.txt?ipv4 | unknown | — | — | whitelisted |
— | — | POST | 200 | 95.101.54.99:80 | http://r10.o.lencr.org/ | unknown | — | — | unknown |
— | — | POST | 200 | 95.101.54.99:80 | http://r10.o.lencr.org/ | unknown | — | — | unknown |
— | — | POST | 200 | 95.101.54.130:80 | http://r3.o.lencr.org/ | unknown | — | — | unknown |
— | — | POST | 200 | 95.101.54.99:80 | http://r10.o.lencr.org/ | unknown | — | — | unknown |
— | — | POST | 200 | 95.101.54.99:80 | http://r10.o.lencr.org/ | unknown | — | — | unknown |
— | — | POST | 200 | 142.250.184.227:80 | http://o.pki.goog/wr2 | unknown | — | — | unknown |
— | — | POST | 200 | 142.250.184.227:80 | http://o.pki.goog/wr2 | unknown | — | — | unknown |
— | — | POST | 200 | 142.250.184.227:80 | http://o.pki.goog/wr2 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.190.159.4:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 4.209.33.156:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
— | — | 34.107.221.82:80 | detectportal.firefox.com | GOOGLE | US | whitelisted |
— | — | 172.67.133.33:443 | openai.index-sora.com | CLOUDFLARENET | US | unknown |
— | — | 34.117.188.166:443 | contile.services.mozilla.com | GOOGLE-CLOUD-PLATFORM | US | unknown |
— | — | 34.160.144.191:443 | content-signature-2.cdn.mozilla.net | GOOGLE | US | unknown |
Domain | IP | Reputation |
|---|---|---|
login.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
detectportal.firefox.com |
| whitelisted |
openai.index-sora.com |
| unknown |
prod.detectportal.prod.cloudops.mozgcp.net |
| whitelisted |
example.org |
| whitelisted |
ipv4only.arpa |
| whitelisted |
contile.services.mozilla.com |
| whitelisted |
spocs.getpocket.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potential Corporate Privacy Violation | AV POLICY Observed TikTok Domain in TLS SNI (tiktok.com) |
2168 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net) |
2116 | firefox.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 4 |
2168 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com) |