File name:

ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe

Full analysis: https://app.any.run/tasks/69f56919-8e08-4519-8e38-3476e22a6d7a
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 02, 2024, 13:40:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
ransomware
alphacrypt
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

ED98CE8F541E6871D1F39943CE09DFA3

SHA1:

1FA08E8CE2C70DAF4A3456EB53E48484B20D3D12

SHA256:

AD340C9EA5510D1F0F6149FAE0BD5349D6E8B01DF4ECCC9A2BB300BE4BC9D981

SSDEEP:

6144:h8RwwduJnwd0mCM25J379nx39cA9LBm0dzo:fnwdrCM25d7PNx9tm0dzo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • svcklf.exe (PID: 6012)
    • Deletes shadow copies

      • svcklf.exe (PID: 6012)
    • ALPHACRYPT has been detected (SURICATA)

      • svcklf.exe (PID: 6012)
      • svchost.exe (PID: 2192)
    • Connects to the CnC server

      • svcklf.exe (PID: 6012)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
    • Reads security settings of Internet Explorer

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
    • Starts itself from another location

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
    • Starts CMD.EXE for commands execution

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
    • Hides command output

      • cmd.exe (PID: 4864)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5444)
    • Checks for external IP

      • svcklf.exe (PID: 6012)
      • svchost.exe (PID: 2192)
    • Contacting a server suspected of hosting an CnC

      • svcklf.exe (PID: 6012)
  • INFO

    • Checks supported languages

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
      • svcklf.exe (PID: 6012)
    • Reads the computer name

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
      • svcklf.exe (PID: 6012)
    • Process checks computer location settings

      • ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe (PID: 5432)
    • Reads the machine GUID from the registry

      • svcklf.exe (PID: 6012)
    • Checks proxy server information

      • svcklf.exe (PID: 6012)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2005:11:12 01:32:12+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 196608
InitializedDataSize: 950272
UninitializedDataSize: -
EntryPoint: 0x30382
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.4.6.2
ProductVersionNumber: 4.4.6.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Turkish
CompanyName: SystemOK AB
FileDescription: Existences
FileVersion: 4.4.6.2
InternalName: Macrobiotic.exe
LegalCopyright: Elevated 1986-2000
OriginalFileName: Macrobiotic.exe
ProductVersion: 4.4.6.2
ProductName: Eatage
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe #ALPHACRYPT svcklf.exe cmd.exe no specs conhost.exe no specs vssadmin.exe conhost.exe no specs vssvc.exe no specs #ALPHACRYPT svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3000\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exevssadmin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4864"C:\WINDOWS\system32\cmd.exe" /c del C:\Users\admin\Desktop\AD340C~1.EXE >> NULC:\Windows\SysWOW64\cmd.exead340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5432"C:\Users\admin\Desktop\ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe" C:\Users\admin\Desktop\ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5444C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6004"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet C:\Windows\System32\vssadmin.exe
svcklf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6012C:\Users\admin\AppData\Roaming\svcklf.exeC:\Users\admin\AppData\Roaming\svcklf.exe
ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981.exe
User:
admin
Company:
SystemOK AB
Integrity Level:
MEDIUM
Description:
Existences
Version:
4.4.6.2
Modules
Images
c:\users\admin\appdata\roaming\svcklf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
4 258
Read events
4 252
Write events
6
Delete events
0

Modification events

(PID) Process:(6012) svcklf.exeKey:HKEY_CURRENT_USER\SOFTWARE\msys
Operation:writeName:ID
Value:
0A7C1C574D81CAC2
(PID) Process:(6012) svcklf.exeKey:HKEY_CURRENT_USER\SOFTWARE\A7C1C574D81CAC2
Operation:writeName:data
Value:
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
(PID) Process:(6012) svcklf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:A7C1C574D81CAC2
Value:
C:\Users\admin\AppData\Roaming\svcklf.exe
(PID) Process:(6012) svcklf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6012) svcklf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6012) svcklf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
769
Text files
1 919
Unknown types
0

Dropped files

PID
Process
Filename
Type
6012svcklf.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\ip[1].txttext
MD5:BE6FBBB6D35B6B14DDB57EFFE1344730
SHA256:E8A4376E57CA7542EB3B7E2CD0E3BA76BC3BE37D588538F8DCCD2960D0B79281
6012svcklf.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\restore_files_bvtau.htmlhtml
MD5:CE603ACA52FA79B5F052E435A5E34A2C
SHA256:D772861F573E79604BCA7B558E45D40F65CB8FECAE4DC29756FE5B70EF7AD8D4
6012svcklf.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\restore_files_bvtau.htmlhtml
MD5:CE603ACA52FA79B5F052E435A5E34A2C
SHA256:D772861F573E79604BCA7B558E45D40F65CB8FECAE4DC29756FE5B70EF7AD8D4
6012svcklf.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\restore_files_bvtau.txttext
MD5:CB490B7A71E2878E6A91C8BAEC1B78C1
SHA256:0EFB5D521E27D4F7F6D51A3E5B262EF33B8EEE122E2D051A1D3351C05919ACA7
6012svcklf.exeC:\ProgramData\Adobe\ARM\S\388\restore_files_bvtau.txttext
MD5:CB490B7A71E2878E6A91C8BAEC1B78C1
SHA256:0EFB5D521E27D4F7F6D51A3E5B262EF33B8EEE122E2D051A1D3351C05919ACA7
6012svcklf.exeC:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\restore_files_bvtau.txttext
MD5:CB490B7A71E2878E6A91C8BAEC1B78C1
SHA256:0EFB5D521E27D4F7F6D51A3E5B262EF33B8EEE122E2D051A1D3351C05919ACA7
6012svcklf.exeC:\ProgramData\Adobe\ARM\S\restore_files_bvtau.htmlhtml
MD5:CE603ACA52FA79B5F052E435A5E34A2C
SHA256:D772861F573E79604BCA7B558E45D40F65CB8FECAE4DC29756FE5B70EF7AD8D4
6012svcklf.exeC:\ProgramData\Adobe\ARM\S\388\restore_files_bvtau.htmlhtml
MD5:CE603ACA52FA79B5F052E435A5E34A2C
SHA256:D772861F573E79604BCA7B558E45D40F65CB8FECAE4DC29756FE5B70EF7AD8D4
6012svcklf.exeC:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\restore_files_bvtau.htmlhtml
MD5:CE603ACA52FA79B5F052E435A5E34A2C
SHA256:D772861F573E79604BCA7B558E45D40F65CB8FECAE4DC29756FE5B70EF7AD8D4
6012svcklf.exeC:\ProgramData\Adobe\ARM\restore_files_bvtau.htmlhtml
MD5:CE603ACA52FA79B5F052E435A5E34A2C
SHA256:D772861F573E79604BCA7B558E45D40F65CB8FECAE4DC29756FE5B70EF7AD8D4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
27
DNS requests
18
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6012
svcklf.exe
GET
199.116.254.169:80
http://fgainterests.com/wp-content/themes/r.php?D0B1745184D4B19325F8CA239D78E8040F1BC4F18CD6F4B2101CC75EBA811BD758E27531027F4E2277F7982BE7BF7F85B939F435B2A75791D0D2F4CCE882836F17D94A875B7CEDCF2232EFC2EFF12BC10A07336913935D99A52DE07D2F9C5440FD4542DE1021515A77319036AA732B985971380EAFBA2BA9A4D0781FB38EA627F09B03D136C38CF0B8D37B4CDD1440883B3A2B9016C29AC424EAC2884BD083C7905063B04B9B94374761B07BAFD2CC87414D4DAE82ECB01C10E9E8484BD9506E25278A8DF13933F0D9963433BB24EE9287D2864B6452A6491548300922B3D51C
unknown
malicious
6012
svcklf.exe
GET
200
34.117.59.81:80
http://ipinfo.io/ip
unknown
shared
2040
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2040
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6012
svcklf.exe
GET
301
185.230.63.171:80
http://serenitynowbooksandgifts.com/wp-content/themes/r.php?D0B1745184D4B19325F8CA239D78E8040F1BC4F18CD6F4B2101CC75EBA811BD758E27531027F4E2277F7982BE7BF7F85B939F435B2A75791D0D2F4CCE882836F17D94A875B7CEDCF2232EFC2EFF12BC10A07336913935D99A52DE07D2F9C5440FD4542DE1021515A77319036AA732B98D648F2D453E95E9E746EE58EEB7B325C73B8F469EC3A75342919018FC77B7C8DA372DBA7C4257FC387E94B947894C593DB847A144224A4C839FCDF18CE766DB04A6F9D1A56CE6BC86C840D4B980971CE5BCC94B4E81798EA26565447FE2BB29B127AB502FEFF975323B5D9F5C778800AAAAD1247502FE226DFED12E3E09DBBBE
unknown
malicious
GET
301
34.149.87.45:443
https://serenitynowbooksandgifts.com/wp-content/themes/r.php?D0B1745184D4B19325F8CA239D78E8040F1BC4F18CD6F4B2101CC75EBA811BD758E27531027F4E2277F7982BE7BF7F85B939F435B2A75791D0D2F4CCE882836F17D94A875B7CEDCF2232EFC2EFF12BC10A07336913935D99A52DE07D2F9C5440FD4542DE1021515A77319036AA732B98D648F2D453E95E9E746EE58EEB7B325C73B8F469EC3A75342919018FC77B7C8DA372DBA7C4257FC387E94B947894C593DB847A144224A4C839FCDF18CE766DB04A6F9D1A56CE6BC86C840D4B980971CE5BCC94B4E81798EA26565447FE2BB29B127AB502FEFF975323B5D9F5C778800AAAAD1247502FE226DFED12E3E09DBBBE
unknown
6012
svcklf.exe
GET
301
67.22.44.2:80
http://teenpornotube.org/wp-content/themes/r.php?D0B1745184D4B19325F8CA239D78E8040F1BC4F18CD6F4B2101CC75EBA811BD758E27531027F4E2277F7982BE7BF7F85B939F435B2A75791D0D2F4CCE882836F17D94A875B7CEDCF2232EFC2EFF12BC10A07336913935D99A52DE07D2F9C5440FD4542DE1021515A77319036AA732B98D648F2D453E95E9E746EE58EEB7B325C73B8F469EC3A75342919018FC77B7C8DA372DBA7C4257FC387E94B947894C5931058E23544B2173042D9678202C0F8AE735EF7D138873A5F8B79E5CCBAF4BEC5ED63704400348DD1C4DF2D0786540843900303141B54DEBAEAA1B8A44ECA3267
unknown
malicious
6012
svcklf.exe
GET
67.22.44.2:80
http://www.teenpornotube.org/wp-content/themes/r.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2040
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6012
svcklf.exe
34.117.59.81:80
ipinfo.io
GOOGLE-CLOUD-PLATFORM
US
shared
6012
svcklf.exe
199.116.254.169:80
fgainterests.com
GVO
US
malicious
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2040
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2040
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 142.250.181.238
whitelisted
ipinfo.io
  • 34.117.59.81
shared
ezglobalmarketing.com
shared
fgainterests.com
  • 199.116.254.169
malicious
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.176
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
ledshoppen.nl
unknown
serenitynowbooksandgifts.com
  • 185.230.63.171
  • 185.230.63.186
  • 185.230.63.107
malicious
www.serenitynowbooksandgifts.com
  • 34.149.87.45
malicious

Threats

PID
Process
Class
Message
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)
6012
svcklf.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ipinfo.io
6012
svcklf.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
6012
svcklf.exe
Malware Command and Control Activity Detected
ET MALWARE AlphaCrypt CnC Beacon 3
6012
svcklf.exe
Malware Command and Control Activity Detected
ET MALWARE AlphaCrypt CnC Beacon 3
6012
svcklf.exe
Malware Command and Control Activity Detected
ET MALWARE AlphaCrypt CnC Beacon 3
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
2192
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to .onion proxy Domain (onion.to)
5 ETPRO signatures available at the full report
No debug info