URL: | https://lp.constantcontactpages.com/sl/Di68t65 |
Full analysis: | https://app.any.run/tasks/6682b88e-af3f-43e4-b855-13564daa8c55 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 00:51:00 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | CC1C8D29E303912886BD63FEF9C8C956 |
SHA1: | 58ED2A07329366D5125C495C11A9874E3B0E6FE9 |
SHA256: | AEF9C17B9A48CC427D6FB51F3C453004058AD6C5BC2703F111D1042CED16F931 |
SSDEEP: | 3:N8V1XPlvoDqmJnRRc:2jX9vohJs |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\d8e1e891-70da-4990-b413-a955acb9f16c.tmp | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2ba19d.TMP | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bf | compressed | |
MD5:6D973C8B7E2439D958E09C0A1AB9FE50 | SHA256:F3C122DC227E829ED96B2A754296809201BD78ABBAD7BA50EF5079654E1CC894 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\a5bafa4a-12ec-4190-a368-d660a48de7ef.tmp | binary | |
MD5:AEB7176C0E4D9EAEAC6D7BB7AAA8E0CA | SHA256:DEF9ADE1C0CA9F334AA74738D2AB8C173CAAC71A10E9F64ACC18A8B206375481 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000be | compressed | |
MD5:373C5BFDE8DAB5190258BA2BB62C1D12 | SHA256:C28013B8A76E02E213229DA7DE13EF50AF6EC6A40237D908BAEB12F4A00A084C | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c0 | binary | |
MD5:C513EDE7C5250083240B6B86191245EC | SHA256:0D2C0A56E01EC59216FC0AE2B2F62C9A519E36B751B8EA892BC3AA63B2F69998 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c1 | text | |
MD5:4BA3F2A352E848215C39A4F175B6F9F6 | SHA256:E928B6E51CA926DF7788DE80CD2FFD94EEE7DBA53B0B3A1E86816BF26956BB62 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity | binary | |
MD5:5A415DB3CBB77EB3C280C8C529CED020 | SHA256:A235F3D2014E891CA3B47416EB7FD95DE851E7AD5384787DE2A04B5648882592 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b5e99.TMP | binary | |
MD5:2A21453795942FD88CBB06714604B9FD | SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
5904 | RUXIMICS.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5904 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6900 | svchost.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6900 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | binary | 55 b | whitelisted |
— | — | GET | 200 | 151.101.2.137:443 | https://code.jquery.com/jquery-3.4.1.min.js | unknown | binary | 86.0 Kb | whitelisted |
— | — | GET | 302 | 172.64.144.228:443 | https://a.rs6.net/1/pc?ep=62cd1129642bc248y0Yl0LzpXKQ8CP3wbivNbRI4o5PZH5TiI5jbaQ9n5XYczKGpe6uqLpSJ_cj4EDI2e-6bpmfZ3l9OeODe1W0xvrdzmqeR4IxQ0l5r2Wx4uY8b4GP4lrMzxAMN5172XqEfzzSTNVWGA-xO9tj5Bg_1K925c5hwKJoj58ULKTASkf3MR4K38UeHYF4M7AsoLVaH26F6lrK5x-nvX3F0_t1E_g&c=${Contact.encryptedContactId} | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
6900 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 224.0.0.251:5353 | — | — | — | unknown |
4792 | msedge.exe | 13.89.178.26:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5904 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4304 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4792 | msedge.exe | 104.18.38.196:443 | lp.constantcontactpages.com | CLOUDFLARENET | — | malicious |
4616 | svchost.exe | 184.28.90.27:443 | fs.microsoft.com | AKAMAI-AS | US | whitelisted |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4792 | msedge.exe | 2.23.209.133:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4304 | MoUsoCoreWorker.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
lp.constantcontactpages.com |
| malicious |
fs.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
challenges.cloudflare.com |
| whitelisted |
static.ctctcdn.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
code.jquery.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Storms-1575`s Phishing domain by CrossDomain ( .microsoftfederalcloud .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing AiTM Storm1575 FlowerStorm (microsoftfederalcloud .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Storms-1575`s Phishing domain by CrossDomain ( .microsoftfederalcloud .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing AiTM Storm1575 FlowerStorm (microsoftfederalcloud .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Storms-1575`s Phishing domain by CrossDomain ( .microsoftfederalcloud .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing AiTM Storm1575 FlowerStorm (microsoftfederalcloud .com) |