URL:

https://lp.constantcontactpages.com/sl/Di68t65

Full analysis: https://app.any.run/tasks/6682b88e-af3f-43e4-b855-13564daa8c55
Verdict: Malicious activity
Analysis date: December 14, 2024, 00:51:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
storm1575
Indicators:
MD5:

CC1C8D29E303912886BD63FEF9C8C956

SHA1:

58ED2A07329366D5125C495C11A9874E3B0E6FE9

SHA256:

AEF9C17B9A48CC427D6FB51F3C453004058AD6C5BC2703F111D1042CED16F931

SSDEEP:

3:N8V1XPlvoDqmJnRRc:2jX9vohJs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 4792)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#PHISHING msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
4792"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
30
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\d8e1e891-70da-4990-b413-a955acb9f16c.tmpbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2ba19d.TMPbinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bfcompressed
MD5:6D973C8B7E2439D958E09C0A1AB9FE50
SHA256:F3C122DC227E829ED96B2A754296809201BD78ABBAD7BA50EF5079654E1CC894
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\a5bafa4a-12ec-4190-a368-d660a48de7ef.tmpbinary
MD5:AEB7176C0E4D9EAEAC6D7BB7AAA8E0CA
SHA256:DEF9ADE1C0CA9F334AA74738D2AB8C173CAAC71A10E9F64ACC18A8B206375481
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000becompressed
MD5:373C5BFDE8DAB5190258BA2BB62C1D12
SHA256:C28013B8A76E02E213229DA7DE13EF50AF6EC6A40237D908BAEB12F4A00A084C
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c0binary
MD5:C513EDE7C5250083240B6B86191245EC
SHA256:0D2C0A56E01EC59216FC0AE2B2F62C9A519E36B751B8EA892BC3AA63B2F69998
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c1text
MD5:4BA3F2A352E848215C39A4F175B6F9F6
SHA256:E928B6E51CA926DF7788DE80CD2FFD94EEE7DBA53B0B3A1E86816BF26956BB62
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecuritybinary
MD5:5A415DB3CBB77EB3C280C8C529CED020
SHA256:A235F3D2014E891CA3B47416EB7FD95DE851E7AD5384787DE2A04B5648882592
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent Statebinary
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A
SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE
4792msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2b5e99.TMPbinary
MD5:2A21453795942FD88CBB06714604B9FD
SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
61
TCP/UDP connections
109
DNS requests
102
Threats
54

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
184.30.17.174:443
https://fs.microsoft.com/fs/windows/config.json
unknown
5904
RUXIMICS.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5904
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4304
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4304
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6900
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6900
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.17.174:443
https://fs.microsoft.com/fs/windows/config.json
unknown
binary
55 b
whitelisted
GET
200
151.101.2.137:443
https://code.jquery.com/jquery-3.4.1.min.js
unknown
binary
86.0 Kb
whitelisted
GET
302
172.64.144.228:443
https://a.rs6.net/1/pc?ep=62cd1129642bc248y0Yl0LzpXKQ8CP3wbivNbRI4o5PZH5TiI5jbaQ9n5XYczKGpe6uqLpSJ_cj4EDI2e-6bpmfZ3l9OeODe1W0xvrdzmqeR4IxQ0l5r2Wx4uY8b4GP4lrMzxAMN5172XqEfzzSTNVWGA-xO9tj5Bg_1K925c5hwKJoj58ULKTASkf3MR4K38UeHYF4M7AsoLVaH26F6lrK5x-nvX3F0_t1E_g&c=${Contact.encryptedContactId}
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6900
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
224.0.0.251:5353
unknown
4792
msedge.exe
13.89.178.26:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5904
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4304
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4792
msedge.exe
104.18.38.196:443
lp.constantcontactpages.com
CLOUDFLARENET
malicious
4616
svchost.exe
184.28.90.27:443
fs.microsoft.com
AKAMAI-AS
US
whitelisted
5988
svchost.exe
239.255.255.250:1900
whitelisted
4792
msedge.exe
2.23.209.133:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4304
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
lp.constantcontactpages.com
  • 104.18.38.196
  • 172.64.149.60
malicious
fs.microsoft.com
  • 184.28.90.27
whitelisted
www.bing.com
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.187
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
  • 2.20.245.138
  • 2.20.245.137
whitelisted
challenges.cloudflare.com
  • 104.18.94.41
  • 104.18.95.41
whitelisted
static.ctctcdn.com
  • 104.18.40.153
  • 172.64.147.103
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
code.jquery.com
  • 151.101.194.137
  • 151.101.2.137
  • 151.101.66.137
  • 151.101.130.137
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Storms-1575`s Phishing domain by CrossDomain ( .microsoftfederalcloud .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing AiTM Storm1575 FlowerStorm (microsoftfederalcloud .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Storms-1575`s Phishing domain by CrossDomain ( .microsoftfederalcloud .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing AiTM Storm1575 FlowerStorm (microsoftfederalcloud .com)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Storms-1575`s Phishing domain by CrossDomain ( .microsoftfederalcloud .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing AiTM Storm1575 FlowerStorm (microsoftfederalcloud .com)
No debug info