File name:

fakes_war_time.zip

Full analysis: https://app.any.run/tasks/db1d667d-eff5-42ff-a119-19c2690bb02f
Verdict: Malicious activity
Analysis date: January 12, 2024, 08:52:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
httpshell
shell
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

E637C1CD1FBF16B55BDB451765F9EF75

SHA1:

5AEE0DF4423E4DAA8EAD77BD626F731207D4A155

SHA256:

C3FAAA3A6B0831F1D3974FCEE80588812CA7AFEB53CC173E0B83BCB6787FA13E

SSDEEP:

6144:8m78oOxh6FykzwmEq20CgZNdmL3ZLxnlh38x/kosp:D4oS6fMp0CeO3ZLxlhI/kosp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 1624)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1624)
    • Changes powershell execution policy (Bypass)

      • powershell.exe (PID: 584)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • powershell.exe (PID: 2416)
      • powershell.exe (PID: 584)
    • Application launched itself

      • powershell.exe (PID: 2416)
      • powershell.exe (PID: 584)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 584)
    • The process hide an interactive prompt from the user

      • powershell.exe (PID: 584)
    • Using 'findstr.exe' to search for text patterns in files and output

      • powershell.exe (PID: 1624)
    • Uses ATTRIB.EXE to modify file attributes

      • powershell.exe (PID: 1624)
    • Reads the Internet Settings

      • powershell.exe (PID: 1624)
  • INFO

    • Manual execution by a user

      • powershell.exe (PID: 2416)
    • Application launched itself

      • AcroRd32.exe (PID: 1636)
      • msedge.exe (PID: 568)
      • RdrCEF.exe (PID: 2736)
      • msedge.exe (PID: 3012)
    • Connects to the CnC server

      • powershell.exe (PID: 1624)
    • HTTPSHELL has been detected (SURICATA)

      • powershell.exe (PID: 1624)
    • Unusual connection from system programs

      • powershell.exe (PID: 1624)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 1624)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:01:09 15:37:18
ZipCRC: 0x80dae4b1
ZipCompressedSize: 225943
ZipUncompressedSize: 347220
ZipFileName: fakes_war_time.pdf.lnk
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
33
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe no specs powershell.exe no specs powershell.exe no specs #HTTPSHELL powershell.exe findstr.exe no specs attrib.exe no specs acrord32.exe acrord32.exe no specs rdrcef.exe rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe rdrcef.exe no specs rdrcef.exe no specs msedge.exe no specs rdrcef.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rdrcef.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
568"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://thebell.media/onlayn-rassledovanie-kak-proverit-podlinnost-videoC:\Program Files\Microsoft\Edge\Application\msedge.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
584"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
876"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1172,6971946470486560363,5284178772407191588,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=17538179453506631897 --mojo-platform-channel-handle=1268 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1036"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1172,6971946470486560363,5284178772407191588,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=12498928399717473969 --mojo-platform-channel-handle=1200 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1484"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --touch-events=enabled --field-trial-handle=1172,6971946470486560363,5284178772407191588,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-gpu-compositing --lang=en-US --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=75096645264243333 --renderer-client-id=8 --mojo-platform-channel-handle=1604 --allow-no-sandbox-job /prefetch:1C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
0
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1624"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -NonInteractive -NoProfile -ExecutionPolicy BypassC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1636"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\Important.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
powershell.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
0
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1656"C:\Windows\system32\attrib.exe" +h C:\Users\admin\Temp.jpgC:\Windows\System32\attrib.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1904"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1172,6971946470486560363,5284178772407191588,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=7149564983665704067 --mojo-platform-channel-handle=1200 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1928"C:\Windows\system32\findstr.exe" /R JVBERi0xLjcNCiW1tb fakes_war_time.pdf.lnkC:\Windows\System32\findstr.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
Total events
21 366
Read events
21 242
Write events
124
Delete events
0

Modification events

(PID) Process:(2184) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2184) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2416) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
4
Suspicious files
272
Text files
47
Unknown types
0

Dropped files

PID
Process
Filename
Type
2416powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\39eecc48a3b0018d.customDestinations-msbinary
MD5:05769FA9C3FB9048D63A3F7AEC1C5FBB
SHA256:E6BA6E7919225F9170802BC07EE90336BE9120EC28CB69A16C32DF81161E6BA9
2416powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BR08K1ZH0U79DXA2LPTH.tempbinary
MD5:05769FA9C3FB9048D63A3F7AEC1C5FBB
SHA256:E6BA6E7919225F9170802BC07EE90336BE9120EC28CB69A16C32DF81161E6BA9
2184WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2184.5135\fakes_war_time.pdf.lnkbinary
MD5:BF8A44DF0EA8E72CF03237E166F414A7
SHA256:5FA3D13366348E7C999CCA9A06E4D2F5EC7F518ACA3B36F0366ECEDBA5F2B057
2416powershell.exeC:\Users\admin\AppData\Local\Temp\evbc2yvj.lta.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
568msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:C7352A0E98449CC8AEDC1D6954C4CCD9
SHA256:3A1591F52AD31B5B0B48F97AB5E1361D0AD0FA0F584E8FE8EFD482801DC2B9B5
568msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RFe7bd3.TMP
MD5:
SHA256:
568msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1624powershell.exeC:\Users\admin\AppData\Local\Temp\Important.pdfpdf
MD5:1A2EACBA94A95DD8616CC3D66078D99D
SHA256:176EA2947DF5B4AA5EB3AE7D40D566F893C7BA4E92D4667E28BA68476CE5C935
2248AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Reader\Files\TESTINGmp3
MD5:DC84B0D741E5BEAE8070013ADDCC8C28
SHA256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
1624powershell.exeC:\Users\admin\AppData\Local\Temp\2gm535ts.324.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
82
DNS requests
91
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1624
powershell.exe
POST
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Debug
unknown
text
7 b
unknown
1624
powershell.exe
POST
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Info
unknown
text
38 b
unknown
1624
powershell.exe
GET
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Token
unknown
text
7.01 Kb
unknown
1636
AcroRd32.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
1636
AcroRd32.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0225743a2ee7dc35
unknown
compressed
4.66 Kb
unknown
1636
AcroRd32.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?28bcce63ca23a400
unknown
compressed
4.66 Kb
unknown
1624
powershell.exe
POST
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Info
unknown
text
38 b
unknown
1624
powershell.exe
POST
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Debug
unknown
html
95 b
unknown
1624
powershell.exe
GET
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Token
unknown
html
95 b
unknown
1624
powershell.exe
POST
200
141.8.193.27:80
http://api-gate.xyz/api/v1/Client/Info
unknown
text
38 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1624
powershell.exe
141.8.193.27:80
api-gate.xyz
Sprinthost.ru LLC
RU
unknown
2520
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2520
msedge.exe
20.105.95.163:443
nav-edge.smartscreen.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2520
msedge.exe
13.107.22.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2520
msedge.exe
188.114.96.3:443
thebell.media
CLOUDFLARENET
NL
unknown
2520
msedge.exe
172.67.220.17:443
thebellmirror3.com
unknown
568
msedge.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
api-gate.xyz
  • 141.8.193.27
malicious
config.edge.skype.com
  • 13.107.42.16
whitelisted
nav-edge.smartscreen.microsoft.com
  • 20.105.95.163
whitelisted
thebell.media
  • 188.114.96.3
  • 188.114.97.3
unknown
edge.microsoft.com
  • 13.107.22.239
  • 131.253.33.239
whitelisted
thebellmirror3.com
  • 172.67.220.17
  • 104.21.45.234
unknown
data-edge.smartscreen.microsoft.com
  • 20.31.251.109
whitelisted
yandex.ru
  • 77.88.55.88
  • 5.255.255.70
  • 5.255.255.77
  • 77.88.55.60
whitelisted
platform.instagram.com
  • 157.240.0.63
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.139
  • 104.126.37.146
  • 104.126.37.168
  • 104.126.37.153
  • 104.126.37.163
  • 104.126.37.170
  • 104.126.37.160
  • 104.126.37.155
whitelisted

Threats

PID
Process
Class
Message
1624
powershell.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1624
powershell.exe
Malware Command and Control Activity Detected
SHELL [ANY.RUN] HTTP-Shell Multiplatform Reverse Shell Check-In
1624
powershell.exe
A Network Trojan was detected
ET MALWARE OrbitalBeam CnC Token Request
1624
powershell.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1624
powershell.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1624
powershell.exe
A Network Trojan was detected
ET MALWARE OrbitalBeam CnC Activity (Debug)
1624
powershell.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1624
powershell.exe
Malware Command and Control Activity Detected
SHELL [ANY.RUN] HTTP-Shell Multiplatform Reverse Shell Check-In
1624
powershell.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1624
powershell.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Process
Message
msedge.exe
[0112/085316.676:ERROR:exception_handler_server.cc(527)] ConnectNamedPipe: The pipe is being closed. (0xE8)