| File name: | shellcode.sc |
| Full analysis: | https://app.any.run/tasks/a38ce16e-56b8-4368-905a-722d85e663bf |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | May 24, 2025, 11:34:02 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines (65536), with no line terminators |
| MD5: | 4ACD445EFE694988A8245238C4725BE8 |
| SHA1: | FFE320458DFC147B872082998093F09FE7C00B35 |
| SHA256: | C85B9F369C9FC725A1571E5F3C0F0BFEEF4269B5E0223A9016655DEEAD649332 |
| SSDEEP: | 12288:R6Q/3MESXmFSMrUUAmr1nXC1DnaP8NX1eJXnxEgliXdrLq9ENwwRkfp3axe8w9Hg:6xhgfWvW+COhHLpBmEPxVY936RfguEm |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 660 | "C:\windows\system32\cmd.exe" /c bitsadmin /util /setieproxy localsystem MANUAL_PROXY localhost:8080 "" | C:\Windows\System32\cmd.exe | — | URLMonitor64.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1052 | "C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe" -ServerName:App.AppXbdkk0yrkwpcgeaem8zk81k8py1eaahny.mca | C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe | — | svchost.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1088 | "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer | C:\Windows\System32\GameBarPresenceWriter.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Gamebar Presence Writer Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1168 | "C:\Users\admin\Desktop\cobalt.exe" | C:\Users\admin\Desktop\cobalt.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2148 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2320 | "C:\windows\system32\cmd.exe" /c netsh winhttp set proxy localhost:8080 | C:\Windows\System32\cmd.exe | — | URLMonitor64.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2600 | "C:\Users\admin\Desktop\URLMonitor64.exe" | C:\Users\admin\Desktop\URLMonitor64.exe | explorer.exe | ||||||||||||
User: admin Company: KahuSecurity Integrity Level: HIGH Description: URLMonitor Version: 0.1.0.0 Modules
| |||||||||||||||
| 2896 | netsh winhttp set proxy localhost:8080 | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3012 | bitsadmin /util /setieproxy localsystem MANUAL_PROXY localhost:8080 "" | C:\Windows\System32\bitsadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: BITS administration utility Exit code: 0 Version: 7.8.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5036 | "C:\Users\admin\Desktop\URLMonitor64.exe" | C:\Users\admin\Desktop\URLMonitor64.exe | — | explorer.exe | |||||||||||
User: admin Company: KahuSecurity Integrity Level: MEDIUM Description: URLMonitor Exit code: 3221226540 Version: 0.1.0.0 Modules
| |||||||||||||||
| (PID) Process: | (7944) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (7944) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (7944) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (7944) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (1052) GameBar.exe | Key: | \REGISTRY\A\{2feab7d7-4a91-f422-09ec-349685e29c33}\LocalState |
| Operation: | write | Name: | CurrentDisplayMonitor |
Value: 670061006D0065000000416271E39FCCDB01 | |||
| (PID) Process: | (1052) GameBar.exe | Key: | \REGISTRY\A\{2feab7d7-4a91-f422-09ec-349685e29c33}\LocalState |
| Operation: | write | Name: | InstalledVersionMajor |
Value: 020054B76EE39FCCDB01 | |||
| (PID) Process: | (1052) GameBar.exe | Key: | \REGISTRY\A\{2feab7d7-4a91-f422-09ec-349685e29c33}\LocalState |
| Operation: | write | Name: | InstalledVersionMinor |
Value: 220054B76EE39FCCDB01 | |||
| (PID) Process: | (1052) GameBar.exe | Key: | \REGISTRY\A\{2feab7d7-4a91-f422-09ec-349685e29c33}\LocalState |
| Operation: | write | Name: | InstalledVersionBuild |
Value: 616D6EEF6EE39FCCDB01 | |||
| (PID) Process: | (1052) GameBar.exe | Key: | \REGISTRY\A\{2feab7d7-4a91-f422-09ec-349685e29c33}\LocalState |
| Operation: | write | Name: | InstalledVersionRevision |
Value: 00006EEF6EE39FCCDB01 | |||
| (PID) Process: | (1052) GameBar.exe | Key: | \REGISTRY\A\{2feab7d7-4a91-f422-09ec-349685e29c33}\LocalState |
| Operation: | write | Name: | PreviousAppTerminationFromSuspended |
Value: 00B6F16EE39FCCDB01 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7224 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_d669974e731581fcd4a9c8ca912b755dea9f012_4a37867f_b5764362-1c7a-4763-8047-207137d8073b\Report.wer | — | |
MD5:— | SHA256:— | |||
| 7944 | WinRAR.exe | C:\Users\admin\Desktop\apateDNS\apateDNS.exe | executable | |
MD5:EEE67B77EE2600605F524EE628E2C230 | SHA256:8FC71012A0C009149AD07E32234B91AB5F782B154E0487E353C70330076960DA | |||
| 7412 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules\rule100071v0.xml | xml | |
MD5:3DF0BABC8132291994D448B40582DB90 | SHA256:6FB9BDDDA6B632428391FAFE9CE78D58CD0986B6571D8BB4C9691496070F3F19 | |||
| 7224 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER35E.tmp.dmp | binary | |
MD5:31E5B67DA2A556561B05DE0F76AB2BFE | SHA256:3B49A902DF693FEE1B2E3932B6641A3065CCE038A070A21B4682497F12C750C1 | |||
| 7944 | WinRAR.exe | C:\Users\admin\Desktop\apateDNS\README.pdf | ||
MD5:91C23506930C8D72B2CCB20C92002823 | SHA256:B872CD82BA6DA1C45C43F446CF53B1875737D010038CCF8E27455BBFE93F396A | |||
| 7412 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres | binary | |
MD5:7EDADB8DAF846D6A4D61CA8BA150722F | SHA256:0B8DBF7DCA66D808995CB5288709A81E8EE201F454F44D928BE9669C1F6510B3 | |||
| 7344 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML | text | |
MD5:5433EAB10C6B5C6D55B7CBD302426A39 | SHA256:23DBF7014E99E93AF5F2760F18EE1370274F06A453145C8D539B66D798DAD131 | |||
| 7344 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD | xml | |
MD5:90BE2701C8112BEBC6BD58A7DE19846E | SHA256:644FBCDC20086E16D57F31C5BAD98BE68D02B1C061938D2F5F91CBE88C871FBF | |||
| 7412 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:B97FC45E5D6A7C4FBCF113D4B6A18AE2 | SHA256:83953E096661605BD1B6BF435F5A28355F3842BC8D28E00EAF90C6ADD775D1CA | |||
| 7344 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak | text | |
MD5:7050D5AE8ACFBE560FA11073FEF8185D | SHA256:CB87767C4A384C24E4A0F88455F59101B1AE7B4FB8DE8A5ADB4136C5F7EE545B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.18:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5668 | cobalt.exe | GET | 200 | 60.205.253.112:9955 | http://60.205.253.112:9955/dpixel | unknown | — | — | unknown |
7784 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7784 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5668 | cobalt.exe | GET | 200 | 60.205.253.112:9955 | http://60.205.253.112:9955/MHRv | unknown | — | — | unknown |
5668 | cobalt.exe | GET | 200 | 60.205.253.112:9955 | http://60.205.253.112:9955/dpixel | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.18:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
otelrules.azureedge.net |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5668 | cobalt.exe | A Network Trojan was detected | ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M1 |
5668 | cobalt.exe | Targeted Malicious Activity was Detected | ET MALWARE Cobalt Strike Beacon Observed |
5668 | cobalt.exe | A Network Trojan was detected | BACKDOOR [ANY.RUN] Possible Cobalt Strike Beacon |
5668 | cobalt.exe | Targeted Malicious Activity was Detected | ET MALWARE Cobalt Strike Beacon Observed |
5668 | cobalt.exe | A Network Trojan was detected | BACKDOOR [ANY.RUN] Possible Cobalt Strike Beacon |
5668 | cobalt.exe | Targeted Malicious Activity was Detected | ET MALWARE Cobalt Strike Beacon Observed |
5668 | cobalt.exe | A Network Trojan was detected | BACKDOOR [ANY.RUN] Possible Cobalt Strike Beacon |
5668 | cobalt.exe | Targeted Malicious Activity was Detected | ET MALWARE Cobalt Strike Beacon Observed |
5668 | cobalt.exe | A Network Trojan was detected | BACKDOOR [ANY.RUN] Possible Cobalt Strike Beacon |
5668 | cobalt.exe | Targeted Malicious Activity was Detected | ET MALWARE Cobalt Strike Beacon Observed |