URL: | https://google.co.ve/url?6q=qxleazhJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fs%2Fwdsoft.com.br%2F7yoya%2Fsdn8ctp5iw216o%2FY2xhdWRpYS50aGllbGVtYW5uQHJ0bC5jb20%3D%C3%A3%E2%82%AC%E2%80%9A%24%24%C3%A3%E2%82%AC%E2%80%9A |
Full analysis: | https://app.any.run/tasks/24e5f733-d6eb-4c34-b7bf-270ddf53112f |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 04:46:23 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 6C9D9C77E3AB8A238B4AD2815A3E08E4 |
SHA1: | E4BB0B36324C0EE7A5495E0DAB69D8D0E61AEC5C |
SHA256: | CE5AAF0C0B842921781B01C79236769AB7C0F098AEBC7C2D4D0818CC55C2020F |
SSDEEP: | 6:2LuJLQkbEkRtMqfaDEpd6ieUPjKzAvAgIq1BKBxAvAgIqV:2yjFfaDGsieUPQVxq1iVxqV |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:9B4BD4E14950C0FB7762EFB7C1C8FF6C | SHA256:A249BBCAA2B44FB64365C40159EF0FAAA7BFB0F8E13F68A67B254577472AA481 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b610a.TMP | binary | |
MD5:15D26FA4E16467BE658F42074AC0DBAA | SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\4f099ee7-6ba7-4bd2-9ff7-3d7698265995.tmp | binary | |
MD5:3A34C141FB2DA763CBA7DE151E5518EC | SHA256:7A3B3F160FCBDDE811687A86FBA9C91F6B005E8C3BE7F69FDBD408A81E7D44F6 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c47c1.TMP | binary | |
MD5:2A21453795942FD88CBB06714604B9FD | SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity | binary | |
MD5:3A34C141FB2DA763CBA7DE151E5518EC | SHA256:7A3B3F160FCBDDE811687A86FBA9C91F6B005E8C3BE7F69FDBD408A81E7D44F6 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\5abfe8d3-dc2e-4a0c-89a4-88ec830c4f63.tmp | binary | |
MD5:9B4BD4E14950C0FB7762EFB7C1C8FF6C | SHA256:A249BBCAA2B44FB64365C40159EF0FAAA7BFB0F8E13F68A67B254577472AA481 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2f65d9.TMP | binary | |
MD5:9B4BD4E14950C0FB7762EFB7C1C8FF6C | SHA256:A249BBCAA2B44FB64365C40159EF0FAAA7BFB0F8E13F68A67B254577472AA481 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\050fe659-a573-4295-b31b-26422f27d4b4.tmp | binary | |
MD5:B3B349393220466FB2C52DB0437EE61E | SHA256:5A15E30620A4AB92E2F1AEE1801AB9642205B1CEA55B9E6479B6AE846DE65F87 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000ba | binary | |
MD5:9D3A86131A0DB3FE3C8DA961A9375437 | SHA256:25169B42169BB50686D2F56EBD79F58B88761B3CC492F5AC15B1841F27C9DECE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 403 | 191.252.141.125:443 | https://wdsoft.com.br/favicon.ico | unknown | — | — | — |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 2.16.164.106:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
2888 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
5968 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 224.0.0.251:5353 | — | — | — | unknown |
2888 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4792 | msedge.exe | 20.42.73.25:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4304 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5968 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4792 | msedge.exe | 142.250.184.227:443 | google.co.ve | GOOGLE | US | whitelisted |
7108 | svchost.exe | 184.28.90.27:443 | fs.microsoft.com | AKAMAI-AS | US | whitelisted |
4792 | msedge.exe | 216.58.206.67:443 | www.google.co.ve | GOOGLE | US | whitelisted |
5968 | svchost.exe | 2.16.164.49:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
google.co.ve |
| whitelisted |
fs.microsoft.com |
| whitelisted |
www.google.co.ve |
| whitelisted |
crl.microsoft.com |
| whitelisted |
wdsoft.com.br |
| unknown |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
config.edge.skype.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |