URL: | https://google.co.ve/url?6q=vhnzmsyJLi6z73yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fs%2Fwdsoft.com.br%2F7yoya%2Ffwjjhadffn3uag%2FbW9oYW4ucGFyYW1hc2l2YW1AYWxmYW5hci5jb20%3D%C3%A3%E2%82%AC%E2%80%9A%24%24%24%C3%A3%E2%82%AC%E2%80%9A |
Full analysis: | https://app.any.run/tasks/a5aa04ba-c59d-47ad-b525-0ef98b431250 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 02:18:35 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | EE5CFE6C23C489E32E6DE0913E6506A6 |
SHA1: | EA3F326E99B7458ACF7875FF2FD1B173C34EF645 |
SHA256: | D31494B319B937D553A3328896801BA79527EF38149BCFBB284268504C57A47B |
SSDEEP: | 6:2LuJLQkZHRtMqfaDETXfpAJ8plNKzAvAgIq1B9BxAvAgIqV:2yjPfaDAmJ8pQVxq1fVxqV |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c4 | text | |
MD5:A14BDC22836412FD7E818B72710C8A6F | SHA256:809EF4F0F748C44E79C609753543FD8F0C2B7E0F925B0DB2F024F35D52337117 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000be | binary | |
MD5:A13950D5C46BA7626038A14928733C65 | SHA256:A64B352A67063E61461395D884206A080E64E0705151E21F59C438670F4B1E3F | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:F8AEBE077C6A9FCEB3F0484ADCE7969C | SHA256:EDE46D418526EE54A8393EA8C2228E8FBB5B201091FFC84B02E83AE6E46A3C7E | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b6679.TMP | binary | |
MD5:15D26FA4E16467BE658F42074AC0DBAA | SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c46f6.TMP | binary | |
MD5:2A21453795942FD88CBB06714604B9FD | SHA256:5DFE0384325B556EE4B8668E502312B9BA6ADC298CD9213DDFA528CB959ADC06 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c5 | text | |
MD5:D2F56C9452725F9271AEEC713DDE4801 | SHA256:4473EB4FBF3FDDF79BB1526E85882C91BC7D28A6974E68845FA3B22EDDC426B9 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c3 | text | |
MD5:F4031F3CF7E2C747D97BB42E9D87223C | SHA256:44A168E9D173976EB16FDE11CCCF04C33FC59FA3C9D778A9C03D7105C5C4112E | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c7 | text | |
MD5:685C27129149F470A7336953EBBA0FF2 | SHA256:C0F0C4B3519CA795C33E1BF4E0988A0A6618A38195078F60A3CF6D1FA2BE3AF1 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bd | text | |
MD5:E27CA466A5710AA739C2C41863C0EF52 | SHA256:109543EAAA5BC404F225BDCF9A654AF048D3819124605C138A9EC5D40F72BCBE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bc | text | |
MD5:0ACC8A15F2E542DCC4A8FE695D888173 | SHA256:8E07285DA9693AA2BCB4D89F87876583CD5AD6170ED0C634A0AF08984FC9D39F |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 403 | 191.252.141.125:443 | https://wdsoft.com.br/favicon.ico | unknown | — | — | — |
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
5896 | RUXIMICS.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
3804 | svchost.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2856 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3804 | svchost.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5896 | RUXIMICS.exe | GET | 200 | 23.38.73.129:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3804 | svchost.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 224.0.0.251:5353 | — | — | — | unknown |
4792 | msedge.exe | 40.79.150.121:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | FR | unknown |
5896 | RUXIMICS.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4304 | MoUsoCoreWorker.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4792 | msedge.exe | 142.250.185.163:443 | google.co.ve | GOOGLE | US | whitelisted |
6552 | svchost.exe | 184.30.17.174:443 | fs.microsoft.com | AKAMAI-AS | DE | whitelisted |
4792 | msedge.exe | 216.58.206.35:443 | www.google.co.ve | GOOGLE | US | whitelisted |
5896 | RUXIMICS.exe | 23.32.238.107:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
google.co.ve |
| whitelisted |
fs.microsoft.com |
| whitelisted |
www.google.co.ve |
| whitelisted |
crl.microsoft.com |
| whitelisted |
wdsoft.com.br |
| unknown |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ntp.msn.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (wdsoft .com .br) |