File name:

2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom

Full analysis: https://app.any.run/tasks/e4ae3b35-b0bc-43a1-aa34-862771dda4d6
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: June 07, 2025, 01:32:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
botnet
phorpiex
auto
coinminer
miner
winring0x64-sys
vuln-driver
upx
xor-url
xmrig
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 8 sections
MD5:

2451A6444DF5F5A5B2556390A1F513E4

SHA1:

7FC1359E0EB0D7DA21A98441047D5EAA1DE68FAA

SHA256:

E35457601206D437B338D56FB29E51264100BE1664CC8D9738CEE7E64D333E4B

SSDEEP:

3072:MBCLlS3hfvOJtyb5W/aL3py8WhzS9RY5+//ZW6obMa/h7BhV7I:MQLlS3JvQtyIaY8WhzS9akJja/1zV7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 2847428198.exe (PID: 1472)
    • PHORPIEX has been detected (SURICATA)

      • syscrondvr.exe (PID: 208)
    • Connects to the CnC server

      • syscrondvr.exe (PID: 208)
    • PHORPIEX has been detected (YARA)

      • syscrondvr.exe (PID: 208)
    • COINMINER has been found (auto)

      • 1356822933.exe (PID: 7036)
      • 1435828728.exe (PID: 896)
    • Vulnerable driver has been detected

      • sysmtdrav.exe (PID: 8132)
    • XMRIG has been detected (YARA)

      • dwm.exe (PID: 7596)
    • XORed URL has been found (YARA)

      • dwm.exe (PID: 7596)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • syscrondvr.exe (PID: 208)
    • Executable content was dropped or overwritten

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • 2847428198.exe (PID: 1472)
      • 184906430.exe (PID: 7288)
      • 1356822933.exe (PID: 7036)
      • 1435828728.exe (PID: 896)
      • sysmtdrav.exe (PID: 8132)
    • Potential Corporate Privacy Violation

      • 94F.exe (PID: 3192)
      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 1356822933.exe (PID: 7036)
    • Process requests binary or script from the Internet

      • 94F.exe (PID: 3192)
      • 1356822933.exe (PID: 7036)
    • Connects to the server without a host name

      • 94F.exe (PID: 3192)
      • syscrondvr.exe (PID: 208)
      • 1356822933.exe (PID: 7036)
    • Starts itself from another location

      • 2847428198.exe (PID: 1472)
    • Contacting a server suspected of hosting an CnC

      • syscrondvr.exe (PID: 208)
    • Starts SC.EXE for service management

      • 1435828728.exe (PID: 896)
    • Process drops legitimate windows executable

      • 184906430.exe (PID: 7288)
    • Connects to unusual port

      • syscrondvr.exe (PID: 208)
      • dwm.exe (PID: 7596)
    • Windows service management via SC.EXE

      • sc.exe (PID: 4188)
      • sc.exe (PID: 7260)
    • Creates a new Windows service

      • sc.exe (PID: 4428)
    • Stops a currently running service

      • sc.exe (PID: 1088)
    • Executes as Windows Service

      • sysmtdrav.exe (PID: 8132)
    • Drops a system driver (possible attempt to evade defenses)

      • sysmtdrav.exe (PID: 8132)
  • INFO

    • The sample compiled with chinese language support

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 184906430.exe (PID: 7288)
    • Checks supported languages

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • 2847428198.exe (PID: 1472)
      • syscrondvr.exe (PID: 208)
      • syscrondvr.exe (PID: 2244)
      • 1356822933.exe (PID: 7036)
      • 184906430.exe (PID: 7288)
      • 368114503.exe (PID: 7576)
    • Reads the computer name

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • syscrondvr.exe (PID: 208)
    • Checks proxy server information

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • syscrondvr.exe (PID: 208)
    • Creates files or folders in the user directory

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • syscrondvr.exe (PID: 208)
      • 184906430.exe (PID: 7288)
    • Create files in a temporary directory

      • 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe (PID: 2980)
      • 94F.exe (PID: 3192)
      • syscrondvr.exe (PID: 208)
      • 368114503.exe (PID: 7576)
    • Launching a file from a Registry key

      • 2847428198.exe (PID: 1472)
    • Manual execution by a user

      • syscrondvr.exe (PID: 2244)
    • The sample compiled with english language support

      • 184906430.exe (PID: 7288)
    • The sample compiled with japanese language support

      • sysmtdrav.exe (PID: 8132)
    • UPX packer has been detected

      • dwm.exe (PID: 7596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 1970:01:01 15:50:05+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 90112
InitializedDataSize: 57856
UninitializedDataSize: -
EntryPoint: 0x2a000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.29.10.471
ProductVersionNumber: 3.29.10.471
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileDescription: 腾讯会议
FileVersion: 3.29.10.471
LegalCopyright: © Tencent Corporation. All rights reserved.
ProductName: 腾讯会议
ProductVersion: 3.29.10.471
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
22
Malicious processes
8
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe 94f.exe 2847428198.exe #PHORPIEX syscrondvr.exe syscrondvr.exe no specs #COINMINER 1356822933.exe 368114503.exe no specs 184906430.exe slui.exe #COINMINER 1435828728.exe sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs THREAT sysmtdrav.exe conhost.exe no specs #XOR-URL dwm.exe 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208C:\WINDOWS\syscrondvr.exeC:\Windows\syscrondvr.exe
2847428198.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\windows\syscrondvr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
896C:\Users\admin\AppData\Local\Temp\1435828728.exeC:\Users\admin\AppData\Local\Temp\1435828728.exe
1356822933.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\1435828728.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
1088C:\WINDOWS\system32\sc.exe stop eventlogC:\Windows\System32\sc.exe1435828728.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1051
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1472C:\Users\admin\AppData\Local\Temp\2847428198.exeC:\Users\admin\AppData\Local\Temp\2847428198.exe
94F.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\2847428198.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
2244C:\WINDOWS\syscrondvr.exeC:\Windows\syscrondvr.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\syscrondvr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
2552\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2980"C:\Users\admin\Desktop\2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe" C:\Users\admin\Desktop\2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
腾讯会议
Exit code:
0
Version:
3.29.10.471
Modules
Images
c:\users\admin\desktop\2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\iertutil.dll
3192"C:\Users\admin\AppData\Local\Temp\94F.exe"C:\Users\admin\AppData\Local\Temp\94F.exe
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\94f.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
4188C:\WINDOWS\system32\sc.exe delete "MgrSrvdrvcs"C:\Windows\System32\sc.exe1435828728.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
4200\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
7 656
Read events
7 642
Write events
14
Delete events
0

Modification events

(PID) Process:(2980) 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2980) 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2980) 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2980) 2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
Operation:writeName:C:\Users\admin\Desktop\2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
Value:
1
(PID) Process:(3192) 94F.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3192) 94F.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3192) 94F.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1472) 2847428198.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Windows Settings
Value:
C:\WINDOWS\syscrondvr.exe
(PID) Process:(208) syscrondvr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(208) syscrondvr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
15
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
29802025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\64[1].exeexecutable
MD5:0EC46393976EB51F307CC11D80BAE845
SHA256:9175BA77AC91AFDC513CA64788A72BF12915247F64BB1F95C06B5A1938FA4A84
29802025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeC:\Users\admin\AppData\Local\Temp\94F.exeexecutable
MD5:0EC46393976EB51F307CC11D80BAE845
SHA256:9175BA77AC91AFDC513CA64788A72BF12915247F64BB1F95C06B5A1938FA4A84
29802025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeC:\Users\admin\Desktop\virtualdisplaytext
MD5:67C4598DA641838029F5C0F8F90AA398
SHA256:92280C45AEAC5FDA5F43495C635D67209A842288CC386B0E03F2F33F275E4B50
208syscrondvr.exeC:\Users\admin\AppData\Local\Temp\1356822933.exebinary
MD5:9B64B08969AD80705FADB8FD9D654DCB
SHA256:44ECC25D894EE478494F1CABF52F41145BE12F42F43D9032CC7CB10B28068213
208syscrondvr.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\1[1]binary
MD5:9B64B08969AD80705FADB8FD9D654DCB
SHA256:44ECC25D894EE478494F1CABF52F41145BE12F42F43D9032CC7CB10B28068213
319294F.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\newtpp[1].exeexecutable
MD5:F30FDBF3448F67CBC3566F31729CB7A6
SHA256:3A902ABB21D204ED6A0776789C9661F8B98E561FD0CA661EE37A7D8BD079E57B
208syscrondvr.exeC:\Users\admin\AppData\Local\Temp\368114503.exebinary
MD5:D0FBD536386427688100D0C7DFF5770D
SHA256:CE8B5A21126D8D551066DA8A229D7337234554F0EFB8018620EA6C770B48011C
208syscrondvr.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\3[1]binary
MD5:B1CF906941494F4E6050B2C73EF27314
SHA256:4C4E195A909DD0F05847BFC1631654E97924EB4C9301ECC191B1D18F853BBF77
319294F.exeC:\Users\admin\AppData\Local\Temp\2847428198.exeexecutable
MD5:F30FDBF3448F67CBC3566F31729CB7A6
SHA256:3A902ABB21D204ED6A0776789C9661F8B98E561FD0CA661EE37A7D8BD079E57B
7288184906430.exeC:\Users\admin\Desktop\2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exeexecutable
MD5:2451A6444DF5F5A5B2556390A1F513E4
SHA256:E35457601206D437B338D56FB29E51264100BE1664CC8D9738CEE7E64D333E4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
51
DNS requests
6
Threats
47

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3760
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3760
RUXIMICS.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2980
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
GET
200
185.156.72.39:80
http://185.156.72.39/64.exe
unknown
malicious
3192
94F.exe
GET
200
185.156.72.39:80
http://185.156.72.39/newtpp.exe
unknown
malicious
208
syscrondvr.exe
GET
185.156.72.39:80
http://185.156.72.39/1
unknown
malicious
3192
94F.exe
GET
200
185.156.72.39:80
http://185.156.72.39/peinstall.php
unknown
malicious
208
syscrondvr.exe
GET
185.156.72.39:80
http://185.156.72.39/2
unknown
malicious
208
syscrondvr.exe
GET
200
185.156.72.39:80
http://185.156.72.39/1
unknown
malicious
208
syscrondvr.exe
GET
185.156.72.39:80
http://185.156.72.39/3
unknown
malicious
208
syscrondvr.exe
GET
200
185.156.72.39:80
http://185.156.72.39/2
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3760
RUXIMICS.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2980
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
185.156.72.39:80
Tov Vaiz Partner
RU
malicious
3760
RUXIMICS.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3760
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3192
94F.exe
185.156.72.39:80
Tov Vaiz Partner
RU
malicious
208
syscrondvr.exe
185.156.72.39:80
Tov Vaiz Partner
RU
malicious
208
syscrondvr.exe
45.141.233.6:80
Euro Crypt EOOD
DE
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.update.microsoft.com
  • 132.196.74.18
whitelisted
self.events.data.microsoft.com
  • 104.208.16.95
whitelisted

Threats

PID
Process
Class
Message
2980
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
Misc activity
ET INFO Observed UA-CPU Header
2980
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2980
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
A Network Trojan was detected
ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
2980
2025-06-07_2451a6444df5f5a5b2556390a1f513e4_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom.exe
A Network Trojan was detected
ET MALWARE Possible Malicious Macro DL EXE Feb 2016
3192
94F.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3192
94F.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
3192
94F.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
208
syscrondvr.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Phorpiex CnC Communication
208
syscrondvr.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Phorpiex CnC Communication
208
syscrondvr.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Phorpiex CnC Communication
No debug info