File name:

2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil

Full analysis: https://app.any.run/tasks/96091443-6a9e-4102-a018-6a69baba3d58
Verdict: Malicious activity
Analysis date: October 21, 2024, 12:42:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
installer
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3C93FA27EB8C989C1A871BD8C2BC854B

SHA1:

160B09172BEBE189419DCD56B173F20B5D6E498D

SHA256:

E8B963AD839CD9E13DF18970F98CEF9E31735387C1075429AA84659D95EE7EBB

SSDEEP:

98304:ns0LsOwWC7HHnBKp3u1f3/XDX6R00M/D331/+feIvncHy+/ItZwHk4KLf2N7xjOU:w5/fvohg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Checks Windows Trust Settings

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Executable content was dropped or overwritten

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
  • INFO

    • Creates files in the program directory

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Checks supported languages

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Sends debugging messages

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Checks proxy server information

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Reads the computer name

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Reads the machine GUID from the registry

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Reads the software policy settings

      • 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe (PID: 3648)
    • Manual execution by a user

      • msedge.exe (PID: 6704)
    • Application launched itself

      • msedge.exe (PID: 5332)
      • msedge.exe (PID: 6704)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 712)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:20 13:46:13+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 6481920
InitializedDataSize: 15864832
UninitializedDataSize: -
EntryPoint: 0x480c3f
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 19.0.36.1900
ProductVersionNumber: 19.0.36.1900
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileVersion: 19.0.36.1900
ProductVersion: 19.0.36.1900
CompanyName: Interactive Brands Malta Limited
FileDescription: PDF Suite 2021 Installer
InternalName: PDFSuite2021Installer.exe
LegalCopyright: © 2007-2021 Interactive Brands Malta Limited.
OriginalFileName: PDFSuite2021Installer.exe
ProductName: PDF Suite 2021 Installer
CommitID: 5e41b0dd597536bc51f4d3b6feae0247e7244101
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
169
Monitored processes
41
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
712"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=820 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
824"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2360 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1204"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x310,0x314,0x318,0x308,0x320,0x7ffbcadd5fd8,0x7ffbcadd5fe4,0x7ffbcadd5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2076"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3472 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3028"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4804 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3648"C:\Users\admin\Desktop\2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe" C:\Users\admin\Desktop\2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
explorer.exe
User:
admin
Company:
Interactive Brands Malta Limited
Integrity Level:
HIGH
Description:
PDF Suite 2021 Installer
Version:
19.0.36.1900
Modules
Images
c:\users\admin\desktop\2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4228"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4968 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2480 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4316"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5820 --field-trial-handle=2364,i,16478806365747304089,1178386396203029691,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
4508"C:\Users\admin\Desktop\2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe" C:\Users\admin\Desktop\2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeexplorer.exe
User:
admin
Company:
Interactive Brands Malta Limited
Integrity Level:
MEDIUM
Description:
PDF Suite 2021 Installer
Exit code:
3221226540
Version:
19.0.36.1900
Modules
Images
c:\users\admin\desktop\2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
10 770
Read events
10 687
Write events
79
Delete events
4

Modification events

(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_CURRENT_USER\SOFTWARE\PDF Suite 2021\Options\General
Operation:writeName:Send user statistics
Value:
1
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\PDF Suite 2021\Installation
Operation:writeName:INSTALL_FOLDER
Value:
C:\Program Files\PDF Suite 2021
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{BC5FA7F7-925C-4DD8-852F-16A2BF672F44}
Operation:writeName:LaunchPermission
Value:
010014804C0000005C000000140000003000000002001C0001000000110014000400000001010000000000100010000002001C0001000000000014000B0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{BC5FA7F7-925C-4DD8-852F-16A2BF672F44}
Operation:writeName:AccessPermission
Value:
010014804C0000005C000000140000003000000002001C0001000000110014000400000001010000000000100010000002001C0001000000000014000B0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\PDF Suite 2021\Links
Operation:writeName:cmp
Value:
pdfs_fre_all_en_all_all_dj
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\PDF Suite 2021\Links
Operation:writeName:country_iso2
Value:
PK
(PID) Process:(3648) 2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\PDF Suite 2021\Links
Operation:writeName:DOWNLOAD_LINK
Value:
download2021.pdf-suite.com/
Executable files
4
Suspicious files
259
Text files
78
Unknown types
4

Dropped files

PID
Process
Filename
Type
6152msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\DeferredBrowserMetrics\BrowserMetrics-67164C43-1808.pma
MD5:
SHA256:
36482024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FFbinary
MD5:C53D7F3600BA08692FCF68223FA539AC
SHA256:D88DB6DDC1A37A5C66F1598FB14DFE1369A498FF1C26FCAB50B5477A40759453
6704msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF8f891.TMP
MD5:
SHA256:
36482024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43Dbinary
MD5:FF791BBD38B16436D1E369869218A9BE
SHA256:7C871B504DD8F7433A167960C512FC228EE8EC094FC48A7DB11D9441BE0BC5BA
6704msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
36482024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_CA7D6895E4502FA5B6C104178188F313binary
MD5:67D3F51C17DC2DFB0E1D149E6A93EE45
SHA256:C1175BE6E92972C94AB0DBAF525C3385F54071CD68A6C6E2D36C16328A497B68
6704msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF8f891.TMP
MD5:
SHA256:
6704msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6704msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF8f8a1.TMP
MD5:
SHA256:
6704msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
171
TCP/UDP connections
141
DNS requests
135
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.17.245.133:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4292
RUXIMICS.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
2.17.245.133:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4292
RUXIMICS.exe
GET
200
2.17.245.133:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3648
2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
GET
200
2.23.198.32:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRp%2BmQDKauE4nIg%2FgknZHuBlLkfKgQUzolPglGqFaKEYsoxI2HSYfv4%2FngCEEEgP6R7mdMSbwVlIQVxV4Y%3D
unknown
whitelisted
3648
2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
GET
200
2.23.198.32:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCEE5A5DdU7eaMAAAAAFHTlH8%3D
unknown
whitelisted
3648
2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
GET
200
2.23.198.32:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRr2bwARTxMtEy9aspRAZg5QFhagQQUgrrWPZfOn89x6JI3r%2F2ztWk1V88CEDWvt3udNB9q%2FI%2BERqsxNSs%3D
unknown
whitelisted
GET
401
13.107.6.158:443
https://business.bing.com/api/v1/user/token/microsoftgraph?&clienttype=edge-omnibox
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4292
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
92.123.104.62:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3648
2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
104.21.57.28:443
api-updateservice.pdf-suite.com
CLOUDFLARENET
unknown
5488
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4292
RUXIMICS.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
www.bing.com
  • 92.123.104.62
  • 92.123.104.11
  • 92.123.104.5
  • 92.123.104.19
  • 92.123.104.28
  • 92.123.104.8
  • 92.123.104.67
  • 92.123.104.21
  • 92.123.104.60
  • 2.23.209.183
  • 2.23.209.186
  • 2.23.209.189
  • 2.23.209.180
  • 2.23.209.187
  • 2.23.209.185
  • 2.23.209.179
  • 2.23.209.181
  • 2.23.209.182
  • 2.23.209.154
  • 2.23.209.156
  • 2.23.209.149
  • 2.23.209.166
  • 2.23.209.160
  • 2.23.209.162
  • 2.23.209.143
  • 2.23.209.158
  • 2.23.209.150
  • 92.123.104.51
  • 92.123.104.43
  • 92.123.104.40
  • 92.123.104.32
  • 92.123.104.33
  • 92.123.104.44
  • 92.123.104.47
  • 92.123.104.49
  • 92.123.104.46
whitelisted
google.com
  • 172.217.16.206
whitelisted
api-updateservice.pdf-suite.com
  • 104.21.57.28
  • 172.67.158.191
unknown
wsgeoip.pdf-suite.com
  • 104.21.57.28
  • 172.67.158.191
unknown
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 2.17.245.133
whitelisted
ocsp.entrust.net
  • 2.23.198.32
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
paygw.pdf-suite.com
  • 64.15.159.239
unknown

Threats

PID
Process
Class
Message
Misc activity
INSTALLER [ANY.RUN] VCSoapClient Installer HTTP POST Request (UA)
Potentially Bad Traffic
ET INFO Possible Chrome Plugin install
3 ETPRO signatures available at the full report
Process
Message
2024-05-08_3c93fa27eb8c989c1a871bd8c2bc854b_avoslocker_metamorfo_revil.exe
E1021 12:42:31.550961 6716 updater.cpp:260] IsNewVersionAvailable failed. Error 60 Unable to establish SSL connection. cURL error:60 SSL peer certificate or SSH remote key was not OK