File name:

FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe

Full analysis: https://app.any.run/tasks/8a5ad63e-1cb7-4b1c-a2a1-292ecf200d16
Verdict: Malicious activity
Threats:

DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.

Analysis date: May 10, 2025, 03:29:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
stealer
evasion
smtp
darkcloud
upx
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

36E1BBCB5B07653ECE980904BE081DD0

SHA1:

AC12714DB26C9093F2AAD828F6C4A1E11C84B6FC

SHA256:

F4484AEDB6BCC06405642DD598C025C97F57C26267CF1D59DDC607D5C2C41626

SSDEEP:

768:D1oGOOOOOOOOOOOOOOOOOOOJXq3yyUOzLNpYAFSlSjSTL/G:JoFBG5pYAFKlT7G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 904)
      • hLevel.exe (PID: 4980)
    • DARKCLOUD has been detected (YARA)

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Stealers network behavior

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Create files in the Startup directory

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6768)
    • Checks for external IP

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Connects to the server without a host name

      • hLevel.exe (PID: 904)
    • Uses TASKKILL.EXE to kill Browsers

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Connects to SMTP port

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Found regular expressions for crypto-addresses (YARA)

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Reads security settings of Internet Explorer

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
  • INFO

    • Creates files or folders in the user directory

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Reads the computer name

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 904)
    • Checks proxy server information

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • hLevel.exe (PID: 904)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Auto-launch of the file from Startup directory

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
    • Disables trace logs

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • hLevel.exe (PID: 904)
    • Manual execution by a user

      • wscript.exe (PID: 6768)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 4980)
    • Checks supported languages

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 904)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
    • Reads the machine GUID from the registry

      • hLevel.exe (PID: 904)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Reads the software policy settings

      • slui.exe (PID: 5596)
    • UPX packer has been detected

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:09 14:18:24+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 5632
InitializedDataSize: 70144
UninitializedDataSize: -
EntryPoint: 0x345e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.5.3.0
ProductVersionNumber: 5.5.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: GyOnboarding
CompanyName: Helpfeel Inc.
FileDescription: GyOnboarding
FileVersion: 5.5.3.0
InternalName: ref037.exe
LegalCopyright: Copyright © 2023 Gyazo Team at Helpfeel Inc.
LegalTrademarks: Gyazo
OriginalFileName: ref037.exe
ProductName: GyOnboarding
ProductVersion: 5.5.3.0
AssemblyVersion: 5.5.3.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
11
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start final payment soa - superyatch interiors.exe #DARKCLOUD final payment soa - superyatch interiors.exe sppextcomobj.exe no specs slui.exe wscript.exe no specs hlevel.exe hlevel.exe no specs taskkill.exe no specs conhost.exe no specs outlook.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904"C:\Users\admin\AppData\Roaming\hLevel.exe" C:\Users\admin\AppData\Roaming\hLevel.exe
wscript.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Exit code:
4294967295
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\roaming\hlevel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3884\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4428"C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe" C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
explorer.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Exit code:
4294967295
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\local\temp\final payment soa - superyatch interiors.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4980"C:\Users\admin\AppData\Roaming\hLevel.exe"C:\Users\admin\AppData\Roaming\hLevel.exeexplorer.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Exit code:
3221225496
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\roaming\hlevel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
4980taskkill /f /im chrome.exeC:\Windows\SysWOW64\taskkill.exeFINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5228C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5392C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5608"C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" -EmbeddingC:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5740"C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe"C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
explorer.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\local\temp\final payment soa - superyatch interiors.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
Total events
9 518
Read events
9 152
Write events
330
Delete events
36

Modification events

(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
12
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
5608OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook1.pst
MD5:
SHA256:
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\WebDatabinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\6DDFBA25-70F2-43EF-A25B-7943DED3CFADxml
MD5:C3598E955A3B30446F87DC01A07F2FE2
SHA256:62D9F481E3DA3753948E23CA7E2BCEFA55A7C925B25DF2B51A3C341D0B03F4C2
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-shmbinary
MD5:E87AD948370F3CFB2BDBFA35E62FF0F7
SHA256:D92BD98526A8008FA3D9A71C5A16D915988EE494028C59B1926B69BC8798372E
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\LoginDatabinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
4428FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hLevel.vbstext
MD5:E4482E77AAA0AD4ED160B1DCFCD1EAEF
SHA256:32A7FAC895747AB53745171A6E5C2E2DF905C4861CECAE82CD47FC8A87172411
5608OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\~Outlook1.pst.tmpbinary
MD5:B60DB5DA97E3387783017BAD2ED21E7F
SHA256:6C644CA80422C10696C5050AE4B92A8A883B964AE69F5EBFE91367A76C0E6EFE
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:973515540BBC0C14E9B7224A83A6F383
SHA256:9958232E54E8B12522A9E81F8DCD12D9DBDE2686C2B0A37E721AB826E8118FF1
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TableViewPreviewPrefs_2_A3044FA2AAA79744B1E3EB61A863EBB5.datxml
MD5:0E092DB99AEE99FDFF9B5B222C732CFD
SHA256:D1614AD99ADED9F6F5C1BE7FE7FFA5124BD04A526580DA3818EA8A954E852AA6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
33
DNS requests
20
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
904
hLevel.exe
GET
200
3.72.88.224:80
http://3.72.88.224/f1/Yfgdlydfyrs.wav
unknown
unknown
6572
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6572
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
GET
200
162.55.60.2:80
http://showip.net/
unknown
shared
4428
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
GET
200
3.72.88.224:80
http://3.72.88.224/f1/Yfgdlydfyrs.wav
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4428
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
3.72.88.224:80
AMAZON-02
DE
unknown
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
904
hLevel.exe
3.72.88.224:80
AMAZON-02
DE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.20
  • 20.190.160.3
  • 20.190.160.67
  • 20.190.160.65
  • 40.126.32.140
  • 20.190.160.66
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
showip.net
  • 162.55.60.2
shared
juguly.shop
  • 203.161.48.208
unknown
officeclient.microsoft.com
  • 52.109.28.46
whitelisted

Threats

PID
Process
Class
Message
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
Attempted Information Leak
ET INFO IP Check Domain (showip in HTTP Host)
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
A Network Trojan was detected
STEALER [ANY.RUN] DarkCloud External IP Check
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
Device Retrieving External IP Address Detected
ET HUNTING [ANY.RUN] DARKCLOUD Style External IP Check
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
No debug info