URL:

www.wicar.org/test-malware.html

Full analysis: https://app.any.run/tasks/499d1b7d-3a54-41bd-84b4-895454ad5be2
Verdict: Malicious activity
Analysis date: October 19, 2023, 04:05:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
eicar
Indicators:
SHA1:

6398D01FFFF9A563DE6FE5BF5D5327A8F7B79B62

SHA256:

0073A1A2A1579FE63B9BBDD2EF0350E791773B0EE4DD7CF9894E0A0845511938

SSDEEP:

3:EHYf9OkIJn:ZoBJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • The EICAR Standard Anti-Virus Test File is detected

      • iexplore.exe (PID: 3692)
      • iexplore.exe (PID: 1884)
    • Drops the executable file immediately after the start

      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 3684)
      • jre-8u391-windows-au.exe (PID: 2600)
      • msiexec.exe (PID: 2016)
    • Application was dropped or rewritten from another process

      • jre-8u391-windows-au.exe (PID: 3684)
      • jre-8u391-windows-au.exe (PID: 2600)
      • LZMA_EXE (PID: 3728)
      • LZMA_EXE (PID: 1980)
    • Loads dropped or rewritten executable

      • msiexec.exe (PID: 948)
  • SUSPICIOUS

    • Checks for Java to be installed

      • jp2launcher.exe (PID: 2688)
      • javaw.exe (PID: 312)
      • javaw.exe (PID: 1920)
      • javaw.exe (PID: 3980)
      • jucheck.exe (PID: 3356)
      • jp2launcher.exe (PID: 1796)
    • Checks Windows Trust Settings

      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 2600)
      • msiexec.exe (PID: 2016)
    • Reads security settings of Internet Explorer

      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 2600)
    • Reads settings of System Certificates

      • jucheck.exe (PID: 3356)
      • jp2launcher.exe (PID: 1796)
      • jre-8u391-windows-au.exe (PID: 2600)
    • Reads Microsoft Outlook installation path

      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 2600)
    • Reads Internet Explorer settings

      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 2600)
    • Reads the Internet Settings

      • jp2launcher.exe (PID: 1796)
      • jre-8u391-windows-au.exe (PID: 2600)
      • jucheck.exe (PID: 3356)
    • Starts application with an unusual extension

      • jre-8u391-windows-au.exe (PID: 2600)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 2016)
  • INFO

    • Checks supported languages

      • javaw.exe (PID: 312)
      • jp2launcher.exe (PID: 2688)
      • javaw.exe (PID: 1920)
      • javaw.exe (PID: 3980)
      • jucheck.exe (PID: 3356)
      • jp2launcher.exe (PID: 1796)
      • jre-8u391-windows-au.exe (PID: 2600)
      • jre-8u391-windows-au.exe (PID: 3684)
      • javaws.exe (PID: 1876)
      • LZMA_EXE (PID: 1980)
      • LZMA_EXE (PID: 3728)
      • msiexec.exe (PID: 948)
      • msiexec.exe (PID: 2016)
    • Reads the computer name

      • javaw.exe (PID: 312)
      • javaw.exe (PID: 1920)
      • javaw.exe (PID: 3980)
      • jp2launcher.exe (PID: 1796)
      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 2600)
      • jre-8u391-windows-au.exe (PID: 3684)
      • msiexec.exe (PID: 2016)
      • msiexec.exe (PID: 948)
    • The process uses the downloaded file

      • iexplore.exe (PID: 1884)
      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3428)
    • Create files in a temporary directory

      • javaw.exe (PID: 312)
      • javaw.exe (PID: 1920)
      • javaw.exe (PID: 3980)
      • jre-8u391-windows-au.exe (PID: 3684)
      • jucheck.exe (PID: 3356)
      • jp2launcher.exe (PID: 1796)
    • Creates files in the program directory

      • javaw.exe (PID: 312)
    • Application launched itself

      • iexplore.exe (PID: 1884)
      • msiexec.exe (PID: 2016)
      • chrome.exe (PID: 3748)
    • Reads the machine GUID from the registry

      • jp2launcher.exe (PID: 1796)
      • jucheck.exe (PID: 3356)
      • jre-8u391-windows-au.exe (PID: 2600)
      • msiexec.exe (PID: 2016)
      • msiexec.exe (PID: 948)
    • Creates files or folders in the user directory

      • jp2launcher.exe (PID: 1796)
      • jucheck.exe (PID: 3356)
      • LZMA_EXE (PID: 1980)
      • LZMA_EXE (PID: 3728)
      • jre-8u391-windows-au.exe (PID: 2600)
    • Checks proxy server information

      • jucheck.exe (PID: 3356)
      • jp2launcher.exe (PID: 1796)
      • jre-8u391-windows-au.exe (PID: 2600)
    • Manual execution by a user

      • chrome.exe (PID: 3748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
84
Monitored processes
37
Malicious processes
9
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe iexplore.exe ntvdm.exe no specs iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs jp2launcher.exe no specs jp2launcher.exe no specs javaw.exe no specs icacls.exe no specs javaw.exe no specs javaw.exe no specs jucheck.exe no specs jucheck.exe javaws.exe no specs jp2launcher.exe jre-8u391-windows-au.exe jre-8u391-windows-au.exe lzma_exe no specs lzma_exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msiexec.exe no specs msiexec.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
312"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_2\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.11.271.2" "update"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exejp2launcher.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
844"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1884 CREDAT:1840409 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
948C:\Windows\system32\MsiExec.exe -Embedding 71961B2951F4E1B68117C143DCDC42B1C:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1796"C:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_271" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZhC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exe
javaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\java\jre1.8.0_271\bin\msvcp140.dll
c:\program files\java\jre1.8.0_271\bin\vcruntime140.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-crt-runtime-l1-1-0.dll
c:\program files\java\jre1.8.0_271\bin\ucrtbase.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-localization-l1-2-0.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-processthreads-l1-1-1.dll
1876"C:\Program Files\Java\jre1.8.0_271\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdateC:\Program Files\Java\jre1.8.0_271\bin\javaws.exejucheck.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Start Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaws.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ole32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\oleaut32.dll
1884"C:\Program Files\Internet Explorer\iexplore.exe" "www.wicar.org/test-malware.html"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1920"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_2\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.timestamp.11.271.2" "1697688583"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exejp2launcher.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1980"C:\Users\admin\AppData\LocalLow\Oracle\Java\jre1.8.0_391\LZMA_EXE" d "C:\Users\admin\AppData\LocalLow\Oracle\Java\jre1.8.0_391\au.msi" "C:\Users\admin\AppData\LocalLow\Oracle\Java\jre1.8.0_391\msi.tmp"C:\Users\admin\AppData\LocalLow\Oracle\Java\jre1.8.0_391\LZMA_EXEjre-8u391-windows-au.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\locallow\oracle\java\jre1.8.0_391\lzma_exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msctf.dll
2016C:\Windows\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\msiexec.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2076"C:\PROGRA~1\Java\JRE18~1.0_2\bin\jp2launcher.exe" -sjedC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exeiexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
LOW
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
Total events
43 407
Read events
43 006
Write events
377
Delete events
24

Modification events

(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1884) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
13
Suspicious files
134
Text files
96
Unknown types
0

Dropped files

PID
Process
Filename
Type
2828iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:F3441B8572AAE8801C04F3060B550443
SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF
2828iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
2828iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:60FE01DF86BE2E5331B0CDBE86165686
SHA256:C08CCBC876CD5A7CDFA9670F9637DA57F6A1282198A9BC71FC7D7247A6E5B7A8
2828iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarCBBB.tmpbinary
MD5:9441737383D21192400ECA82FDA910EC
SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5
2828iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:66BD8185C28267537CB7D694F2A29521
SHA256:DA02B99C5A8EC965372D01632E3F0443958499492E94EFD51FF552441C922E85
2828iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:237C0371D8737B699D6C8E624806E37E
SHA256:5E5BB5A6ECD6D4A4EEF259E261A1EA42DA46FE30F37E7ED655B859BD07FBFD61
2828iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:0D20DB1D06F41F737E326D66069FDBFB
SHA256:993AEE52EE14B79350D294105735C6102FA70CB0C91F013B03CB9F24E9A41511
1884iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53binary
MD5:5754774738BBA4A5EEB18F2C156B2426
SHA256:48AB38FC83B47674743522C94B5960C91B0CEEDBCE74274F8721E1D86AAE53AD
1884iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
1884iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
38
TCP/UDP connections
89
DNS requests
57
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2612
iexplore.exe
GET
304
208.94.116.21:80
http://malware.wicar.org/data/ms05_054_onload.html
unknown
unknown
2828
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?f8f3bf607e1d79ae
unknown
compressed
61.6 Kb
unknown
2828
iexplore.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/rootr3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEH3wUWDKXSh7Z3b6AuDWurw%3D
unknown
binary
1.40 Kb
unknown
2828
iexplore.exe
GET
301
199.34.228.69:80
http://www.wicar.org/test-malware.html
unknown
html
402 b
unknown
2828
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7147a541e8aecbd1
unknown
compressed
4.66 Kb
unknown
2828
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
unknown
binary
724 b
unknown
2828
iexplore.exe
GET
200
95.101.54.107:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgSQn%2Fd2OgNAByEgB1BlW8pG1w%3D%3D
unknown
binary
503 b
unknown
2828
iexplore.exe
GET
200
23.37.41.57:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
2828
iexplore.exe
GET
301
13.32.99.29:80
http://w.sharethis.com/button/buttons.js
unknown
html
167 b
unknown
1884
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2828
iexplore.exe
199.34.228.69:80
www.wicar.org
WEEBLY
US
unknown
2828
iexplore.exe
199.34.228.69:443
www.wicar.org
WEEBLY
US
unknown
2828
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
2828
iexplore.exe
23.37.41.57:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
2828
iexplore.exe
95.101.54.107:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown
2828
iexplore.exe
151.101.193.46:443
cdn2.editmysite.com
FASTLY
US
unknown
2828
iexplore.exe
13.32.99.29:80
w.sharethis.com
AMAZON-02
US
unknown
2828
iexplore.exe
142.250.185.104:443
www.googletagmanager.com
GOOGLE
US
unknown
2828
iexplore.exe
13.32.99.29:443
w.sharethis.com
AMAZON-02
US
unknown
2828
iexplore.exe
104.18.20.226:80
ocsp2.globalsign.com
CLOUDFLARENET
shared

DNS requests

Domain
IP
Reputation
www.wicar.org
  • 199.34.228.69
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
x1.c.lencr.org
  • 23.37.41.57
whitelisted
r3.o.lencr.org
  • 95.101.54.107
  • 2.16.202.121
shared
cdn2.editmysite.com
  • 151.101.193.46
  • 151.101.1.46
  • 151.101.129.46
  • 151.101.65.46
whitelisted
w.sharethis.com
  • 13.32.99.29
  • 13.32.99.127
  • 13.32.99.10
  • 13.32.99.2
shared
www.googletagmanager.com
  • 142.250.185.104
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp.pki.goog
  • 142.250.186.67
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted

Threats

PID
Process
Class
Message
2612
iexplore.exe
A Network Trojan was detected
ET EXPLOIT Metasploit Random Base CharCode JS Encoded String
844
iexplore.exe
A Network Trojan was detected
ET EXPLOIT Metasploit Random Base CharCode JS Encoded String
844
iexplore.exe
A Network Trojan was detected
ET EXPLOIT Metasploit Random Base CharCode JS Encoded String
1796
jp2launcher.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 1.8.x Detected
1796
jp2launcher.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 1.8.x Detected
1 ETPRO signatures available at the full report
No debug info