analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://new.gdtot.eu/file/1361789430

Full analysis: https://app.any.run/tasks/35928a77-9a3a-447d-a970-6d49ff4909a4
Verdict: Malicious activity
Analysis date: January 09, 2022, 16:26:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

A9A0A6F9EF0B5E724BA84ADF3D74ECCB

SHA1:

0F91D4101F76A4627B8A361171A721B48157AA95

SHA256:

014876C53B5F5AA5AA825686A10A8F0F61483DFF03FDDF3CD549F6AB72CA2C33

SSDEEP:

3:N1KQ32VYOP4cRSn:CQ32Bgn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2684)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2684)
      • iexplore.exe (PID: 3004)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3004)
      • iexplore.exe (PID: 2684)
    • Changes internet zones settings

      • iexplore.exe (PID: 3004)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3004)
      • iexplore.exe (PID: 2684)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2684)
    • Checks supported languages

      • iexplore.exe (PID: 2684)
      • iexplore.exe (PID: 3004)
    • Application launched itself

      • iexplore.exe (PID: 3004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3004"C:\Program Files\Internet Explorer\iexplore.exe" "http://new.gdtot.eu/file/1361789430"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2684"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3004 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
14 516
Read events
14 397
Write events
119
Delete events
0

Modification events

(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30934389
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30934389
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
17
Text files
22
Unknown types
12

Dropped files

PID
Process
Filename
Type
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:B07C0D87951CC310555ECCFA24041449
SHA256:9F62E1C8F99D867A61945D933E6A131C378C36399B1DFFDAE5EEB0E39EB30E9B
2684iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarEC1A.tmpcat
MD5:D99661D0893A52A0700B8AE68457351A
SHA256:BDD5111162A6FA25682E18FA74E37E676D49CAFCB5B7207E98E5256D1EF0D003
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\63D3F6D0D063E897C56152CC79DA38B7binary
MD5:BBD0BAEC5C0226D56D3E374677C19252
SHA256:546B34B9A7070B795DA56C8CE5014278A5AE40FB807267BADB467B1F6C337A81
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:770AC2DC19E919628E266CF1F85EB0B4
SHA256:17D2F41D6A7640A9943236A7AEDD92ECA5C6D496F173A7E19FDFAA9F216024E6
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:7BAB5DD3EC903D8C58917D1592A4844A
SHA256:AFA6281A1F4BFABC64D10279D9E5DF54DEE2456758EA9DA82E61A44364369FFB
2684iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\get-stats2.5[1].jstext
MD5:F42ED807D746AEBDF476BC83B2A358E7
SHA256:D81B1D382650248C064F7C377563FD88CC06D0D233C4EC89514092E6AA610250
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:4F4F8F6A6CC8F20773B468DAC96EE8A1
SHA256:F359C6B7ABD3BF72C95BA7CECCF8BCBF8651F8FABBCF6B3BCCAEA50316EC84B3
2684iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\1361789430[1].htmhtml
MD5:1F97FC8C088B20A07157D500D88D0741
SHA256:1AF0DB1396DA59B86119513ADF94C80D8CFAE7DC7E3FE32018B9DC29BAB4CBFA
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\63D3F6D0D063E897C56152CC79DA38B7der
MD5:0621D82F1321FD307FCF7419B4BDB6C8
SHA256:0A59FC3A50B76533C844AE8518EECE767749B88CA8BBE957D2483FE6C03A5A6C
2684iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:77F61473BB49CDCD9AABB2E023E58A70
SHA256:FD4906E122DC3ACC589737DEF21506DB2E157C134C29A1C915B9219A17F58CF8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
60
DNS requests
30
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2684
iexplore.exe
GET
301
172.67.190.156:80
http://new.gdtot.eu/file/1361789430
US
suspicious
2684
iexplore.exe
GET
142.250.181.227:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
whitelisted
3004
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2684
iexplore.exe
GET
142.250.181.227:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCECHMNwkPtKJCCgAAAAEl%2FQo%3D
US
whitelisted
2684
iexplore.exe
GET
200
2.16.186.11:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgTC0H3RFJ0gDaNSiKlO4DM74A%3D%3D
unknown
der
503 b
shared
2684
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
2684
iexplore.exe
GET
200
142.250.181.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2684
iexplore.exe
GET
200
142.250.181.227:80
http://crl.pki.goog/gsr1/gsr1.crl
US
der
1.61 Kb
whitelisted
2684
iexplore.exe
GET
200
23.37.41.57:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
2684
iexplore.exe
GET
200
142.250.186.174:80
http://crls.pki.goog/gts1c3/moVDfISia2k.crl
US
der
6.68 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2684
iexplore.exe
104.18.10.207:443
stackpath.bootstrapcdn.com
Cloudflare Inc
US
suspicious
2684
iexplore.exe
23.32.238.178:80
ctldl.windowsupdate.com
XO Communications
US
suspicious
2684
iexplore.exe
2.16.186.11:80
r3.o.lencr.org
Akamai International B.V.
whitelisted
2684
iexplore.exe
104.16.18.94:443
cdnjs.cloudflare.com
Cloudflare Inc
US
unknown
2684
iexplore.exe
23.37.41.57:80
x1.c.lencr.org
Akamai Technologies, Inc.
NL
suspicious
2684
iexplore.exe
142.250.186.170:443
ajax.googleapis.com
Google Inc.
US
whitelisted
2684
iexplore.exe
172.67.190.156:80
new.gdtot.eu
US
unknown
2684
iexplore.exe
172.67.190.156:443
new.gdtot.eu
US
unknown
2684
iexplore.exe
216.58.212.170:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2684
iexplore.exe
104.16.122.175:443
unpkg.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
new.gdtot.eu
  • 172.67.190.156
  • 104.21.51.226
suspicious
ctldl.windowsupdate.com
  • 23.32.238.178
  • 23.32.238.201
whitelisted
x1.c.lencr.org
  • 23.37.41.57
whitelisted
r3.o.lencr.org
  • 2.16.186.11
  • 2.16.186.10
shared
ajax.googleapis.com
  • 142.250.186.170
whitelisted
unpkg.com
  • 104.16.122.175
  • 104.16.125.175
  • 104.16.126.175
  • 104.16.123.175
  • 104.16.124.175
whitelisted
stackpath.bootstrapcdn.com
  • 104.18.10.207
  • 104.18.11.207
whitelisted
cdnjs.cloudflare.com
  • 104.16.18.94
  • 104.16.19.94
whitelisted
fonts.googleapis.com
  • 216.58.212.170
whitelisted
vooshagy.net
  • 139.45.197.236
malicious

Threats

No threats detected
No debug info