analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://2no.co/2R8cX5

Full analysis: https://app.any.run/tasks/3f49f575-5126-4139-89aa-075689e5ff37
Verdict: Malicious activity
Analysis date: December 20, 2019, 20:38:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MD5:

35EF46C4C1FFBE0810702616207E8D14

SHA1:

878098D75DFAFE9F3E7995740979FCC4E7C0EAE0

SHA256:

01725E0F837E600F445E65B326AADEA2BCCF1FE45A90F550830A3B3488F0445C

SSDEEP:

3:N8L09Q:2L5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 328)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2108)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2144)
    • Creates files in the user directory

      • iexplore.exe (PID: 2108)
      • iexplore.exe (PID: 2144)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 328)
    • Changes internet zones settings

      • iexplore.exe (PID: 2108)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2144)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2108)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2108)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2108"C:\Program Files\Internet Explorer\iexplore.exe" "https://2no.co/2R8cX5"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2144"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2108 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
328C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
458
Read events
387
Write events
70
Delete events
1

Modification events

(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{C0616243-2368-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2108) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070C0005001400140027000100EC00
Executable files
0
Suspicious files
0
Text files
44
Unknown types
9

Dropped files

PID
Process
Filename
Type
2108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2108iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\1RXLA1AZ\v3rmillion_net[1].txt
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:09ADEE4BBD05B8E920FDF9D66B7DB7F1
SHA256:87E2F712304F1D8076258EEDBF52A5657F448F7E91009B7F359886DEF4976563
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:ADBE30F66BB34CBDD3139C6B00B92A53
SHA256:DD07C606114DCD8B76FF6C43DE84CC9C13A75F7E04C8AF11CE5FB3AE90EB3B86
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\1RXLA1AZ\v3rmillion_net[1].htmhtml
MD5:CF19765EFBE600BF4FEF9E1841E7B102
SHA256:990AEE09A76055D239C87E6374C0EC6174607CF55A9CDC40BAC7AEC9F4946ED3
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JBWQ2TVD\myadvertisements[1].jstext
MD5:EA740BE53942FB23C880104FBEF22C7C
SHA256:AB4F34F37F71E06A0DB5B4D1176A02DE9C6692738833EFEE85073EE20981D9CF
2144iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:B99701EE9556AEBA72DCF2B42415A6E8
SHA256:F7E19F1D08333A3F5C2B6E3A29DC607D79588E48B00B9FF713B9D0AC7EF0801C
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:08CE0DE2EFC915FE3D9CFABCB0A8AB10
SHA256:FF0935BD41EF884A9BD5228B5D1919AEB70C8A288E9245FB02BBD0CF855BC098
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\J27WD8W4\jq-min[1].jstext
MD5:B89D07097CEBE643915B66D072FF493D
SHA256:95AE69837D1633FC9EBFFEC354A9FD4D2F317355BD5AEC7E09903AE4285D4E14
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
23
DNS requests
13
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2108
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2108
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2144
iexplore.exe
172.217.22.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2108
iexplore.exe
104.27.68.104:443
v3rmillion.net
Cloudflare Inc
US
unknown
2144
iexplore.exe
172.217.16.130:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
2144
iexplore.exe
88.99.66.31:443
2no.co
Hetzner Online GmbH
DE
malicious
2144
iexplore.exe
104.27.68.104:443
v3rmillion.net
Cloudflare Inc
US
unknown
2144
iexplore.exe
209.197.3.15:443
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
2144
iexplore.exe
172.217.22.110:443
www.google-analytics.com
Google Inc.
US
whitelisted
2144
iexplore.exe
216.58.205.228:443
www.google.com
Google Inc.
US
whitelisted
2144
iexplore.exe
172.217.23.131:443
www.google.se
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
2no.co
  • 88.99.66.31
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
v3rmillion.net
  • 104.27.68.104
  • 104.27.69.104
whitelisted
fonts.googleapis.com
  • 172.217.22.42
whitelisted
maxcdn.bootstrapcdn.com
  • 209.197.3.15
whitelisted
pagead2.googlesyndication.com
  • 172.217.16.130
whitelisted
serve.v3rmillion.net
  • 104.27.68.104
  • 104.27.69.104
suspicious
fonts.gstatic.com
  • 216.58.207.67
whitelisted
www.google-analytics.com
  • 172.217.22.110
whitelisted
stats.g.doubleclick.net
  • 74.125.133.156
  • 74.125.133.157
  • 74.125.133.155
  • 74.125.133.154
whitelisted

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info