URL:

www.thinkman.com

Full analysis: https://app.any.run/tasks/1793db00-c7e3-4cd6-8a9a-9e4180432a84
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 18, 2024, 09:05:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

4B3CD6F049F4405B808CB6D404BE3DC4

SHA1:

F5A4D381084C1763E839A273DE34252D4E9DA45D

SHA256:

039A336B2387D3B11F30E9578F27E546CF80BBC3B871F27120CC6055F6DACE85

SSDEEP:

3:EcLnHn:HHn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • D4.exe (PID: 2584)
      • D4.exe (PID: 4064)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3680)
      • D4.exe (PID: 4064)
    • Reads the Internet Settings

      • D4.exe (PID: 2584)
    • Application launched itself

      • D4.exe (PID: 2584)
  • INFO

    • The process uses the downloaded file

      • iexplore.exe (PID: 3936)
    • Application launched itself

      • iexplore.exe (PID: 3936)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3276)
      • iexplore.exe (PID: 3936)
    • Reads the computer name

      • D4.exe (PID: 4064)
      • D4.exe (PID: 3256)
      • D4.exe (PID: 2584)
    • Reads the machine GUID from the registry

      • D4.exe (PID: 4064)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3936)
    • Checks supported languages

      • D4.exe (PID: 2584)
      • D4.exe (PID: 3256)
      • D4.exe (PID: 4064)
    • Manual execution by a user

      • D4.exe (PID: 2584)
    • Checks proxy server information

      • D4.exe (PID: 4064)
    • Creates files in the program directory

      • D4.exe (PID: 4064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
7
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe msiexec.exe no specs vssvc.exe no specs d4.exe no specs d4.exe d4.exe

Process information

PID
CMD
Path
Indicators
Parent process
2584"C:\Program Files\D4\D4.exe" C:\Program Files\D4\D4.exeexplorer.exe
User:
admin
Company:
Thinking Man Software
Integrity Level:
MEDIUM
Description:
Dimension 4
Exit code:
0
Version:
5.31.331.0
Modules
Images
c:\program files\d4\d4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2968"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\d4time531.msi" C:\Windows\System32\msiexec.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3256"C:\Program Files\D4\D4.exe" /startserviceC:\Program Files\D4\D4.exe
D4.exe
User:
admin
Company:
Thinking Man Software
Integrity Level:
HIGH
Description:
Dimension 4
Exit code:
0
Version:
5.31.331.0
Modules
Images
c:\program files\d4\d4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3276"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3936 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3680C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3936"C:\Program Files\Internet Explorer\iexplore.exe" "www.thinkman.com"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
4064"C:\Program Files\D4\D4.exe"C:\Program Files\D4\D4.exe
services.exe
User:
SYSTEM
Company:
Thinking Man Software
Integrity Level:
SYSTEM
Description:
Dimension 4
Exit code:
0
Version:
5.31.331.0
Modules
Images
c:\program files\d4\d4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
16 950
Read events
16 650
Write events
247
Delete events
53

Modification events

(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31095059
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31095059
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3936) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
2
Suspicious files
7
Text files
14
Unknown types
2

Dropped files

PID
Process
Filename
Type
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\MRB2XEJP.htmhtml
MD5:12E75E84677550713CD2E9AF1845A5EE
SHA256:4310A9C1D0391723E5492EE255C59BF7669631BE9C721E692803BD3CA66111FC
3936iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3936iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Abinary
MD5:3C7A59D01CD75A1AD626BC37E94C07FD
SHA256:B227F2F0375FF12DD040D243686AD3804B2FC17916850DC58C166002EA81B956
3936iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:C1DAFFA1E9EED8E2DE6F609968E4B1CA
SHA256:70D5A2F145CA305A8F9924056D463F49410C4C5E45917CA0005B58E29F41ABFB
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\layout[1].csstext
MD5:AA4B56FABA69EE4DBCA5FB6E28350873
SHA256:8FEAD5FFC90E05198BAC7BF233D84D002AC09B378ACC90C69F73128A271138EC
3936iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3936iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3936iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Ader
MD5:03286F86A6340EF1EB71162CA877B4CA
SHA256:F6E395EAB531C2331F213B764ECB38E1B4A1E883299D15C1D8B688291E26F20A
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style1[1].csstext
MD5:6B9840214E417304AFA8EDF920FD67E6
SHA256:CF27865CDBEAD1B4FD94E62E9213BBEBBFCE28B0C65012818B3A1255E62755F5
3276iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\default[1].htmhtml
MD5:CBB629662CD6BD9E0311E52B2F0E536A
SHA256:45AECAB5EFCF95B0AC05AB8261E037D3B1AD4D1598F04FB4D5D2EFC281726BF0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
19
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3276
iexplore.exe
GET
200
74.208.229.157:80
http://www.thinkman.com/
unknown
html
2.94 Kb
unknown
3276
iexplore.exe
GET
200
74.208.229.157:80
http://www.thinkman.com/styles/layout.css
unknown
text
427 b
unknown
3276
iexplore.exe
GET
200
74.208.229.157:80
http://www.thinkman.com/styles/style1.css
unknown
text
2.70 Kb
unknown
3936
iexplore.exe
GET
304
92.123.135.139:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b23edf5cfbe16fd7
unknown
unknown
3276
iexplore.exe
GET
200
74.208.229.157:80
http://www.thinkman.com/dimension4/images/d4icon.jpg
unknown
image
923 b
unknown
3276
iexplore.exe
GET
200
74.208.229.157:80
http://www.thinkman.com/dimension4/default.htm
unknown
html
5.19 Kb
unknown
3276
iexplore.exe
GET
404
74.208.229.157:80
http://www.thinkman.com/images/bkgd_tile.gif
unknown
html
1.60 Kb
unknown
3936
iexplore.exe
GET
404
74.208.229.157:80
http://www.thinkman.com/favicon.ico
unknown
html
1.60 Kb
unknown
3936
iexplore.exe
GET
304
92.123.135.139:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?76ad697231f9b13b
unknown
unknown
3276
iexplore.exe
GET
74.208.229.157:80
http://www.thinkman.com/images/bkgd_tile.gif
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
3276
iexplore.exe
74.208.229.157:80
www.thinkman.com
IONOS SE
US
unknown
3936
iexplore.exe
74.208.229.157:80
www.thinkman.com
IONOS SE
US
unknown
3936
iexplore.exe
184.86.251.31:443
www.bing.com
Akamai International B.V.
DE
unknown
3936
iexplore.exe
92.123.135.139:80
ctldl.windowsupdate.com
Akamai International B.V.
NL
unknown
3936
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
3936
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted
1080
svchost.exe
92.123.135.139:80
ctldl.windowsupdate.com
Akamai International B.V.
NL
unknown
4064
D4.exe
74.208.229.157:80
www.thinkman.com
IONOS SE
US
unknown

DNS requests

Domain
IP
Reputation
www.thinkman.com
  • 74.208.229.157
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 184.86.251.9
  • 184.86.251.13
  • 184.86.251.7
  • 184.86.251.4
  • 184.86.251.5
  • 184.86.251.8
  • 184.86.251.14
  • 184.86.251.31
  • 184.86.251.11
whitelisted
ctldl.windowsupdate.com
  • 92.123.135.139
  • 92.123.135.133
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
tick.usno.navy.mil
  • 192.5.41.40
unknown

Threats

No threats detected
No debug info