analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://discord.gift/8SNZdKnZv9GshAcx

Full analysis: https://app.any.run/tasks/29d1c239-c57b-4a5b-8df4-ea7c22e8beb3
Verdict: Malicious activity
Analysis date: July 12, 2020, 11:22:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

8BC5A67B080204E5005C0AEDB1FA43EE

SHA1:

3F3A0A61A709EAA3FDB5AC9F4D6955D2335A5022

SHA256:

03D2E5407ADDD9A16C709E596820771DD36A133CD033BCC3CADFBC0F530E5E65

SSDEEP:

3:N8U8XgCsd2r/BWQ1L:2UW/F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 128)
    • Changes internet zones settings

      • iexplore.exe (PID: 128)
    • Application launched itself

      • iexplore.exe (PID: 128)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 128)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1920)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 1920)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 128)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 128)
    • Changes settings of System certificates

      • iexplore.exe (PID: 128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Program Files\Internet Explorer\iexplore.exe" "https://discord.gift/8SNZdKnZv9GshAcx"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1920"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:128 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
5 997
Read events
786
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
19
Text files
35
Unknown types
15

Dropped files

PID
Process
Filename
Type
1920iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab93D8.tmp
MD5:
SHA256:
1920iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar93D9.tmp
MD5:
SHA256:
128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1920iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9Fbinary
MD5:6711C211E38D4691DEB7223AAE89BA84
SHA256:EF546AD42742174A6A43E74D3D8A964FE7EAEB8B8BB3B768229B41CFA1D3CAA0
1920iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\76bd2968eb67d2ad350f[1].jstext
MD5:9A5E61AF2AF683E91DF2FD70128A44BA
SHA256:06CDE772CA11A4B48640135F92EA725343C5648F8D7C8CD3B7C9A6D6ED00A84E
1920iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:8AFBED9A6BDED237393F46977C0B8CED
SHA256:6D8082BBD613CE2819843B3EAF0A999F164C64B52B4EE50E8B95F2B726EE2D29
1920iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\8SNZdKnZv9GshAcx[1].htmhtml
MD5:923245A2C1663A4817FD4BC9B1C8A0E6
SHA256:F27A089092688015D5728C366812F76743BF40ACFF3F029057DABBF9B41E124F
1920iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\0.db5626825d070a6a4213[1].csstext
MD5:2199F27827FB1661221502A32D934D62
SHA256:3E1872D206D3E492A9EDEAE05F4CEE1D7FD54BEB33AD5DEF97C081C4B6D9EA0C
1920iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4der
MD5:F4C6C77E8E492F2C1EF6C329B6865017
SHA256:CBD71E5DB6EAA8951101C7ABBA75E6E6CEE58E3500090F9C48D0EC2E9D98F0EE
1920iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9Fder
MD5:417E621497F3757E9E2C9D3C28DAA526
SHA256:791A5E4E5DD163FBDF17DDD04D983FA01885C5374D6D34FA1835B08D02AF4B0E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
25
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1920
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEBblhnjgcJQ5S9%2FbTvymO98%3D
US
der
471 b
whitelisted
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
471 b
whitelisted
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
471 b
whitelisted
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEAOfbdv2KDFyFu%2B3vE5hAe0%3D
US
der
279 b
whitelisted
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEAOfbdv2KDFyFu%2B3vE5hAe0%3D
US
der
279 b
whitelisted
1920
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEBblhnjgcJQ5S9%2FbTvymO98%3D
US
der
471 b
whitelisted
1920
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca4.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrJdiQ%2Ficg9B19asFe73bPYs%2BreAQUdXGnGUgZvJ2d6kFH35TESHeZ03kCEFslzmkHxCZVZtM5DJmpVK0%3D
US
der
312 b
whitelisted
1920
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca4.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrJdiQ%2Ficg9B19asFe73bPYs%2BreAQUdXGnGUgZvJ2d6kFH35TESHeZ03kCEFslzmkHxCZVZtM5DJmpVK0%3D
US
der
312 b
whitelisted
128
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
128
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
128
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1920
iexplore.exe
162.159.136.232:443
discord.com
Cloudflare Inc
shared
1920
iexplore.exe
151.139.128.14:80
ocsp.comodoca.com
Highwinds Network Group, Inc.
US
suspicious
1920
iexplore.exe
172.67.222.182:443
discord.gift
US
malicious
128
iexplore.exe
162.159.136.232:443
discord.com
Cloudflare Inc
shared
128
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
128
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
discord.gift
  • 172.67.222.182
  • 104.31.68.4
  • 104.31.69.4
unknown
ocsp.digicert.com
  • 93.184.220.29
whitelisted
discord.com
  • 162.159.136.232
  • 162.159.137.232
  • 162.159.138.232
  • 162.159.135.232
  • 162.159.128.233
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.comodoca.com
  • 151.139.128.14
whitelisted
ocsp.comodoca4.com
  • 151.139.128.14
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info