analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://api-0f1be1e0.duosecurity.com/frame/portal/v4/enroll?code=e17a9d6300c1deb9&akey=DANVYZJN7ILDYT4YU1LF

Full analysis: https://app.any.run/tasks/754490f0-5fec-4d12-88b9-96b7693eb910
Verdict: No threats detected
Analysis date: October 10, 2022, 09:14:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

629FF63F2ADEE7CAA2AB04D43C7508AC

SHA1:

9432EE86AB8874A6B5BC9D670FBC2649FFC0179A

SHA256:

03FECB637033457F39B192EAA2E61263D47EFB54A2850B0599CE5BB9434B72A4

SSDEEP:

3:N8DICAVL9gFKwoVKyJKTsuX6Ip2+Gynusswwj:2BwLGxogyJrY6BynuV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3300"C:\Program Files\Internet Explorer\iexplore.exe" "https://api-0f1be1e0.duosecurity.com/frame/portal/v4/enroll?code=e17a9d6300c1deb9&akey=DANVYZJN7ILDYT4YU1LF"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3584"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3300 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
Total events
16 769
Read events
16 620
Write events
147
Delete events
2

Modification events

(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30989448
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30989448
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
16
Text files
70
Unknown types
12

Dropped files

PID
Process
Filename
Type
3584iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\XA64I5SC.txttext
MD5:83EA5B7525C5848FD65AA93B436C3384
SHA256:F4C2D897661DF7A66184B980907622D24104BEBBBDAF0929AA4F1B52B9AE200E
3584iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:8D8D6A2DC5F00939E0A42EE86575BF6C
SHA256:3EA97340B1805A82D9FAD1AA7CFE9C2B15226F4F4BDB3DF066137A5EBB9C6862
3300iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:57E4D1208127835E242869727AE893F9
SHA256:BA039606D27266A37ABF6E09D8DA4BC6E2AD88FC3C55ACEB37A47457C8D6A152
3584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\Portal[1].jstext
MD5:3C1F3A8183BDE2E855D5FD979CE19D3E
SHA256:169F0D9ABE76A50BB0162F78B6F907057D909FBDED1601ADD5BE2D99D54D816B
3584iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_C1704A9CD880560A53D7E2824B17CDBAder
MD5:12921E864896BCA1BA278AD06DD700ED
SHA256:87801BA31D471C5E792CFA685E426814325BB9AE6AABAF6DE206A00AB165CD80
3300iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:8E2113DF73B1A2EB3ED452AFA0A82BC8
SHA256:56C7F6C453210500FB9F4FE5C575DF6F0A990C40E2090BC934690C4A7F3B9D5F
3584iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:056B5D2211A74F9D75D58D407DA43277
SHA256:64F8B00A353D1277507722791FABC3403D7F5F6636462D7205D6D268BF523362
3584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\enroll[1].htmhtml
MD5:B93297BE460E4B60660CD470DF2115DB
SHA256:9CFE7859863EDC91B011880AE3BF2D5B81B3E9F287026711DB7474D8F7FD07EB
3584iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_C1704A9CD880560A53D7E2824B17CDBAbinary
MD5:B95D3A62B2A8C5DD36751F544B09C630
SHA256:33CF44B751FFF8ED793B16C5C62C8A8F1775384C777551D0EB9016FA713D0B12
3584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\errors[1].jstext
MD5:AE7C16125FAF5F5B2935EA239D85644E
SHA256:D10D28962E823CD3E0A502F61CB398C9BBD7AEFA81A88EC3F336B467FE61A598
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
43
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3300
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3584
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3584
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAE6gP3ZkZRNRUEWIpuZM5A%3D
US
der
471 b
whitelisted
3300
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
3300
iexplore.exe
GET
200
13.225.84.104:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAcjXer5MDBvPSBwzcByFjM%3D
US
der
471 b
whitelisted
3300
iexplore.exe
GET
200
13.225.84.66:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
3300
iexplore.exe
GET
200
13.225.84.145:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
3300
iexplore.exe
GET
200
13.225.84.175:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3584
iexplore.exe
GET
200
67.27.157.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?800f84524ea36131
US
compressed
4.70 Kb
whitelisted
3300
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3584
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
3300
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
3584
iexplore.exe
52.19.127.204:443
api-0f1be1e0.duosecurity.com
AMAZON-02
IE
unknown
3584
iexplore.exe
67.27.157.254:80
ctldl.windowsupdate.com
LEVEL3
US
suspicious
3300
iexplore.exe
52.19.127.204:443
api-0f1be1e0.duosecurity.com
AMAZON-02
IE
unknown
3300
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
204.79.197.200:443
ieonline.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3300
iexplore.exe
13.225.84.145:80
ocsp.rootg2.amazontrust.com
AMAZON-02
US
whitelisted
3300
iexplore.exe
104.126.37.131:443
www.bing.com
Akamai International B.V.
DE
suspicious
3300
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
api-0f1be1e0.duosecurity.com
  • 52.19.127.204
unknown
ctldl.windowsupdate.com
  • 67.27.157.254
  • 8.241.11.126
  • 67.27.158.126
  • 67.27.159.126
  • 8.253.95.249
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.168
  • 104.126.37.136
  • 104.126.37.154
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.162
  • 104.126.37.161
  • 104.126.37.139
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
duo.com
  • 13.225.78.67
  • 13.225.78.89
  • 13.225.78.96
  • 13.225.78.11
whitelisted
o.ss2.us
  • 13.225.84.66
  • 13.225.84.97
  • 13.225.84.42
  • 13.225.84.68
whitelisted
ocsp.rootg2.amazontrust.com
  • 13.225.84.175
  • 13.225.84.49
  • 13.225.84.145
  • 13.225.84.13
whitelisted
ocsp.rootca1.amazontrust.com
  • 13.225.84.145
  • 13.225.84.175
  • 13.225.84.49
  • 13.225.84.13
shared
ocsp.sca1b.amazontrust.com
  • 13.225.84.104
  • 13.225.84.88
  • 13.225.84.142
  • 13.225.84.107
whitelisted

Threats

No threats detected
No debug info