URL:

http://www.freeintertv.com

Full analysis: https://app.any.run/tasks/bfdcee02-965d-48ea-91f2-c2f8dc1d298e
Verdict: Malicious activity
Analysis date: June 20, 2021, 03:48:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

37EA2A972B14FA2E167A60079F630BD7

SHA1:

273EBC4216B541AC49DDC9D40FEC5A22F6E8BB61

SHA256:

0E3887FBAC60CAD3B7BAA644E52DC3F81E10A75919438C3C882474FEFE6308AF

SSDEEP:

3:N1KJS4L9RTLK:Cc43T2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 3960)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3304)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3304)
    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3304)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3304)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3960)
    • Reads the computer name

      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 3960)
    • Checks supported languages

      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 3960)
    • Changes internet zones settings

      • iexplore.exe (PID: 3960)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3960)
      • iexplore.exe (PID: 3048)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3048)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 3960)
    • Creates files in the user directory

      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 3960)
    • Reads CPU info

      • iexplore.exe (PID: 3048)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3960)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3048"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3960 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3304C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Exit code:
0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3960"C:\Program Files\Internet Explorer\iexplore.exe" "http://www.freeintertv.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
22 767
Read events
22 525
Write events
240
Delete events
2

Modification events

(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30893447
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30893447
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3960) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
24
Text files
338
Unknown types
59

Dropped files

PID
Process
Filename
Type
3048iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\2KPY6E3J.txttext
MD5:
SHA256:
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\RA8MRHU0.htmhtml
MD5:
SHA256:
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\styleview[1].csstext
MD5:BFAC48882DC5E028E0C43539045899C6
SHA256:06F75116B286D40552277F108A0AACB6F9368491237098DE110F3E92ECCB5E60
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style[1].csstext
MD5:4426C364C3D68691BC45844DA3930038
SHA256:11AC47807456C44209F577933E4CF130FA593E5013C315387BBB6929F7FB71D5
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\style_new_8[1].csstext
MD5:054A1665B034D03BD034758F3060C893
SHA256:59172B97782357D6DD9E324FC12507B930FEC38256D11AABE37C9FEC7A8F868E
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\main[1].csstext
MD5:E2A948EFA7EEC0C5329F500ED1558008
SHA256:5F52EA562EC95A197E2765601D390D401D379C2C144FA8D3AA58E08090A0269A
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jquery.fancybox.min[1].csstext
MD5:A2D42584292F64C5827E8B67B1B38726
SHA256:5736E3EEC0C34BFC288854B7B8D2A8F1E22E9E2E7DAE3C8D1AD5DFB2D4734AD0
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jquery.auto-complete[1].csstext
MD5:A332F8EBFAEC00A218C96BD3A9D2041B
SHA256:5476A5733F56FCC1F4B53AFBDAF78414C6DB59506E1B05EC64B0408FC64EB2B3
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\scrollable-horizontal_2[1].csstext
MD5:11775F0CC3513EF63FB8D0F6B9E3AAA8
SHA256:0D51270904A0DE310F47D7326FEBFD3689346EA6E69D43746168D85E18279E7A
3048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style_new_1[1].csstext
MD5:F3EF3FA258E62942DDABF5688EB984FA
SHA256:B44BFD77882FB2EBD48588006C819795F62DD4367ABE51722F9BFCF92A76C601
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
230
TCP/UDP connections
95
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3048
iexplore.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDtYXXAWBjSqwoAAAAA2PRf
US
der
472 b
whitelisted
3048
iexplore.exe
GET
200
95.183.8.56:80
http://www.freeintertv.com/View/
RU
html
14.3 Kb
whitelisted
3048
iexplore.exe
GET
200
23.45.105.185:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
3048
iexplore.exe
GET
200
95.183.8.56:80
http://www.freeintertv.com/css/list_1.css
RU
text
2.30 Kb
whitelisted
3048
iexplore.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3048
iexplore.exe
GET
200
2.16.186.10:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
unknown
der
1.16 Kb
whitelisted
3960
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3048
iexplore.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3048
iexplore.exe
GET
200
2.16.186.25:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?713794a5b968eaf6
unknown
compressed
4.70 Kb
whitelisted
3048
iexplore.exe
GET
302
88.212.201.198:80
http://counter.yadro.ru/hit?r;s1280*720*24;uhttp%3A//www.freeintertv.com/;hWatch%20live%20online%20TV%20channels%20broadcasting%20on%20the%20Internet%20-%20Free%20TV%20from%20all%20over%20the%20world;0.8376714487838639
RU
html
32 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3048
iexplore.exe
95.183.8.56:80
www.freeintertv.com
Internet-Hosting Ltd
RU
unknown
3048
iexplore.exe
216.58.212.142:443
www.youtube.com
Google Inc.
US
whitelisted
3048
iexplore.exe
88.212.201.198:80
counter.yadro.ru
United Network LLC
RU
suspicious
3048
iexplore.exe
88.212.201.198:443
counter.yadro.ru
United Network LLC
RU
suspicious
3960
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3048
iexplore.exe
2.16.186.25:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
3960
iexplore.exe
2.16.186.25:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
3048
iexplore.exe
2.16.186.10:80
crl.identrust.com
Akamai International B.V.
whitelisted
3960
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3048
iexplore.exe
23.45.105.185:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
www.freeintertv.com
  • 95.183.8.56
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.youtube.com
  • 216.58.212.142
  • 142.250.185.78
  • 172.217.16.142
  • 142.250.185.110
  • 142.250.185.142
  • 142.250.185.174
  • 142.250.185.206
  • 142.250.185.238
  • 142.250.181.238
  • 216.58.212.174
  • 142.250.74.206
  • 142.250.186.46
  • 142.250.186.78
  • 142.250.186.110
  • 142.250.186.142
  • 142.250.186.174
whitelisted
counter.yadro.ru
  • 88.212.201.198
  • 88.212.201.204
  • 88.212.201.210
  • 88.212.201.216
whitelisted
ctldl.windowsupdate.com
  • 2.16.186.25
  • 2.16.186.33
whitelisted
ocsp.pki.goog
  • 172.217.16.131
whitelisted
crl.identrust.com
  • 2.16.186.10
  • 2.16.186.27
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
x1.c.lencr.org
  • 23.45.105.185
whitelisted

Threats

No threats detected
No debug info