URL:

http://note.youdao.com/yws/api/personal/file/WEBd69657b362034dc5dbc8ec373a041359?method=download&inline=true&shareKey=d3c788ae34c5aac180a1bcbf1061e42e

Full analysis: https://app.any.run/tasks/e246fef0-6484-41a4-af6e-ba21cc86e052
Verdict: Malicious activity
Analysis date: December 08, 2023, 05:17:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

FF879381B86B49111BA4FBFDC091A718

SHA1:

3E68546F14F914CE7E8F9ADCD767523D35F4FC54

SHA256:

108E5E75629A4150CBF0ED876DB9D3C5A5A3C458B3C495C7E9059D441C33854E

SSDEEP:

3:N1KQbcdbDM7Hp2BmF/RUtKOKEtSAXVWsYrAojEZHDMYP:CQYdMjT/y4lCSAlWrA5dMU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 2220)
      • wmpnscfg.exe (PID: 3636)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3028)
      • iexplore.exe (PID: 1864)
    • Application launched itself

      • iexplore.exe (PID: 1864)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2220)
      • wmpnscfg.exe (PID: 3636)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2220)
      • wmpnscfg.exe (PID: 3636)
    • The process uses the downloaded file

      • iexplore.exe (PID: 1864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1864"C:\Program Files\Internet Explorer\iexplore.exe" "http://note.youdao.com/yws/api/personal/file/WEBd69657b362034dc5dbc8ec373a041359?method=download&inline=true&shareKey=d3c788ae34c5aac180a1bcbf1061e42e"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2220"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1864 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3636"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
14 416
Read events
14 361
Write events
54
Delete events
1

Modification events

(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005A010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
3
Suspicious files
13
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
3028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\律师函[1].exeexecutable
MD5:19F373847BD499E112FB3A413328A528
SHA256:E598DA1051A9A744A1E2F40936D36DAB3904BA485BBF469256444B3AF6AE602F
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5binary
MD5:03C475ACD59229559E494A66BDA1948E
SHA256:0D867DA4F17E8671E87C0D42F819E37184AD3A539768BAC54E71CCC817D724DE
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5binary
MD5:0B45930057216FBF016C85469DA9089E
SHA256:6E527D844B9ABCE7DD7C088BC6B367D093C56ED41640C0E1174C10CFF3D1CD3D
1864iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:94F0EA998FEF7EA091B7C50FE5AD9201
SHA256:272C7C70B60DA0466CB7487001E99321034EA656A76D9462C3EBEEE76E177AD2
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2der
MD5:2E7F56E78DD3CD23C426CC151E7FDB42
SHA256:477B2B4929FB55ECBA4A52A31536AA62817A1FDEC32AC8FB65EEE87C75DA6485
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2binary
MD5:B03DDA4C198B85A6D6E3A7E3D46D5A93
SHA256:198691B762DC6758390B9CF4CF018E0DE17C6A50D56002EC3D03950D4274EAA7
1864iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{14D2F797-9589-11EE-A826-12A9866C77DE}.datbinary
MD5:3508A7EA7276A5E143B9F6FDC0E26F7F
SHA256:A8358051A9DAD7CC4020AB32FB88C4EF174D9A71CD6E9D6E436E68DD1796FFC3
1864iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\律师函.exe.o9a0h0s.partial:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
1864iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:5CE146F479FC95E4E6C230C5B90038D7
SHA256:888A49DBF470546176CCBE0A940BB0EF7D34997581E21DBD9C719D09293700DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
16
DNS requests
14
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
iexplore.exe
GET
302
163.181.92.238:80
http://note.youdao.com/yws/api/personal/file/WEBd69657b362034dc5dbc8ec373a041359?method=download&inline=true&shareKey=d3c788ae34c5aac180a1bcbf1061e42e
unknown
3028
iexplore.exe
GET
200
47.246.3.20:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAsTYrbuap0%2Blokw8W4gfTk%3D
unknown
binary
471 b
3028
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?6a3142f400022d08
unknown
compressed
4.66 Kb
1864
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
3028
iexplore.exe
GET
200
47.246.3.20:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRXf%2BqAIajMnZeiQcx27p1CzET2wQUJG%2BRP4mHhw4ywkAY38VM60%2FISTICEARpHnniO1nFqCOqTkLgf1Q%3D
unknown
binary
471 b
1080
svchost.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?abdc0569852e700a
unknown
compressed
65.2 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
unknown
3028
iexplore.exe
163.181.92.238:80
note.youdao.com
Zhejiang Taobao Network Co.,Ltd
DE
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3028
iexplore.exe
180.163.207.102:443
bucket-ynote-online-cdn.note.youdao.com
China Telecom Group
CN
unknown
3028
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
unknown
3028
iexplore.exe
47.246.3.20:80
ocsp.digicert.cn
Zhejiang Taobao Network Co.,Ltd
RU
unknown
3028
iexplore.exe
114.80.179.172:443
bucket-ynote-online-cdn.note.youdao.com
China Telecom Group
CN
unknown
1864
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
unknown

DNS requests

Domain
IP
Reputation
note.youdao.com
  • 163.181.92.238
  • 163.181.92.231
  • 163.181.92.232
  • 163.181.92.233
  • 163.181.92.234
  • 163.181.92.235
  • 163.181.92.236
  • 163.181.92.237
unknown
bucket-ynote-online-cdn.note.youdao.com
  • 180.163.207.102
  • 114.80.179.172
  • 101.226.26.217
  • 222.73.33.242
  • 61.170.80.188
  • 61.170.81.204
  • 61.170.79.233
  • 180.163.207.103
  • 222.73.33.243
  • 61.170.80.189
  • 61.170.81.215
  • 222.73.33.244
  • 61.170.80.190
  • 61.170.81.231
  • 61.170.79.232
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
unknown
ocsp.digicert.cn
  • 47.246.3.20
  • 47.246.3.15
  • 47.246.3.17
  • 47.246.3.18
  • 47.246.3.22
  • 47.246.3.19
  • 47.246.3.16
  • 47.246.3.21
unknown
api.bing.com
  • 13.107.5.80
unknown
www.bing.com
  • 92.123.104.34
  • 92.123.104.52
  • 92.123.104.59
  • 92.123.104.33
  • 92.123.104.32
  • 92.123.104.60
  • 92.123.104.31
  • 92.123.104.28
unknown
iecvlist.microsoft.com
  • 152.199.19.161
unknown
r20swj13mr.microsoft.com
  • 152.199.19.161
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown

Threats

PID
Process
Class
Message
Misc activity
ET POLICY Pastebin-style service note .youdao .com in DNS query
Misc activity
ET POLICY Pastebin-style service note .youdao .com in DNS query
Misc activity
ET POLICY Pastebin-style service note .youdao .com in DNS query
Misc activity
ET POLICY Pastebin-style service (note .youdao .com) in TLS SNI
Misc activity
ET POLICY Pastebin-style service (note .youdao .com) in TLS SNI
No debug info