analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://netsecure.adp.com/pages/sms/ess/v3/pub/ssr/theme.jsp

Full analysis: https://app.any.run/tasks/30d4c4d5-d5e7-4d69-8fcf-ec3a4abada3e
Verdict: Malicious activity
Analysis date: May 06, 2021, 00:26:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

217A94B2584A97B832B743DF1293007A

SHA1:

D59114C8DCEBA8E746F0A9EBEF63A18D1C46B4BD

SHA256:

11362FE3299164F34C89478DF6DB656F90EAACB25BD83B35A3C2194A3B87B638

SSDEEP:

3:N8dLFCAEfRrFWXH9LPSn:2dFDE2H97S

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 824)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 824)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 3904)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 824)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 824)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 3904)
    • Checks supported languages

      • iexplore.exe (PID: 3904)
      • iexplore.exe (PID: 3780)
    • Reads CPU info

      • iexplore.exe (PID: 3904)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3904)
      • iexplore.exe (PID: 3780)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3780)
    • Changes internet zones settings

      • iexplore.exe (PID: 3780)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3904)
    • Application launched itself

      • iexplore.exe (PID: 3780)
    • Creates files in the user directory

      • iexplore.exe (PID: 3904)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3904)
      • iexplore.exe (PID: 3780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3780"C:\Program Files\Internet Explorer\iexplore.exe" "https://netsecure.adp.com/pages/sms/ess/v3/pub/ssr/theme.jsp"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3904"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3780 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
824C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Version:
32,0,0,453
Total events
20 685
Read events
20 527
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
20
Text files
71
Unknown types
54

Dropped files

PID
Process
Filename
Type
3904iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5887976EDAA817EEF5159B09F6FCD000_0201FED7062E45D56037A4656BE108D1binary
MD5:C33121B6ADFDCBFAED73D92A6E7CA10C
SHA256:F92614B49D7FFFBF2CF5C2D423F9BF3485BDED28B354A80A34295CF288324CFA
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:B73270CBC15A6A4BD2B37555EC9C5E4B
SHA256:984C9285BA9AE9DF5F97B90161203C75217CAF5F8B87021CEB66BDA217FE76BD
3904iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:5E0153DD84C8A7FE01D7BFE42C48A37F
SHA256:C52A1CA3167A29595EB247AD2025A4CF7E7CA8EB8CB3B2819A2B7BBA083F553C
3904iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62der
MD5:59F56C524F3C924C7421E3567A91FFB1
SHA256:0B00E5EAF205A8D63E3B17EB4ACA1387917BF2EEC602D4CE8B727906D3A34DF8
3904iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\main.ca1d3833.chunk[1].jstext
MD5:E1AAF9AC85BCDC8AB4C36E9EC6BE97AF
SHA256:19A948FF71826C8B57E0BD6896A5BB59C7D9C235AE6D6D47806A491B28AC1AB9
3904iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:659E3D0C5D48CCC01AA29DDF44A6D935
SHA256:EA0EA43616BF835B092BE9CB767526C4B7F38F03D7C14A4508F178805130A32B
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:9D09FC8C3592E5ECBFE757BFF042281E
SHA256:AF2A2760D4783384F01CF2362E1197F84E3244FB29091B7DF8A662E719C90223
3904iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:5C1E3329588508A0C33C011B23DBE6CC
SHA256:ECA683E3FBF04D311F893F7C02FD9F1A856A718D4650D1BB4D07BF313EF56C02
3904iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\6a8f894227f41759348779077d1e5851[1].jstext
MD5:60BECCF0300125CC7186C56857C59EBF
SHA256:C35D65E7674179E73270A90F8C486EFA0400272DA7FE8DC27CC1ABB7750C2ADA
3904iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5887976EDAA817EEF5159B09F6FCD000_0201FED7062E45D56037A4656BE108D1der
MD5:25CAC274F9D567C641240D0A9F20005F
SHA256:17279B6F0C718C59F41CF9DBE4B9EA7F05C15F45AE4EFA4D70F62D6D4E95EC3E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
54
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3904
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3904
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.49 Kb
whitelisted
3904
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEDvBKQuWMzhNCQAAAABiFes%3D
US
der
471 b
whitelisted
3904
iexplore.exe
GET
200
2.16.186.98:80
http://ocsp.securetrust.com//MFQwUjBQME4wTDAJBgUrDgMCGgUABBRKUAJ27jxxuy1zYtpUHfLy0MHHugQUys4dGAN3HhzzfFiymnCoCIAW9K4CEwc5n4cwQnqoOfYEj1Y8OamFCM0%3D
unknown
der
638 b
whitelisted
3904
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
3904
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3904
iexplore.exe
GET
200
2.16.186.98:80
http://ocsp.trustwave.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBQ1mI4Ww4R5LZiQ295pj4OF%2F44yyAQUyk7dWyc1Kdn27sPlU%2B%2BkwBmWHa8CEQCSuHRPcc7Q4mxyo9jV2SWy
unknown
der
1.52 Kb
whitelisted
3904
iexplore.exe
GET
200
192.124.249.22:80
http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
US
der
1.66 Kb
whitelisted
3904
iexplore.exe
GET
200
13.32.23.89:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
3904
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEATL6zK3Z1V7Es61E6avTUg%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3904
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3904
iexplore.exe
170.146.92.142:443
netsecure.adp.com
Automatic Data Processing, Inc.
US
unknown
3780
iexplore.exe
170.146.92.142:443
netsecure.adp.com
Automatic Data Processing, Inc.
US
unknown
3904
iexplore.exe
142.250.186.78:443
www.google-analytics.com
Google Inc.
US
whitelisted
3904
iexplore.exe
99.86.2.68:443
ws.audioeye.com
AT&T Services, Inc.
US
suspicious
3904
iexplore.exe
13.32.23.89:80
ocsp.rootg2.amazontrust.com
Amazon.com, Inc.
US
whitelisted
3904
iexplore.exe
2.16.186.33:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
3780
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3780
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3904
iexplore.exe
91.235.132.130:443
h.online-metrix.net
ThreatMetrix Inc.
NL
unknown

DNS requests

Domain
IP
Reputation
netsecure.adp.com
  • 170.146.92.142
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
  • 2.16.186.33
  • 2.16.186.25
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ws.audioeye.com
  • 99.86.2.68
  • 99.86.2.76
  • 99.86.2.4
  • 99.86.2.14
shared
www.google-analytics.com
  • 142.250.186.78
whitelisted
h.online-metrix.net
  • 91.235.132.130
whitelisted
o.ss2.us
  • 13.32.23.104
  • 13.32.23.16
  • 13.32.23.96
  • 13.32.23.215
whitelisted
ocsp.pki.goog
  • 142.250.74.195
whitelisted

Threats

No threats detected
No debug info