URL:

https://manytoon.me

Full analysis: https://app.any.run/tasks/09ecc9f2-96aa-4e7a-ba32-7aaf670b96d2
Verdict: Malicious activity
Analysis date: July 14, 2021, 01:21:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

D76DCC149EA113C9084AB6DCC35E29B8

SHA1:

D0CEE22442420D4A8E6AC2DAE4AA8F3733555C21

SHA256:

1345BEE6C68B9D54BCE04799F5CFA8F9867519706EFB22061A574D35240EA47D

SSDEEP:

3:N8cf8An:2cfRn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3924)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 352)
      • iexplore.exe (PID: 3924)
    • Reads the computer name

      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 352)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 352)
    • Creates files in the user directory

      • iexplore.exe (PID: 3924)
    • Application launched itself

      • iexplore.exe (PID: 352)
    • Changes internet zones settings

      • iexplore.exe (PID: 352)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3924)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3924)
      • iexplore.exe (PID: 352)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
352"C:\Program Files\Internet Explorer\iexplore.exe" "https://manytoon.me"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3924"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:352 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\sechost.dll
Total events
17 318
Read events
17 190
Write events
128
Delete events
0

Modification events

(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30898254
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30898254
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(352) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
20
Text files
175
Unknown types
19

Dropped files

PID
Process
Filename
Type
3924iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\QDIZTL2E.htmhtml
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\csbwfs[1].csstext
MD5:D97757223495B1E91B6890474BE6866E
SHA256:27787B47239DF2EF92EC97A31B49A2945640B92E2B3A3379DF66F79B395CD36F
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\style[1].csstext
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\logo-mntme[1].pngimage
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\style.min[1].csstext
MD5:B5D1E2C87B60CE71C3FD90CA27073250
SHA256:2CD9DE3DD26246204749CFF259BC34E8E6A47AE5D6E4528B9B28C75D68D50CDE
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\0e21d5233170bf1b791bf6e48ee8ef40_thumb-125x180[1].jpgimage
MD5:
SHA256:
3924iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\ionicons.min[1].csstext
MD5:E4A0C4D282EA2B6B49FDEC72C12FB80F
SHA256:AE5228EB66F61B569005E5C6842E8B1A6E850357254030AEC5769D51880842EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
73
DNS requests
35
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
iexplore.exe
GET
200
104.117.200.9:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
3924
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
der
727 b
whitelisted
3924
iexplore.exe
GET
200
23.55.163.57:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
US
der
1.16 Kb
whitelisted
3924
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECECAIqYlXEzq2KDLPucq1%2B4M%3D
US
der
471 b
whitelisted
352
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3924
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
3924
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQDGabZ4cXRe1CWOGetVwTBc
US
der
472 b
whitelisted
3924
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3924
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCECxnvN4MUipXCgAAAADoMbo%3D
US
der
471 b
whitelisted
3924
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3924
iexplore.exe
104.21.64.39:443
manytoon.me
Cloudflare Inc
US
suspicious
3924
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3924
iexplore.exe
88.208.59.103:443
8016.dendrito.name
DataWeb Global Group B.V.
NL
suspicious
3924
iexplore.exe
142.250.186.72:443
www.googletagmanager.com
Google Inc.
US
suspicious
3924
iexplore.exe
172.67.74.121:443
manytoon.com
US
unknown
3924
iexplore.exe
205.185.216.10:443
a.realsrv.com
Highwinds Network Group, Inc.
US
whitelisted
3924
iexplore.exe
172.67.171.120:443
y8z5nv0slz06vj2k5vh6akv7dj2c8aj62zhj2v7zj8vp0zq7fj2gf4mv6zsb.me
US
unknown
3924
iexplore.exe
8.253.95.239:443
cdn.tsyndicate.com
Global Crossing
US
unknown
3924
iexplore.exe
104.16.95.65:443
static.cloudflareinsights.com
Cloudflare Inc
US
shared
3924
iexplore.exe
23.55.163.57:80
crl.identrust.com
Akamai International B.V.
US
unknown

DNS requests

Domain
IP
Reputation
manytoon.me
  • 104.21.64.39
  • 172.67.175.235
suspicious
ctldl.windowsupdate.com
  • 2.17.115.18
  • 23.55.58.106
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
8016.dendrito.name
  • 88.208.59.103
  • 88.208.59.102
suspicious
www.googletagmanager.com
  • 142.250.186.72
whitelisted
manytoon.com
  • 172.67.74.121
  • 104.26.7.40
  • 104.26.6.40
malicious
y8z5nv0slz06vj2k5vh6akv7dj2c8aj62zhj2v7zj8vp0zq7fj2gf4mv6zsb.me
  • 172.67.171.120
  • 104.21.29.111
unknown
a.realsrv.com
  • 205.185.216.10
  • 205.185.216.42
whitelisted
cdn.tsyndicate.com
  • 8.253.95.239
  • 8.241.9.249
  • 8.241.121.121
unknown
static.cloudflareinsights.com
  • 104.16.95.65
  • 104.16.94.65
whitelisted

Threats

No threats detected
No debug info