analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://5896-34-66-241-103.ngrok.io/embed.pdf

Full analysis: https://app.any.run/tasks/35efe09e-05b3-46eb-a979-56c162b4a40c
Verdict: Malicious activity
Analysis date: August 12, 2022, 18:43:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

33B1AE4304EC61656A6731CB7290378D

SHA1:

49F8DEB37B2F9F22A739B18EE0A81BDD0700DC75

SHA256:

152ECF44E1E3DF82C47BA8055FD351B23A7709DB77626FB90E049824883CA4A0

SSDEEP:

3:N8icTFuEBRMKUK/6:2iiF5BpU86

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 4016)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2984)
      • iexplore.exe (PID: 4016)
    • Checks supported languages

      • iexplore.exe (PID: 4016)
      • iexplore.exe (PID: 2984)
    • Application launched itself

      • iexplore.exe (PID: 2984)
    • Changes internet zones settings

      • iexplore.exe (PID: 2984)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2984)
      • iexplore.exe (PID: 4016)
    • Reads internet explorer settings

      • iexplore.exe (PID: 4016)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2984)
      • iexplore.exe (PID: 4016)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2984)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2984"C:\Program Files\Internet Explorer\iexplore.exe" "https://5896-34-66-241-103.ngrok.io/embed.pdf"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
4016"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2984 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
13 205
Read events
12 995
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
11
Text files
26
Unknown types
11

Dropped files

PID
Process
Filename
Type
2984iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:EE87BB11E233C12009CC11725035DBDC
SHA256:D82930A5B051B3C3F1639C24E83BDDF41D5AA66E467A0944D1AC3D59AE6330C5
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:589C442FC7A0C70DCA927115A700D41E
SHA256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\092777060E27A68FB6AF81F1E73F8D75der
MD5:76D8481F4E9139FC9F933313F089D571
SHA256:6164726E256FD1A26CA45B45692A2ED5468F732F2201B7607297F55E4B011771
2984iexplore.exeC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:658C5B79A9F3314D90BDAB9783E4DE82
SHA256:9BB69CA7D5E2D5934D71FD91F97130EE0786F72D2EAD491CE454318AC523B9C5
2984iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:E64D5C357C5873012B694EDAB30D4EA1
SHA256:FF1922D449ADBF208320C49F63137C0D964295BD32ECA18E9B321B93037E3A7D
2984iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:290A85BD3E7285CDEDA1602A9E12A7DF
SHA256:17AE86541BE373B2DB8A4B77D7E7626966637E5A6052F290A3B598A56F5123C9
4016iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab3BEB.tmpcompressed
MD5:589C442FC7A0C70DCA927115A700D41E
SHA256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
2984iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:8CA7F4F940CA73892F9035F41E4B2892
SHA256:B9216C921B36BB44D6CFEE2CAD2940E3E58C8C6D949051667EA56E27B30E1473
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:BD49CA121F21B4BF461A7B2E0B6AFA78
SHA256:07A7D2A2CE4FDBF2A6357B09658598F59D9EE948FA1BB4254BEE68A0CBA62977
2984iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\urlblockindex[1].binbinary
MD5:FA518E3DFAE8CA3A0E495460FD60C791
SHA256:775853600060162C4B4E5F883F9FD5A278E61C471B3EE1826396B6D129499AA7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
38
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2984
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
4016
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?81d2fd86d95b0dd7
US
compressed
60.2 Kb
whitelisted
4016
iexplore.exe
GET
200
2.16.186.41:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgTc5ZEkl965TtOX%2FLNW%2BcqOeA%3D%3D
unknown
der
503 b
shared
2984
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
4016
iexplore.exe
GET
200
96.16.145.230:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
2984
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
400
svchost.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9beabb7f9f24a713
US
compressed
4.70 Kb
whitelisted
4016
iexplore.exe
GET
200
2.16.186.41:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgQU3icMu4ZccREgWS4Bn2VCzg%3D%3D
unknown
der
503 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4016
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
2984
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2984
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2984
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2984
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
4016
iexplore.exe
3.22.30.40:443
5896-34-66-241-103.ngrok.io
US
malicious
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
4016
iexplore.exe
2.16.186.41:80
r3.o.lencr.org
Akamai International B.V.
whitelisted
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
2984
iexplore.exe
3.22.30.40:443
5896-34-66-241-103.ngrok.io
US
malicious

DNS requests

Domain
IP
Reputation
5896-34-66-241-103.ngrok.io
  • 3.22.30.40
malicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
x1.c.lencr.org
  • 96.16.145.230
whitelisted
r3.o.lencr.org
  • 2.16.186.41
  • 2.16.186.27
  • 2.16.186.11
  • 2.16.186.16
shared
cdn.ngrok.com
  • 3.125.102.39
  • 18.158.249.75
  • 18.192.31.165
  • 3.124.142.205
  • 3.125.223.134
  • 3.125.209.94
malicious

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
Potential Corporate Privacy Violation
ET POLICY DNS Query to a *.ngrok domain (ngrok.com)
No debug info