URL:

https://url.emailprotection.link/?bwTyw0dMxWKgQtqozmixkQjKFSe8jfNfZgaL36nX5kR7JfoFkvcl6lh0Q4qw3guDh_K9CtlMn21kD74LkAIdtwq7kVE9pyyUQzQ1vjNECh_U7ItX1BjsM6Ov6tLkvshxlBu-DIgqSibJgd4mVQ4Mi8bQScun6sOndRK1lDuntS2U~

Full analysis: https://app.any.run/tasks/47b84099-dad7-49f5-ba55-f1ae7d3f3971
Verdict: Malicious activity
Analysis date: January 30, 2024, 18:55:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
Indicators:
MD5:

AF9D0484F7AB2FC2665769D61D583296

SHA1:

7FD9130706AD43E25096DEA53485D465D42CA65E

SHA256:

15F31056E368666C8957AA36303BE842AF125B8426933ED85D8134E46B4059B6

SSDEEP:

6:2UfGRVg81WSyW1e2wXwO1SgwDKtS76OwVi:2UfqgMWSv9cJJSuOwVi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • iexplore.exe (PID: 1604)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
2
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe #PHISHING iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
532"C:\Program Files\Internet Explorer\iexplore.exe" "https://url.emailprotection.link/?bwTyw0dMxWKgQtqozmixkQjKFSe8jfNfZgaL36nX5kR7JfoFkvcl6lh0Q4qw3guDh_K9CtlMn21kD74LkAIdtwq7kVE9pyyUQzQ1vjNECh_U7ItX1BjsM6Ov6tLkvshxlBu-DIgqSibJgd4mVQ4Mi8bQScun6sOndRK1lDuntS2U~"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1604"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:532 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
17 433
Read events
17 342
Write events
83
Delete events
8

Modification events

(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(532) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
40
Text files
29
Unknown types
0

Dropped files

PID
Process
Filename
Type
1604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:9D4C30ABFD832BBF7FB85861282B25D6
SHA256:44B17076477347455ACEFDDDF23051038907F08B4BC009C9049EB2B370C08BCC
1604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_430EA0912164D1B129D6E1DC07C63959binary
MD5:DBAC57AC11A32211B1351D77A88CA29B
SHA256:13590C7A8B0E9E91436A3B3C09C0AA617C9FF02B16FB43BA69786879DAD7D811
1604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ZQPS0YVW.htmhtml
MD5:41322D2DF092F491E80A268C50C53B1C
SHA256:C4B828C5FE6DCC183A8006BA99701095AAFC92D581D7816C1A7C11861F2143F3
1604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\064D75DF60A1456F63CEF9F347BAA00B_FCE3E6607BCDA0B24C530EA53CB69E26binary
MD5:E9EC1735310826E8A075502D021A3C1E
SHA256:D9ED98DA7D1CB41D70A40F90474ED9E219491D6C76F9314ABDB1B016DDC92253
1604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\warning_16[1].svgimage
MD5:A85AE8B4034B1F37C7EAC2D424432210
SHA256:D894EB7917B69EE45544861A78FFB219C362889B5BD1C12974EC46B2B3C4B6AA
532iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f7ruq93\imagestore.datbinary
MD5:23F6AE2B571153291E0E2CBC85D1E8DC
SHA256:C2B6F23907C040E2130D45640BC04A7BF527EB63142CF53A3E83715273E6B3F6
532iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:5E77E40720AFA2AE959C8A64C3B1D74B
SHA256:A4726C17DA1E23C8AFA26371CDA377460DB886588D02ACB168AFBC7C85E0ECD0
1604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\notosans-bold[1].ttfbinary
MD5:6A1F7CFE6252B44B6EA1E3FBF5B6661B
SHA256:C6A598DD4930384A35990FA0C08B11381C6771C39256E51EB0A5A559A2223FD7
1604iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\notosans-semibold[1].ttfbinary
MD5:E2C2BC20049BF8FC82A94927AE111294
SHA256:43207822E8E2F03F8D25F80B886EECEC7CFF3DD3F8A8B1DF640590B86697582A
1604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\064D75DF60A1456F63CEF9F347BAA00B_FCE3E6607BCDA0B24C530EA53CB69E26binary
MD5:CED53D152AB8B18B3F066EDD40ADD658
SHA256:1F99A9B02F4C5259B8ECEA34EFE9D9E353985E071EC88123504A9294652DAF71
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
50
DNS requests
25
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1604
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
binary
724 b
unknown
1604
iexplore.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?58b09451c6662268
unknown
unknown
1604
iexplore.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?83c23cd8118a42bc
unknown
unknown
1604
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA0HeCoTP8b5pXKW4TH%2F0Xk%3D
unknown
binary
471 b
unknown
1604
iexplore.exe
GET
200
192.229.221.95:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS6FKmrgWTGr7Q8nSk4Oub50ler6QQUlE%2FUXYvkpOKmgP792PkA76O%2BAlcCEA1XXOC77tS0eA%2Fb%2B7VLZ9A%3D
unknown
binary
471 b
unknown
532
iexplore.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5565915fab5f2bac
unknown
unknown
532
iexplore.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?2f21ede4db813e6d
unknown
unknown
532
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
313 b
unknown
1604
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?a53f9281f27ec170
unknown
compressed
65.2 Kb
unknown
1604
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?035b8faa9f109581
unknown
compressed
65.2 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1604
iexplore.exe
185.64.213.245:443
url.emailprotection.link
Intermedia Technologies Company Limited
GB
unknown
1604
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
1604
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
532
iexplore.exe
185.64.213.245:443
url.emailprotection.link
Intermedia Technologies Company Limited
GB
unknown
532
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
532
iexplore.exe
104.126.37.153:443
www.bing.com
Akamai International B.V.
DE
unknown
532
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
url.emailprotection.link
  • 185.64.213.245
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
status.geotrust.com
  • 192.229.221.95
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.155
  • 104.126.37.137
  • 104.126.37.130
  • 104.126.37.171
  • 104.126.37.177
  • 104.126.37.139
  • 104.126.37.161
whitelisted
cloudflare-ipfs.com
  • 104.17.64.14
  • 104.17.96.13
malicious
x1.c.lencr.org
  • 23.192.153.142
whitelisted
x2.c.lencr.org
  • 23.192.153.142
whitelisted
ajax.googleapis.com
  • 142.250.184.234
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO Peer to Peer File Sharing Service in DNS Lookup (cloudflare-ipfs .com)
1604
iexplore.exe
Misc activity
ET INFO Peer to Peer File Sharing Service Domain in TLS SNI (cloudflare-ipfs .com)
1604
iexplore.exe
Misc activity
ET INFO Peer to Peer File Sharing Service Domain in TLS SNI (cloudflare-ipfs .com)
1604
iexplore.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Phishing domain chain detected (ipfsquery)
1604
iexplore.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
1080
svchost.exe
Misc activity
ET INFO Peer to Peer File Sharing Service in DNS Lookup (cloudflare-ipfs .com)
532
iexplore.exe
Misc activity
ET INFO Peer to Peer File Sharing Service Domain in TLS SNI (cloudflare-ipfs .com)
532
iexplore.exe
Misc activity
ET INFO Peer to Peer File Sharing Service Domain in TLS SNI (cloudflare-ipfs .com)
No debug info