analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

message_zdm.html

Full analysis: https://app.any.run/tasks/be1632fe-1f16-4dcb-b96d-bd400e0ca304
Verdict: Malicious activity
Analysis date: October 20, 2020, 03:40:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines, with CRLF line terminators
MD5:

F567CEB56E93F1574D50BAF0EC2B75DF

SHA1:

8691502103334B1A9FB3F241A34F70B5357B7732

SHA256:

1995795C8207E22EFB585E7186D62890C4F4DB48B2E9212EFBB9D30328232E1B

SSDEEP:

384:MPwXsoQszIQh/+L9eSITeCGyzdWJRYCY624FWH/zRClI3jMWcEaV2:M6J/NSITNWJ9Y624FM/zRClI3jMWcE02

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3072)
      • iexplore.exe (PID: 2780)
    • Changes internet zones settings

      • iexplore.exe (PID: 3072)
    • Application launched itself

      • iexplore.exe (PID: 3072)
      • iexplore.exe (PID: 2888)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2888)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2888)
      • iexplore.exe (PID: 3072)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2888)
      • iexplore.exe (PID: 3072)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2888)
      • iexplore.exe (PID: 3072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

ContentType: text/html;charset=UTF-8
Description: SecureMail
Robots: noindex, nofollow
viewport: width=device-width, initial-scale=1.0, maximum-scale=1.0
VoltageZFRVersion: 3
VoltageZFRType: VoltageZFRMsg
Title: JPMorgan Chase
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3072"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\message_zdm.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2888"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3072 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2780"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3072 CREDAT:333057 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
2 255
Read events
2 164
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
45
Text files
9
Unknown types
21

Dropped files

PID
Process
Filename
Type
2888iexplore.exeC:\Users\admin\AppData\Local\Temp\Cab6007.tmp
MD5:
SHA256:
2888iexplore.exeC:\Users\admin\AppData\Local\Temp\Tar6008.tmp
MD5:
SHA256:
2888iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_994B5C515D64A296EABD42B0A2E46349binary
MD5:BD0A53D09AAB42199CE87CE506F3A6C5
SHA256:5864F013DE4EE3DA37BB183EB0FC931C7DE67C3853C39C9954BB57C8A0BC4F42
2888iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_994B5C515D64A296EABD42B0A2E46349der
MD5:52576FF1153DBFCC653C5103CDFE3EC5
SHA256:111C2B3BC19D9299C2BA2484D944C6BC2AD05BF0CFD17419965DE21C40888B8E
3072iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2888iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC904.tmp
MD5:
SHA256:
3072iexplore.exeC:\Users\admin\AppData\Local\Temp\CabDD07.tmp
MD5:
SHA256:
3072iexplore.exeC:\Users\admin\AppData\Local\Temp\TarDD08.tmp
MD5:
SHA256:
2888iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D8A5A4A0441F7653C3609E0E2DE6769F_A436E92D0CB7B112AA6C185BAF9AF147der
MD5:5299E9CA7E53823A5D7F17C883804635
SHA256:FC8855066EC58BF8C50F6D5698381AC7FBB26EF5940BD28467F120B2F4B98270
2888iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D8A5A4A0441F7653C3609E0E2DE6769F_A436E92D0CB7B112AA6C185BAF9AF147binary
MD5:99763D9FE0D88E999BC0A3F8A39F908A
SHA256:4538B905DAE7FB88FF93AB51676624C8ADAC3F040367D347F1397D12EE3B2B45
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
31
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDGGh59IAAAAAUdNmpg%3D%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDGGh59IAAAAAUdNmpg%3D%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDGGh59IAAAAAUdNmpg%3D%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDGGh59IAAAAAUdNmpg%3D%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDGGh59IAAAAAUdNmpg%3D%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDGGh59IAAAAAUdNmpg%3D%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQnuEQcScL%2FkljKed%2BRzpzFYOq9kwQUw%2FfQtSowra8NkSFwOVTdvIlwxzoCECWRPZo5X0qEH2bGfU7veQo%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQnuEQcScL%2FkljKed%2BRzpzFYOq9kwQUw%2FfQtSowra8NkSFwOVTdvIlwxzoCECWRPZo5X0qEH2bGfU7veQo%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQnuEQcScL%2FkljKed%2BRzpzFYOq9kwQUw%2FfQtSowra8NkSFwOVTdvIlwxzoCECWRPZo5X0qEH2bGfU7veQo%3D
NL
der
1.55 Kb
whitelisted
2888
iexplore.exe
GET
200
104.108.66.215:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQnuEQcScL%2FkljKed%2BRzpzFYOq9kwQUw%2FfQtSowra8NkSFwOVTdvIlwxzoCECWRPZo5X0qEH2bGfU7veQo%3D
NL
der
1.55 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2888
iexplore.exe
104.108.66.215:80
ocsp.entrust.net
Akamai Technologies, Inc.
NL
unknown
2888
iexplore.exe
159.53.113.132:443
securemail.jpmchase.com
JPMorgan Chase & Co.
US
suspicious
3072
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2888
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2888
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3072
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
securemail.jpmchase.com
  • 159.53.113.132
whitelisted
ocsp.entrust.net
  • 104.108.66.215
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info