analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://share-file-secured.myportfolio.com

Full analysis: https://app.any.run/tasks/42af7e5b-b849-4d80-add0-d44a664e5f9b
Verdict: Malicious activity
Analysis date: August 12, 2022, 14:27:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

D8E6F453DD8CA62E4A285B9B079210DA

SHA1:

F40F238F84ECC704951BCECB7F76EE2579C003E2

SHA256:

1BD5B38C4A334F3B768D189ABA6E66D63AD3B093C974F61E48280CF1F78ED3FF

SSDEEP:

3:N1KNNAOHHQBLhgs/GTn:CEBLnGTn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2508)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 892)
    • Reads the computer name

      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 892)
    • Application launched itself

      • iexplore.exe (PID: 892)
    • Changes internet zones settings

      • iexplore.exe (PID: 892)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 892)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2508)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2508)
      • iexplore.exe (PID: 892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
892"C:\Program Files\Internet Explorer\iexplore.exe" "http://share-file-secured.myportfolio.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2508"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:892 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
9 882
Read events
9 763
Write events
119
Delete events
0

Modification events

(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30977623
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30977623
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(892) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
9
Text files
26
Unknown types
7

Dropped files

PID
Process
Filename
Type
2508iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\4c786354ae7b176dc269d5c2d371d5e71660226981[1].csstext
MD5:C7634F544E225219C8D5E319DE1154E7
SHA256:93C8486DB72F6C67E65E8DC38F7CCECEBA0A34E4ECAEB202B17D3FBAF90A6A70
2508iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\X6EBUQK8.jstext
MD5:C70AF830106F2CB77212E0275CA69B6A
SHA256:F8EC3E3C726C8DC35393DDEE3706E80882A002BA03B6482CE4F37ACB1B156F6D
2508iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:7C498FCED493589E32473926909BBAE4
SHA256:93B464F276BFAF32573A5DDC8E50C9AA15047E09BEC2433A1277E85349DA5109
2508iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\7100d461-47e0-416e-9101-acba09aeff4f_rw_1920[1].pngimage
MD5:B8F199279501839CF519D4F42DE20265
SHA256:4B6291040603F588F593003ED35CE878FF862007A2A404E6AA839262D077D3F9
2508iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0766DB9AB186806BB9A6B6802D3BA734der
MD5:19D5E209D058B1BEC0A87F40EC3AB328
SHA256:6416119A5639F1D96579822D6D4F74B168D1EEDCF71B4C122683953AF896909B
2508iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:1C494809DCDA4199455700B43526265B
SHA256:31A01FD381E96F9FAB3A664717A14CFB3008D8CEAF89A3A63182F7601FAE4F08
2508iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\a4b42de1-952f-4cf6-accc-ece6410ec6d7_rwc_0x0x2880x1442x4096[1].pngimage
MD5:817EC6DE66D6C58C4DEB1057B145D570
SHA256:046C7ACAA75DA9E549CD77715F96FF49FF89809DE5B2D2EB1BF11A7AEBA4C257
2508iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\UDZ92JDB.htmhtml
MD5:8A9F98266C93AA31CA106D2C4E99705A
SHA256:7518B5A4ED1093DB6B0345B2A8F0602CDEF6110E1C2F240FAAADEAF4D778E31A
892iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:58A71F87AF282C6F1BE4382B43CF019A
SHA256:5FFD69796323104DA230E13AC796184F4A4651AC8B943E17D4FBBC680BA3D6FB
2508iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04der
MD5:78C7EA2EB5F5E8BC623BE1339F77FCB5
SHA256:EBAEFBD9C12A87833CAC8B5594EAF89CD9BD60E909871F51EAF47F23FEFB697F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
53
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2508
iexplore.exe
GET
302
151.101.0.119:80
http://share-file-secured.myportfolio.com/
US
malicious
2508
iexplore.exe
GET
200
151.101.2.133:80
http://crl.globalsign.com/root-r3.crl
US
der
1.77 Kb
whitelisted
892
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
2508
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEHueQfY9sYqur%2B17E2BPFJI%3D
US
der
1.40 Kb
whitelisted
2508
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
892
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2508
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d8da3f1ad444728e
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2508
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
892
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2508
iexplore.exe
151.101.0.119:80
share-file-secured.myportfolio.com
Fastly
US
malicious
2508
iexplore.exe
151.101.0.119:443
share-file-secured.myportfolio.com
Fastly
US
malicious
2508
iexplore.exe
151.101.2.133:443
cdn.myportfolio.com
Fastly
US
malicious
2508
iexplore.exe
184.24.77.156:443
use.typekit.net
Time Warner Cable Internet LLC
US
suspicious
2508
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
892
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2508
iexplore.exe
151.101.2.133:80
cdn.myportfolio.com
Fastly
US
malicious
184.24.77.154:443
p.typekit.net
Time Warner Cable Internet LLC
US
unknown

DNS requests

Domain
IP
Reputation
share-file-secured.myportfolio.com
  • 151.101.0.119
  • 151.101.64.119
  • 151.101.128.119
  • 151.101.192.119
malicious
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cdn.myportfolio.com
  • 151.101.2.133
  • 151.101.66.133
  • 151.101.130.133
  • 151.101.194.133
whitelisted
use.typekit.net
  • 184.24.77.156
  • 184.24.77.144
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
js-agent.newrelic.com
  • 151.101.2.137
  • 151.101.66.137
  • 151.101.130.137
  • 151.101.194.137
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
p.typekit.net
  • 184.24.77.154
  • 184.24.77.146
shared

Threats

No threats detected
No debug info