analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Sample_5d2ee46859e32a685b62fd44.exe

Full analysis: https://app.any.run/tasks/b6c9f474-0994-461a-8f7d-f0b9ad0c7b2c
Verdict: Malicious activity
Analysis date: July 18, 2019, 12:40:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3093C867794239E779F665815B0A7385

SHA1:

E1F8DC352068D4507B6ECCCE5810D15F0A2F5C9C

SHA256:

1C11EF85CEF68B82F259F702F2D70C371E5B9CECA811C446232B3011A069DA46

SSDEEP:

3072:e1TNBed6ymMn6sbTzCGyrk46gSfJsw6rxEsUa/5e:eRmd6IhTCxk4El6NEsu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • iexplore.exe (PID: 2132)
      • iexplore.exe (PID: 4028)
      • iexplore.exe (PID: 2428)
      • iexplore.exe (PID: 1500)
      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 1844)
      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 2264)
      • iexplore.exe (PID: 2688)
      • iexplore.exe (PID: 2172)
      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3916)
      • iexplore.exe (PID: 2184)
      • iexplore.exe (PID: 3288)
      • iexplore.exe (PID: 1488)
      • iexplore.exe (PID: 4084)
      • iexplore.exe (PID: 1668)
      • iexplore.exe (PID: 2812)
      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 2620)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 4028)
      • iexplore.exe (PID: 2132)
      • iexplore.exe (PID: 2428)
      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 1500)
      • iexplore.exe (PID: 1844)
      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 2688)
      • iexplore.exe (PID: 2264)
      • iexplore.exe (PID: 2172)
      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3916)
      • iexplore.exe (PID: 2184)
      • iexplore.exe (PID: 1488)
      • iexplore.exe (PID: 3288)
      • iexplore.exe (PID: 1668)
      • iexplore.exe (PID: 4084)
      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 2812)
      • iexplore.exe (PID: 2620)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1476)
      • iexplore.exe (PID: 3936)
      • iexplore.exe (PID: 3124)
      • iexplore.exe (PID: 620)
      • iexplore.exe (PID: 2796)
      • iexplore.exe (PID: 3520)
      • iexplore.exe (PID: 2144)
      • iexplore.exe (PID: 2804)
      • iexplore.exe (PID: 3724)
      • iexplore.exe (PID: 4056)
      • iexplore.exe (PID: 3548)
      • iexplore.exe (PID: 3948)
      • iexplore.exe (PID: 864)
      • iexplore.exe (PID: 324)
      • iexplore.exe (PID: 2684)
      • iexplore.exe (PID: 2436)
      • iexplore.exe (PID: 2440)
      • iexplore.exe (PID: 3484)
      • iexplore.exe (PID: 3572)
      • iexplore.exe (PID: 2156)
    • Creates files in the user directory

      • iexplore.exe (PID: 1476)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1476)
      • iexplore.exe (PID: 3936)
      • iexplore.exe (PID: 2796)
      • iexplore.exe (PID: 3124)
      • iexplore.exe (PID: 620)
      • iexplore.exe (PID: 2144)
      • iexplore.exe (PID: 3520)
      • iexplore.exe (PID: 2804)
      • iexplore.exe (PID: 3724)
      • iexplore.exe (PID: 4056)
      • iexplore.exe (PID: 3548)
      • iexplore.exe (PID: 3948)
      • iexplore.exe (PID: 864)
      • iexplore.exe (PID: 324)
      • iexplore.exe (PID: 2436)
      • iexplore.exe (PID: 2440)
      • iexplore.exe (PID: 2684)
      • iexplore.exe (PID: 3484)
      • iexplore.exe (PID: 3572)
      • iexplore.exe (PID: 2156)
    • Application launched itself

      • iexplore.exe (PID: 2132)
      • iexplore.exe (PID: 1844)
      • iexplore.exe (PID: 2688)
      • iexplore.exe (PID: 3916)
      • iexplore.exe (PID: 1488)
      • iexplore.exe (PID: 1668)
      • iexplore.exe (PID: 3288)
      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 2620)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:16 14:53:15+02:00
PEType: PE32
LinkerVersion: 12
CodeSize: 28672
InitializedDataSize: 110592
UninitializedDataSize: -
EntryPoint: 0x1620
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
ProductName: Cisco Systems VPN Client
CompanyName: Cisco Systems, Inc.
LegalCopyright: Copyright © 1998-2010 Cisco Systems, Inc.
LegalTrademark: All Rights Reserved.
FileDescription: Cisco Systems VPN Client
InternalName: ipsecdialer
OriginalFileName: IPSECDIALER.EXE
ProductVersion: 5.0.07.0440
FileVersion: 5.0.07.0440

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Jul-2019 12:53:15
Detected languages:
  • English - United States
  • French - Canada
  • Japanese - Japan
Debug artifacts:
  • p:\mulrtimedia\video\mplayer.pdb
ProductName: Cisco Systems VPN Client
CompanyName: Cisco Systems, Inc.
LegalCopyright: Copyright © 1998-2010 Cisco Systems, Inc.
LegalTrademark: All Rights Reserved.
FileDescription: Client VPN Cisco
InternalName: ipsecdialer
OriginalFilename: IPSECDIALER.EXE
ProductVersion: 5.0.07.0440
FileVersion: 5.0.07.0440

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 16-Jul-2019 12:53:15
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006BE4
0x00007000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.9898
.rdata
0x00008000
0x00014BE4
0x00015000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.94978
.data
0x0001D000
0x00003690
0x00003000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.83314
.rsrc
0x00021000
0x00001B70
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.94977

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.42893
896
UNKNOWN
French - Canada
RT_VERSION
2
2.42222
296
UNKNOWN
Japanese - Japan
RT_ICON
3
2.50305
744
UNKNOWN
English - United States
RT_ICON
4
2.42222
296
UNKNOWN
English - United States
RT_ICON
5
2.50305
744
UNKNOWN
French - Canada
RT_ICON
6
2.42222
296
UNKNOWN
French - Canada
RT_ICON
IDI_ICON1
2.55805
34
UNKNOWN
French - Canada
RT_GROUP_ICON

Imports

ADVAPI32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
USER32.dll
urlmon.dll
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
41
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start sample_5d2ee46859e32a685b62fd44.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3496"C:\Users\admin\AppData\Local\Temp\Sample_5d2ee46859e32a685b62fd44.exe" C:\Users\admin\AppData\Local\Temp\Sample_5d2ee46859e32a685b62fd44.exeexplorer.exe
User:
admin
Company:
Cisco Systems, Inc.
Integrity Level:
MEDIUM
Description:
Cisco Systems VPN Client
Version:
5.0.07.0440
4028"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1476"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:4028 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2132"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3936"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2132 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2428"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3124"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2428 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1256"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2796"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1256 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1500"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
6 679
Read events
5 999
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
224
Unknown types
4

Dropped files

PID
Process
Filename
Type
4028iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF73C5590353EBE6E2.TMP
MD5:
SHA256:
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{3CBE431E-A959-11E9-B2FD-5254004A04AF}.dat
MD5:
SHA256:
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:862BEAB31C6E70B91C45548EF2E70449
SHA256:A09C65539A1C017386A91A775C0FB1CF2BC9D85C5789A7F392BED2E7C2938B1D
4028iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFC0AE2EA41C4B3CDE.TMP
MD5:
SHA256:
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{3CBE431D-A959-11E9-B2FD-5254004A04AF}.dat
MD5:
SHA256:
1476iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.logtext
MD5:955B9E4EADC9982A8F51BD10D6D0AE00
SHA256:DE536DB3546C5BB10DF96312CA6689FF8F851B003605C8A02163F4FF540BD009
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\V29ZLWTN\errorPageStrings[1]text
MD5:1A0563F7FB85A678771450B131ED66FD
SHA256:EB5678DE9D8F29CA6893D4E6CA79BD5AB4F312813820FE4997B009A2B1A1654C
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DPWI0Z9K\dnserror[1]html
MD5:68E03ED57EC741A4AFBBCD11FAB1BDBE
SHA256:1FF3334C3EB27033F8F37029FD72F648EDD4551FCE85FC1F5159FEAEA1439630
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DPWI0Z9K\noConnect[1]image
MD5:3CB8FACCD5DE434D415AB75C17E8FD86
SHA256:6976C426E3AC66D66303C114B22B2B41109A7DE648BA55FFC3E5A53BD0DB09E7
1476iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UZQZ4I4T\favcenter[1]image
MD5:25D76EE5FB5B890F2CC022D94A42FE19
SHA256:07D07A467E4988D3C377ACD6DC9E53ABCA6B64E8FBF70F6BE19D795A1619289B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1256
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1844
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2264
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1488
iexplore.exe
GET
204.79.197.200:80
http://www.bing.com/favicon.ico
US
whitelisted
2812
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1668
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2428
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3244
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3780
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2688
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1500
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2428
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3780
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1256
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4028
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1844
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2132
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2172
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2264
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2184
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
kolaandpepsi.com
unknown

Threats

No threats detected
No debug info