URL:

https://us-west-2.amazonses.com

Full analysis: https://app.any.run/tasks/ea620798-ade7-45e3-8142-c4135b813a51
Verdict: Malicious activity
Analysis date: July 22, 2022, 08:02:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B2CCC4E2D077B5E9A1E05678881D9ADE

SHA1:

9FC953B674BFD77BA0F0B9F76902A0F48325ADED

SHA256:

1F13A1CA9A427287D78A254F9100E395C14BA0CF4593FEB7967BB1190C0D87FA

SSDEEP:

3:N8lAPgI2QsGT:2EgasK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2848)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2524)
      • iexplore.exe (PID: 2848)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 2524)
    • Application launched itself

      • iexplore.exe (PID: 2524)
    • Checks supported languages

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 2524)
    • Changes internet zones settings

      • iexplore.exe (PID: 2524)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2848)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 2524)
    • Creates files in the user directory

      • iexplore.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2524"C:\Program Files\Internet Explorer\iexplore.exe" "https://us-west-2.amazonses.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2848"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2524 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
14 746
Read events
14 585
Write events
161
Delete events
0

Modification events

(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30973345
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30973345
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2524) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
20
Text files
66
Unknown types
22

Dropped files

PID
Process
Filename
Type
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62der
MD5:637CA1FEBAF10B6EC9B70D7121E89733
SHA256:C7168ADCB1420A53C422A5428BA027623AD99C3C6A3173CF966B2EA9A814665F
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fder
MD5:8AD60DE2A42EE7EA7032077F03FDA05C
SHA256:7F54A2F05E1FC271D3EDCA59B882BB9CC5FB5CEDF8AE77614E733D47D2588B7A
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_EF7C261DD347AB787AB6017EE1E6C6C5der
MD5:72DD6603082033C1ACFD4663F2A15A7C
SHA256:E0A88F523509F2A171F9ACA2428653D547411C4139635F2F0209C36ECC799280
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:A32B2C5CBCCB664820E2CE4A661ABD96
SHA256:A33235253653A85A78291C088E638A56A38593222642C636DC603783D1924400
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_EF7C261DD347AB787AB6017EE1E6C6C5binary
MD5:ED6BA566D4CEB0DE596F1B4ABC000A1E
SHA256:309E10873F54A012DB44C888AB29EB84FE943F72CC758365D07AA104A1AACA36
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:B45B4EFE7BCC6BFAA57E761EE6AAD822
SHA256:29BD81CD13CFE2BFD3F3CFA050A6BF74512B482B47BD175A43CC39636E79A272
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:DDE90A399A1249D4AD36AC3C02BAD39A
SHA256:6389FF8BB261EFE2295417B2D0A5D2787F127ED79FCBAE733CA4EDB671C2BFFD
2848iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\Netflix_logo_innovators-new.9dff3bd7440014704e4797b54ac66661db161609[1].pngimage
MD5:FBE496D817CED7E2E6112AA7CEA733BC
SHA256:AE57A76C4F810057B6C1ED307768C366A68A6C8E9E29BEC1CF062A8CC76A40CD
2848iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZV16EBN9.txttext
MD5:A4E7ADF92EFA3AE65C71D122158FB31F
SHA256:11ACBD72121866DD5D7ADEF02F58DAB6A4F0A4B197678942509D4A52C68FCBE0
2848iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\Duolingo_Customer-Reference_Logo.0f8bac243ce6d4a1ffacb802ff5a9d8729f3ae15[1].pngimage
MD5:7D257E795F4A2FFB9D322A3BCF1E43E9
SHA256:755752E036910808FC311C6BBD6CADB30EEE827057FCB3539E96A626340E24CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
84
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2848
iexplore.exe
GET
200
18.66.188.155:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2848
iexplore.exe
GET
200
13.225.84.145:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2848
iexplore.exe
GET
301
143.204.91.77:80
http://aws.amazon.com/ses/
US
html
183 b
shared
2848
iexplore.exe
GET
200
108.138.24.72:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEATtpOaMCSnVOJsJk3wxw0s%3D
US
der
471 b
whitelisted
2848
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2848
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEH5yubgqasszEiGj82QyGVA%3D
US
der
471 b
whitelisted
2848
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2848
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDrUOTizw843wp5fDytD5eL
US
der
472 b
whitelisted
2848
iexplore.exe
GET
200
108.138.24.72:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAXSn%2F1%2FjXgSwD6br6Q%2BVsM%3D
US
der
471 b
whitelisted
2848
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCKzqoN%2F4E7%2FQolB32XZIqo
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2848
iexplore.exe
142.250.186.74:443
jnn-pa.googleapis.com
Google Inc.
US
whitelisted
2848
iexplore.exe
108.138.17.127:443
us-west-2.amazonses.com
BellSouth.net Inc.
US
unknown
2848
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
18.66.188.155:80
ocsp.rootg2.amazontrust.com
Massachusetts Institute of Technology
US
whitelisted
2524
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2848
iexplore.exe
18.66.242.94:80
o.ss2.us
Massachusetts Institute of Technology
US
unknown
2848
iexplore.exe
143.204.91.77:443
aws.amazon.com
US
unknown
2848
iexplore.exe
143.204.91.77:80
aws.amazon.com
US
unknown
13.225.84.145:80
ocsp.rootca1.amazontrust.com
US
whitelisted
2848
iexplore.exe
143.204.94.51:443
a0.awsstatic.com
US
malicious

DNS requests

Domain
IP
Reputation
us-west-2.amazonses.com
  • 108.138.17.127
  • 108.138.17.67
  • 108.138.17.71
  • 108.138.17.16
malicious
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
o.ss2.us
  • 18.66.242.94
  • 18.66.242.188
  • 18.66.242.81
  • 18.66.242.228
whitelisted
ocsp.rootg2.amazontrust.com
  • 18.66.188.155
  • 18.66.188.110
  • 18.66.188.187
  • 18.66.188.75
whitelisted
ocsp.rootca1.amazontrust.com
  • 13.225.84.145
  • 13.225.84.175
  • 13.225.84.49
  • 13.225.84.13
shared
ocsp.sca1b.amazontrust.com
  • 108.138.24.72
  • 108.138.24.186
  • 108.138.24.78
  • 108.138.24.169
whitelisted
aws.amazon.com
  • 143.204.91.77
shared
a0.awsstatic.com
  • 143.204.94.51
  • 18.66.130.57
whitelisted

Threats

No threats detected
No debug info