URL:

compensarenlinea.co

Full analysis: https://app.any.run/tasks/fccc8486-2c7f-4b0f-a6e7-4426543646e6
Verdict: Malicious activity
Analysis date: January 18, 2024, 18:53:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

A1AB8C63612E30642AEEF7CC6C45B6F4

SHA1:

3286B5D22D301E6104F8679226224110ADACBCD7

SHA256:

2366973652D59E920B88408FFC3ABD4BC4F9A20F4E7EC1CA22EE209D246F6915

SSDEEP:

3:OAiEXu8d:vld

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Internet Explorer\iexplore.exe" "compensarenlinea.co"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
324"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:116 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
36 065
Read events
35 972
Write events
89
Delete events
4

Modification events

(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(116) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
32
Text files
63
Unknown types
3

Dropped files

PID
Process
Filename
Type
324iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\widget-areas.min[1].csstext
MD5:A9C570C8914976CC3BAD2A46A9500376
SHA256:E6B4122B94B82886E32952C07C78D342647B3A38A2834F4489E0922308A95EAB
324iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\lazy-images[1].jstext
MD5:9855FB5D7DEE948D776D7E36EDE8A2C9
SHA256:C99FFA666406B233D0791D6F9C7B4675C37AE1E537813B213BC3968A95321355
324iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\front.min[1].jstext
MD5:DB6AFE5FC3125BFBB7631CDC894F95F7
SHA256:4B179562B883C1257AABBAD3A5641F965DD7331FAA31FE06382A5D8C62D5EE19
324iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\mejorcluster[1].csstext
MD5:50EBB11CC679869C123DF9A00C1B6D2C
SHA256:D52E3E614CBEA1E87E4D7700CD6F9C78A68940E05E0DC7612636BD8F1DD62ED7
324iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:A5E46FF6517AE89F8AADF13E90779AD3
SHA256:EE274100C5A5E960EB68AD5C951C3CA3968CE503290473FE44EB6ED6EED3ED4B
324iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\style.min[1].csstext
MD5:CF235B02F713E74768216002C9A55FF6
SHA256:FAE6C43A92A3CA2F58FBD857E48CE32D4EAD869440FBE3283BD016DA0865639B
324iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\scripts.min[1].jstext
MD5:6648ED2232E4D68CFF3BCEFF7622120F
SHA256:88ED293C2D49B80A6262E40DEF638418234DAA9E1A4646F71CF6A5108B82B328
324iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25der
MD5:D738BEFF119EB3DBB5133997FA3801FB
SHA256:065DBCCA8C7BFAA9FFC7FB786FFAAA63341BFE73FC1A3A9F23863083FC1FE7CE
324iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:1D3E498D33ECF9A26F9F73F81ABD07D5
SHA256:0C79CD28D18990B8B30C5DCB04DC7980A5560F54E436DEABEE4DBEBD80F3C06F
324iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
52
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/
unknown
compressed
71.4 Kb
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/plugins/table-of-contents-plus/screen.min.css?ver=2106
unknown
compressed
471 b
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/themes/generatepress/assets/css/components/widget-areas.min.css?ver=3.2.0
unknown
compressed
829 b
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/plugins/gp-premium/blog/functions/css/style.min.css?ver=2.1.1
unknown
compressed
1.24 Kb
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-lazy-images/dist/lazy-images.js?minify=false&ver=8767d0da914b289bd862
unknown
compressed
1.02 Kb
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/themes/generatepress/assets/js/menu.min.js?ver=3.2.0
unknown
compressed
1.85 Kb
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/plugins/table-of-contents-plus/front.min.js?ver=2106
unknown
compressed
2.40 Kb
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/plugins/jetpack/jetpack_vendor/automattic/jetpack-lazy-images/dist/intersection-observer.js?minify=false&ver=83ec8aa758f883d6da14
unknown
compressed
3.17 Kb
unknown
324
iexplore.exe
GET
200
178.211.133.33:80
http://compensarenlinea.co/wp-content/plugins/gp-premium/blog/functions/js/scripts.min.js?ver=2.1.1
unknown
compressed
632 b
unknown
324
iexplore.exe
GET
200
87.248.204.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?91e20718385f53e9
unknown
compressed
4.66 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
324
iexplore.exe
178.211.133.33:80
compensarenlinea.co
Raiola Networks S.L.
ES
unknown
324
iexplore.exe
192.0.77.37:443
c0.wp.com
AUTOMATTIC
US
unknown
324
iexplore.exe
178.211.133.33:443
compensarenlinea.co
Raiola Networks S.L.
ES
unknown
324
iexplore.exe
192.0.76.3:443
stats.wp.com
AUTOMATTIC
US
unknown
324
iexplore.exe
87.248.204.0:80
ctldl.windowsupdate.com
LLNW
US
unknown
324
iexplore.exe
172.64.149.23:80
ocsp.comodoca.com
CLOUDFLARENET
US
unknown
324
iexplore.exe
23.192.153.142:80
x1.c.lencr.org
AKAMAI-AS
GB
unknown
324
iexplore.exe
93.184.220.66:80
platform.twitter.com
EDGECAST
GB
whitelisted
324
iexplore.exe
157.240.251.9:443
connect.facebook.net
FACEBOOK
DE
unknown

DNS requests

Domain
IP
Reputation
compensarenlinea.co
  • 178.211.133.33
malicious
c0.wp.com
  • 192.0.77.37
whitelisted
stats.wp.com
  • 192.0.76.3
whitelisted
ctldl.windowsupdate.com
  • 87.248.204.0
whitelisted
ocsp.comodoca.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
ocsp.usertrust.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
x1.c.lencr.org
  • 23.192.153.142
whitelisted
connect.facebook.net
  • 157.240.251.9
whitelisted
platform.twitter.com
  • 93.184.220.66
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

No threats detected
No debug info