analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://screenshare.pics/SVWE3S

Full analysis: https://app.any.run/tasks/60f22c44-90e9-4407-a47e-7adedf8c1d82
Verdict: Malicious activity
Analysis date: September 08, 2022, 18:59:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B120576E2CB1CF463FB51D93E17674B1

SHA1:

22352F2E388354FDE4406DB8F1694D93B88B041B

SHA256:

252636C568EB8D28A74EFFCC7E5620FFE4D4FFFB6F19751133423B0479B4D1DB

SSDEEP:

3:N8Lo+aMpn:2lHp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1952)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3132)
      • iexplore.exe (PID: 1952)
    • Reads the computer name

      • iexplore.exe (PID: 3132)
      • iexplore.exe (PID: 1952)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3132)
      • iexplore.exe (PID: 1952)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1952)
    • Application launched itself

      • iexplore.exe (PID: 3132)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1952)
      • iexplore.exe (PID: 3132)
    • Changes internet zones settings

      • iexplore.exe (PID: 3132)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3132)
    • Creates files in the user directory

      • iexplore.exe (PID: 1952)
      • iexplore.exe (PID: 3132)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3132"C:\Program Files\Internet Explorer\iexplore.exe" "https://screenshare.pics/SVWE3S"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1952"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3132 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
10 030
Read events
9 909
Write events
119
Delete events
2

Modification events

(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
450143472
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30983093
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
750308472
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30983093
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3132) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
10
Text files
29
Unknown types
7

Dropped files

PID
Process
Filename
Type
3132iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:3E59F66988AE3B749D6DC02F6B314A1B
SHA256:87B6E6733E5825749A457DB4DA9CAC9F618F5096B664BB2830D0E3FBF5A45620
1952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1FC78E8C426D9236954F8C1A100B16D8_B8A06B380D6DD9F4A43D1DDBCBA812C6der
MD5:B18B24EAE240451428D536DBB34A9622
SHA256:87A510745CB5B0861AA83F76DEE5406F52B2CBA6BC822401591C49C467B19AFA
3132iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:EBB94877CFC80F238AB2D805991013F0
SHA256:5215438C31D61760B3258FD510A0BAF5BF4A87EA46381BA4F02AB27A850FCAFA
1952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_C86B7000B5CEB7F9146D51D7AB048AFEder
MD5:B1B2820BAD46CE01ECF0C907296038DE
SHA256:6A1098CDD196434FC25A5EC93B43CBCC0228CC2EE13BA7CB4FE18B155BD28B97
1952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\V7KF6LPO.txttext
MD5:C7AFDDFD8085D7668C31F57978E711BA
SHA256:98285D1C6E560B2D477589F3FBFB295CAD7553A952B451215254BB22BA23F6C9
1952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:30E2DC9C9C7A489958ACCFCE25406B1A
SHA256:6BCC47FF0989D971E4B49BB1BACD0885D61BA03E96CFE38B370E36DAD645748C
1952iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\SVWE3S[1].htmhtml
MD5:B3F6EA8CC4D4F60D50B3BE827AC59D8D
SHA256:35E606F5B25929C487CBDD343171B5F7B35194ECE96BCDF39C8AA304DDDEA42C
1952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_C86B7000B5CEB7F9146D51D7AB048AFEbinary
MD5:4D260119AE18CA6320A38BFD4B5DE014
SHA256:D100D57DD6EBD0CA5FC7DBAF535800FB5082AACD8EC42DD5429A4B2DB82DFFDD
1952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\1KMGVPXK.txttext
MD5:DCE33A0B7D9FC04C3A54D3B6958C8AC3
SHA256:D29ABFE2D0F2BBFA74E4EC78F714BB2D366A3A1476E931814843CE719C0E6AA2
3132iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:7A5939042D8CB2C276B41C99D3D05785
SHA256:86AF4AC2D82B869D6679EBFB0736A81E7020C8FA290310A47B979042CA1002B7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
36
DNS requests
17
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3132
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1952
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAwIlmU1uUKpc1Jl5Pl1QLw%3D
US
der
471 b
whitelisted
1952
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTubeiRal9hlMRbT70r8I4mClph2gQUEsmImy%2FJRHp9EvHfQANCmJLHJNYCEALoaNV0Lqcti0OXy%2FDf5J0%3D
US
der
471 b
whitelisted
1952
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
3132
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3132
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
3132
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3132
iexplore.exe
GET
200
8.253.95.120:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?50f1c15d279f2e34
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1952
iexplore.exe
52.173.151.229:443
screenshare.pics
Microsoft Corporation
US
whitelisted
1952
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3132
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3132
iexplore.exe
8.253.95.120:80
ctldl.windowsupdate.com
Global Crossing
US
suspicious
3132
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1952
iexplore.exe
104.18.47.230:443
static.cloudflareinsights.com
Cloudflare Inc
US
malicious
3132
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1952
iexplore.exe
188.114.96.3:443
grabify.world
Cloudflare Inc
US
malicious
104.18.47.230:443
static.cloudflareinsights.com
Cloudflare Inc
US
malicious
1952
iexplore.exe
188.114.97.3:443
grabify.world
Cloudflare Inc
US
malicious

DNS requests

Domain
IP
Reputation
screenshare.pics
  • 52.173.151.229
suspicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 8.253.95.120
  • 67.27.158.126
  • 67.27.233.254
  • 67.27.157.254
  • 8.241.11.254
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
grabify.world
  • 188.114.96.3
  • 188.114.97.3
malicious
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
grabify.link
  • 172.67.68.246
  • 104.26.8.202
  • 104.26.9.202
whitelisted
static.cloudflareinsights.com
  • 104.18.47.230
  • 172.64.156.26
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .world TLD
Potentially Bad Traffic
ET INFO Observed IP Tracking Domain (grabify .link in TLS SNI)
Potentially Bad Traffic
ET INFO Observed IP Tracking Domain (grabify .link in TLS SNI)
Potentially Bad Traffic
ET INFO Observed IP Tracking Domain (grabify .link in TLS SNI)
Potentially Bad Traffic
ET INFO Observed IP Tracking Domain (grabify .link in TLS SNI)
Potentially Bad Traffic
ET INFO Observed IP Tracking Domain (grabify .link in TLS SNI)
No debug info