analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.163.com/

Full analysis: https://app.any.run/tasks/d0574a5a-3c6a-4f59-8701-007840bb182b
Verdict: Malicious activity
Analysis date: January 24, 2022, 21:03:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

A417BC4BD4FF4070E58B0C4F2DA08C48

SHA1:

41A2FFF99877861504C7AE82497592AEE4AAD51D

SHA256:

25A878BBC3FE9722335F46B69AC9297B1C6A8EB7DEAFED0F11E3A3DB33FBFF42

SSDEEP:

3:N8DSLZR:2OLZR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2504)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 1408)
      • iexplore.exe (PID: 2504)
    • Reads the computer name

      • iexplore.exe (PID: 1408)
      • iexplore.exe (PID: 2504)
    • Application launched itself

      • iexplore.exe (PID: 1408)
    • Changes internet zones settings

      • iexplore.exe (PID: 1408)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1408)
      • iexplore.exe (PID: 2504)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1408)
      • iexplore.exe (PID: 2504)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 2504)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2504)
    • Creates files in the user directory

      • iexplore.exe (PID: 2504)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1408"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.163.com/"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2504"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1408 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
17 218
Read events
16 877
Write events
341
Delete events
0

Modification events

(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30937445
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30937445
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
24
Text files
322
Unknown types
19

Dropped files

PID
Process
Filename
Type
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D56B4E335E80143B4541C1723368A393_7B2E01AECDFCD0266F9E901FBB504576der
MD5:05B1A6DF7D2321C0FCE44EBC4D9314DD
SHA256:F268E6DE56269A4DF19362602CA5FFBA38FF84DD46D54594D2B1B234515036BB
2504iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\K719AOEL.htmhtml
MD5:B41CE303CF4FD193393CB72597A9C63E
SHA256:908819510B1E8D5A1B4D02DC704D180157E663F419E0D4F22F3EBCDD1BA4D369
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:5232E29B147097DF7886297110DD048B
SHA256:46ED436C16EE398C91B5ACE3D17AFFC83CA9861150B419FDD3ECD1BE265C8024
1408iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:E3B04A83D28598EA998CFE85A2E85790
SHA256:2A492ADF304F382CA2D827689D083CA45B71073D6C654614C2B3CE52ACD5F63C
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_F2379ADA3CBEBD919394FF2BE001D546der
MD5:69EBB62402B7C99E9E8E379C652605CE
SHA256:1F8645B25108D84AC759CE52519B6FF8F5A83A010C9C576C9E0C3332B05D3961
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2der
MD5:ADAC833C695226818F1D4C45687AD2F7
SHA256:2EFFED24B861F8237D2C23AA1339AF13AF4F10421E586D0CC3FE345E1BDAAD10
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D56B4E335E80143B4541C1723368A393_7B2E01AECDFCD0266F9E901FBB504576binary
MD5:BCFFAA4B0D1263DB736FD96E368AA67B
SHA256:70A307C347C6A38C52461DB0269F32CE9830289C7F56A99BA199600F5665ACA1
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8F8712BCE78D28F9C5E3E950CD93EADA_8B635952FC4E9ABE537360E5F156E4E7binary
MD5:F470DDE9108413093B0AEB3EFD798CD4
SHA256:15DCA0353159BC7C1581C2AC895D644A02376348A2634F19857F17CC3A2C878E
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2binary
MD5:73CEDC1C2D40B1194D45D957B69261E2
SHA256:E26F9832FDE2BF5C4EA140508D69468410A4519848EA7E56F4CAB6B729BE429A
2504iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FA0A17BC17FF10008872A7205D0D43E2_608DEF97DFACECDA8E97C6F270153A4Fbinary
MD5:444EC8CBD37FB793989D222099A75902
SHA256:32CF14BF64135FD4101D03D4396B4D3278D0BA4BC907B8D409625627174A51F7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
145
DNS requests
41
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2504
iexplore.exe
GET
200
47.246.46.205:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAsTYrbuap0%2Blokw8W4gfTk%3D
US
der
471 b
whitelisted
2504
iexplore.exe
GET
200
79.133.177.225:80
http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAoEcNCWvIoSyJCm34Ju7Es%3D
RU
der
471 b
whitelisted
2504
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5b810eac8f0d199b
US
compressed
4.70 Kb
whitelisted
2504
iexplore.exe
GET
200
47.246.46.205:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRXf%2BqAIajMnZeiQcx27p1CzET2wQUJG%2BRP4mHhw4ywkAY38VM60%2FISTICEAzRy6tXj%2Fhmjowz94mlftA%3D
US
der
471 b
whitelisted
2504
iexplore.exe
GET
200
157.185.155.6:80
http://cms-bucket.ws.126.net/2022/0124/469f1f3aj00r66y2x003lc000sg00iyc.jpg?imageView&thumbnail=185y116&quality=100&quality=100
US
image
8.00 Kb
malicious
2504
iexplore.exe
GET
200
157.185.155.6:80
http://cms-bucket.ws.126.net/2022/0124/daeae6b2j00r66y4r006ac000sg00izc.jpg?imageView&thumbnail=380y187&quality=100
US
image
34.9 Kb
malicious
2504
iexplore.exe
GET
200
157.185.155.6:80
http://cms-bucket.ws.126.net/2022/0124/5c8247d6j00r66y3x0029c000sg00iwc.jpg?imageView&thumbnail=185y116&quality=100&quality=100
US
image
9.91 Kb
malicious
1408
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2504
iexplore.exe
GET
200
47.246.46.205:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRc9osyRBU0ybHlZFuU293oOS1mlwQUBr2mm2B5UDG%2B1akCSqDQlVOLLzQCEALTRbSmAuqHYB5ltnll2bM%3D
US
der
471 b
whitelisted
2504
iexplore.exe
GET
200
163.171.128.148:80
http://nimg.ws.126.net/?url=http://videoimg.ws.126.net/cover/20220123/HetVpxKqX_cover.jpg&thumbnail=380x2147483647&quality=75&type=jpg
US
image
10.5 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2504
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
1408
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
163.171.128.148:443
www.163.com
US
malicious
2504
iexplore.exe
163.171.128.148:443
www.163.com
US
malicious
2504
iexplore.exe
79.133.177.225:80
ocsp.dcocsp.cn
SOT LINE Limited Company
RU
malicious
1408
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2504
iexplore.exe
47.246.46.205:80
ocsp.digicert.cn
US
unknown
163.171.128.148:80
www.163.com
US
malicious
2504
iexplore.exe
163.171.128.148:80
www.163.com
US
malicious
1408
iexplore.exe
163.171.128.148:443
www.163.com
US
malicious

DNS requests

Domain
IP
Reputation
www.163.com
  • 163.171.128.148
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.cn
  • 47.246.46.205
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
static.ws.126.net
  • 163.171.128.148
malicious
urswebzj.nosdn.127.net
  • 163.171.128.148
malicious
nimg.ws.126.net
  • 163.171.128.148
malicious
cms-bucket.ws.126.net
  • 157.185.155.6
  • 163.171.156.28
malicious

Threats

No threats detected
No debug info