analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.matrixland.gitbook.io

Full analysis: https://app.any.run/tasks/c70e15c1-28c2-4d2c-8b40-7b5ec4c9a63b
Verdict: Malicious activity
Analysis date: March 31, 2023, 21:45:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B4CF4C4BF36B299BA53DBC36259B2768

SHA1:

43E8505EC6E6864E57F040BCEF1EAD044313E49D

SHA256:

26C8A475D139C0A2E4D9B8D93D8EBF31F4FCB7F2E7A4AE224417BC84F1CF9895

SSDEEP:

3:N8DSLULigMKLLn:2OLgigMKH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2668)
    • Manual execution by a user

      • opera.exe (PID: 2940)
    • Create files in a temporary directory

      • iexplore.exe (PID: 2668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
2668"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.matrixland.gitbook.io"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
3220"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2668 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2940"C:\Program Files\Opera\opera.exe" C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\gdi32.dll
Total events
14 180
Read events
13 858
Write events
320
Delete events
2

Modification events

(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2668) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
26
Text files
36
Unknown types
14

Dropped files

PID
Process
Filename
Type
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFCACB205D5D2E4082.TMPgmc
MD5:440ACF9819B8C102CA8A15DC06ACD9C3
SHA256:514A9479F94B711A391E3114B73E714AA0ABA818BF5C5F0F4FA41F8EE0E17034
2668iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:8461A037B38246996C5F98A64B5FD918
SHA256:C85675B72791F932EBE52B51BC13DCB761A469B1FBDE881C6C4EF6BA93A1B36F
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFE4487AAAA935344D.TMPgmc
MD5:A03DBF8AF07546E5C30DD434FC5F6967
SHA256:9A9807EFFA770F6F8EC06BB38CDC8A3955052912F63E2177E5C6C37839799F6B
2668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\{63DDF039-D00D-11ED-94DF-12A9866C77DE}.datbinary
MD5:D7FDE9CF4E0307616ABFC65A54FE1366
SHA256:8F23C46B83B12CB3917EF2C4DF3918960C1D05484CD185EC4E278600D05C85AD
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF2B77A0D980B01C7B.TMPgmc
MD5:83C6F4E96D3F7D15F757BF41C755B92F
SHA256:767C2F028A58A534FD4809B390027AD6B681584E3D54C2C79AED6B6BDE7D4921
2668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\RecoveryStore.{42C873D0-1D90-11EB-BA2C-12A9866C77DE}.datbinary
MD5:C36DCF44AB5D752A0A8ECCCFD15569F3
SHA256:54ED83D23CA0CF744E2ED633338FEB1C726E064A9A85ECF4672241A20F49F213
2668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{5A5E11A3-D00D-11ED-94DF-12A9866C77DE}.datbinary
MD5:67C893EE2BE81BA1D26D7BDA7B774C80
SHA256:A491E1421A8621FE95D6D805362FF49F7003F2EB46D38C00F858F56FEB0D62C0
2668iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:4D2953DB51D42F19455BBB35D83842FC
SHA256:4B86FA326910BC57740D2F06A56ADC4F4F1F2A2E991404F82132FB86254971FD
2668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{63DDF038-D00D-11ED-94DF-12A9866C77DE}.datbinary
MD5:933EC0037B1D8571D437CDD1978421C0
SHA256:515947153EBD2976592F6063D4A45FBDD6B73AFD5679FE91CD486DD38C748C1E
2668iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:976D1106635829EB1C07D038D6F9DD95
SHA256:70A53D427164E1C2CF85A60AC7C62C9AC31B899A8C5730A7D7AD26CD3179C8F8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
31
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2940
opera.exe
GET
302
104.18.36.225:80
http://matrixland.gitbook.io/
US
suspicious
2668
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2940
opera.exe
GET
200
142.250.185.238:80
http://clients1.google.com/complete/search?q=matrixland&client=opera-suggest-omnibox&hl=de
US
text
85 b
whitelisted
2940
opera.exe
GET
200
142.250.185.238:80
http://clients1.google.com/complete/search?q=matrix&client=opera-suggest-omnibox&hl=de
US
text
140 b
whitelisted
2940
opera.exe
GET
400
82.145.216.16:80
http://sitecheck2.opera.com/?host=matrixland.gitbook.io&hdn=HgSrwxwO2WYa1QKLDzlFIA==
unknown
html
150 b
whitelisted
2940
opera.exe
GET
200
142.250.185.238:80
http://clients1.google.com/complete/search?q=mat&client=opera-suggest-omnibox&hl=de
US
text
165 b
whitelisted
2668
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d94ab6bea1d24fca
US
compressed
4.70 Kb
whitelisted
2668
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2668
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
2668
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2668
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2668
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted
3220
iexplore.exe
172.64.151.31:443
matrixland.gitbook.io
CLOUDFLARENET
US
suspicious
3220
iexplore.exe
104.18.36.225:443
matrixland.gitbook.io
CLOUDFLARENET
shared
2940
opera.exe
185.26.182.94:443
certs.opera.com
Opera Software AS
whitelisted
2940
opera.exe
172.64.151.31:80
matrixland.gitbook.io
CLOUDFLARENET
US
suspicious
2940
opera.exe
172.64.151.31:443
matrixland.gitbook.io
CLOUDFLARENET
US
suspicious
2940
opera.exe
104.18.36.225:80
matrixland.gitbook.io
CLOUDFLARENET
shared

DNS requests

Domain
IP
Reputation
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
certs.opera.com
  • 185.26.182.94
  • 185.26.182.93
whitelisted
clients1.google.com
  • 142.250.185.238
whitelisted
matrixland.gitbook.io
  • 172.64.151.31
  • 104.18.36.225
suspicious
sitecheck2.opera.com
  • 82.145.216.16
  • 82.145.216.15
whitelisted

Threats

PID
Process
Class
Message
3220
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3220
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3220
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2940
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2940
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2940
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2940
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2940
opera.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info