analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://aol.com

Full analysis: https://app.any.run/tasks/ee9f745b-e00f-4866-8a61-f1807724c86e
Verdict: Malicious activity
Analysis date: January 25, 2022, 00:41:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

5077F878357B9A209F4FC3532C4BF641

SHA1:

D16CB3F2DB37DACE53F4EF946AD52B5DE8EFD717

SHA256:

2BC38F47E1B57D6F819270DEE775DBA1417C411CBF9100E46425E8E08B43B1F3

SSDEEP:

3:N8PLdI:2xI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3648)
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 3576)
      • iexplore.exe (PID: 3648)
    • Checks supported languages

      • iexplore.exe (PID: 3576)
      • iexplore.exe (PID: 3648)
    • Reads the computer name

      • iexplore.exe (PID: 3648)
      • iexplore.exe (PID: 3576)
    • Changes internet zones settings

      • iexplore.exe (PID: 3576)
    • Creates files in the user directory

      • iexplore.exe (PID: 3648)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3648)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3576)
      • iexplore.exe (PID: 3648)
    • Application launched itself

      • iexplore.exe (PID: 3576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3576"C:\Program Files\Internet Explorer\iexplore.exe" "https://aol.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3648"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3576 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
14 829
Read events
14 718
Write events
111
Delete events
0

Modification events

(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30937476
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30937476
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3576) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
10
Text files
14
Unknown types
6

Dropped files

PID
Process
Filename
Type
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:B909D28A0CAA2EF2175531394A2A34D2
SHA256:962E1A290EA3C149206D07C8F2404A8C09CA29EA766E0C52E06C5AE858A7227A
3648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\collectConsent[1].htmhtml
MD5:9E422F2068B96028359FA58605635662
SHA256:84D82B069C73B4042ABC5A45EB8428CAF5EA571BF79389AACD08580617C2A26B
3576iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:E292A2DD0C753F08AC5D38D7A7F5969F
SHA256:BE0E2F42504B334C384A1CA6EF5283F3732EF2511C8BF05071AED93EF99A34D8
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_BA5BA21C632654A8C8944ECE25D9FD35binary
MD5:0D6CE2F8EDBE743806156054F1DE5C32
SHA256:9BB494FAA6B3FC26FDE8C71352084F8D6343EB379E871C5298D4D7A8AE14068F
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_D1FEB916F941619E2D785FDC23E139F1der
MD5:034FAAA23B6F2EC25EDA7BD63C4145AE
SHA256:4E5A5F6CDA6FACBFA70DCF618BCED4C3A5B491AA25FA875711929D5521933F0C
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_0DDA3AA17D346F42C1DF446839DEE6EFder
MD5:FB87224C0F442E9503B1D8A5357CB877
SHA256:1995BE5D57E58DDAC75C3A7A877779943FE276538DD8484B0F97D81FF7663066
3648iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\7VX24I3N.txttext
MD5:477F005EF31649BA9E983B95D7DD6817
SHA256:37784A6601508F0C2EECE8DBC07F2081605465F72F04107AB798322F52A16690
3576iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:FC990EAA7247546FB67C18916A4CAC9B
SHA256:294F5BE9159C87842AD3173FE7CDA168C9F2010C6D428085A8AC30EF436CA993
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_BA5BA21C632654A8C8944ECE25D9FD35der
MD5:1A7BBF8CE6E92C42D52AC504B16489CB
SHA256:79FF57D99188F6155037D527381E29B860596A75E119D3D607AB7B6DCABF7EFC
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_0DDA3AA17D346F42C1DF446839DEE6EFbinary
MD5:AFDF167EDC49C3EF4E8E58B979ED08A0
SHA256:8EE15FFAE9AD82291BC8A192E30FCDC3561269B1880FD5AEA1FF63617C142B43
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
30
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3576
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEA8%2ByrdrMrlwMHSyG%2BDNqgo%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEA%2B77gcCzPztNA4DGvLD224%3D
US
der
471 b
whitelisted
3576
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEA6wGUzIt9ZuVwqd3Mx5tk4%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
178.79.242.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c6b966393682f9ed
DE
compressed
4.70 Kb
whitelisted
3648
iexplore.exe
GET
200
178.79.242.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e72579a577c34f84
DE
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3648
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3648
iexplore.exe
98.136.103.23:443
aol.com
Yahoo
US
whitelisted
3648
iexplore.exe
87.248.118.22:443
s.yimg.com
Yahoo! UK Services Limited
GB
shared
3648
iexplore.exe
212.82.100.163:443
www.aol.com
Yahoo! UK Services Limited
CH
malicious
3648
iexplore.exe
178.79.242.128:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
DE
malicious
3576
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3576
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3648
iexplore.exe
34.243.113.190:443
guce.aol.com
Amazon.com, Inc.
IE
unknown
3648
iexplore.exe
99.80.57.14:443
guce.aol.com
AT&T Services, Inc.
US
unknown
3576
iexplore.exe
87.248.118.22:443
s.yimg.com
Yahoo! UK Services Limited
GB
shared

DNS requests

Domain
IP
Reputation
aol.com
  • 98.136.103.23
  • 74.6.136.150
  • 106.10.248.150
  • 124.108.115.100
  • 212.82.100.150
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 178.79.242.128
  • 178.79.242.0
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.aol.com
  • 212.82.100.163
whitelisted
guce.aol.com
  • 34.243.113.190
  • 99.80.57.14
  • 34.255.212.81
  • 52.213.200.167
  • 54.171.15.146
  • 63.34.23.166
  • 52.210.28.195
  • 52.50.157.70
whitelisted
guce.advertising.com
  • 99.80.57.14
  • 52.211.125.45
  • 52.213.200.167
  • 54.155.160.203
  • 52.16.63.57
  • 52.30.28.111
  • 52.16.8.116
  • 54.77.247.131
suspicious
consent.yahoo.com
  • 63.32.48.230
  • 34.251.136.131
  • 52.210.28.195
  • 52.208.48.46
  • 54.154.60.132
  • 34.243.113.190
  • 52.211.211.116
  • 52.50.157.70
whitelisted
s.yimg.com
  • 87.248.118.22
  • 87.248.118.23
shared

Threats

No threats detected
No debug info