analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

UntitledProject.bat

Full analysis: https://app.any.run/tasks/7e073c64-65e3-4ba8-ab18-1b926176f976
Verdict: Malicious activity
Analysis date: November 30, 2020, 06:01:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

82F6D81512C92F742E1B8830F29548B1

SHA1:

D182C8567ECC1D267088A67114206F48AFD76592

SHA256:

2E130AB3FE55421BD31E2FC750D577737172E58FAA58D49AF3DA6C58ABBA95A5

SSDEEP:

3:mKDD4h4bjhaNZIoTjhUd2kn:hm4daoCdZkn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • cmd.exe (PID: 2616)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 3672)
      • iexplore.exe (PID: 616)
      • iexplore.exe (PID: 3836)
      • iexplore.exe (PID: 2692)
      • iexplore.exe (PID: 2372)
      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2756)
      • iexplore.exe (PID: 3164)
    • Application launched itself

      • iexplore.exe (PID: 3672)
      • iexplore.exe (PID: 2692)
      • iexplore.exe (PID: 2372)
      • iexplore.exe (PID: 616)
      • iexplore.exe (PID: 3836)
      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 3164)
      • iexplore.exe (PID: 2756)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 936)
      • iexplore.exe (PID: 3672)
      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 2692)
      • iexplore.exe (PID: 2756)
      • iexplore.exe (PID: 3164)
      • iexplore.exe (PID: 3836)
      • iexplore.exe (PID: 292)
    • Creates files in the user directory

      • iexplore.exe (PID: 936)
      • iexplore.exe (PID: 3348)
      • iexplore.exe (PID: 3604)
      • iexplore.exe (PID: 3828)
      • iexplore.exe (PID: 2708)
      • iexplore.exe (PID: 2752)
      • iexplore.exe (PID: 1516)
    • Reads internet explorer settings

      • iexplore.exe (PID: 936)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2752)
      • iexplore.exe (PID: 3604)
      • iexplore.exe (PID: 2708)
      • iexplore.exe (PID: 3052)
      • iexplore.exe (PID: 380)
      • iexplore.exe (PID: 672)
      • iexplore.exe (PID: 1888)
      • iexplore.exe (PID: 4052)
      • iexplore.exe (PID: 2000)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3672)
      • iexplore.exe (PID: 3164)
      • iexplore.exe (PID: 2692)
      • iexplore.exe (PID: 2756)
      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 3836)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3164)
      • iexplore.exe (PID: 3672)
      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2692)
      • iexplore.exe (PID: 3836)
      • iexplore.exe (PID: 2756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
42
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2616cmd /c ""C:\Users\admin\AppData\Local\Temp\UntitledProject.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
616"C:\Program Files\Internet Explorer\iexplore.exe" http://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2372"C:\Program Files\Internet Explorer\iexplore.exe" http://www.xvideos.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3672"C:\Program Files\Internet Explorer\iexplore.exe" http://www.xnxx.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2692"C:\Program Files\Internet Explorer\iexplore.exe" http://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3836"C:\Program Files\Internet Explorer\iexplore.exe" http://www.xvideos.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3164"C:\Program Files\Internet Explorer\iexplore.exe" http://www.xnxx.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2756"C:\Program Files\Internet Explorer\iexplore.exe" http://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3604"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:616 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3348"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2372 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
4 620
Read events
3 684
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
34
Text files
117
Unknown types
18

Dropped files

PID
Process
Filename
Type
2372iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].ico
MD5:
SHA256:
616iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[2].ico
MD5:
SHA256:
2372iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3672iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3836iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3164iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2756iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2692iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2164iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
936iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabD73F.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
43
TCP/UDP connections
136
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1516
iexplore.exe
GET
301
66.254.114.41:80
http://www.pornhub.com/
US
whitelisted
3348
iexplore.exe
GET
301
185.88.181.5:80
http://www.xvideos.com/
NL
whitelisted
936
iexplore.exe
GET
301
185.88.181.5:80
http://www.xvideos.com/
NL
whitelisted
3828
iexplore.exe
GET
301
185.88.181.60:80
http://www.xnxx.com/
NL
suspicious
3236
iexplore.exe
GET
301
185.88.181.60:80
http://www.xnxx.com/
NL
suspicious
936
iexplore.exe
GET
200
93.184.220.29:80
http://status.rapidssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRhhZrQET0hvbSHUJmNfBKqR%2FiT7wQUU8oXWfxrwAMhLxqu5KqoHIJW2nUCEATZGbzA54z2vc3WFqb5HW4%3D
US
der
471 b
shared
3052
iexplore.exe
GET
301
185.88.181.5:80
http://www.xvideos.com/
NL
whitelisted
2752
iexplore.exe
GET
301
185.88.181.60:80
http://www.xnxx.com/
NL
suspicious
936
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAilokbNS1yMg9cCtLurU0k%3D
US
der
471 b
whitelisted
3604
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAx6iHYQ0JilgBc9YW1vcMQ%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
936
iexplore.exe
185.88.181.5:443
www.xvideos.com
ServerStack, Inc.
NL
suspicious
936
iexplore.exe
185.88.181.5:80
www.xvideos.com
ServerStack, Inc.
NL
suspicious
3236
iexplore.exe
185.88.181.60:80
www.xnxx.com
ServerStack, Inc.
NL
suspicious
3604
iexplore.exe
66.254.114.41:80
www.pornhub.com
Reflected Networks, Inc.
US
malicious
3348
iexplore.exe
185.88.181.5:80
www.xvideos.com
ServerStack, Inc.
NL
suspicious
3828
iexplore.exe
185.88.181.60:80
www.xnxx.com
ServerStack, Inc.
NL
suspicious
1516
iexplore.exe
66.254.114.41:80
www.pornhub.com
Reflected Networks, Inc.
US
malicious
3236
iexplore.exe
185.88.181.60:443
www.xnxx.com
ServerStack, Inc.
NL
suspicious
1516
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
2372
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
www.pornhub.com
  • 66.254.114.41
whitelisted
www.xvideos.com
  • 185.88.181.5
  • 185.88.181.6
  • 185.88.181.7
  • 185.88.181.8
  • 185.88.181.9
  • 185.88.181.10
  • 185.88.181.11
  • 185.88.181.2
  • 185.88.181.3
  • 185.88.181.4
whitelisted
www.xnxx.com
  • 185.88.181.60
  • 185.88.181.53
  • 185.88.181.54
  • 185.88.181.55
  • 185.88.181.56
  • 185.88.181.57
  • 185.88.181.58
  • 185.88.181.59
suspicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
status.rapidssl.com
  • 93.184.220.29
shared
ocsp.comodoca.com
  • 151.139.128.14
whitelisted
ocsp.usertrust.com
  • 151.139.128.14
whitelisted
ocsp.sectigo.com
  • 151.139.128.14
whitelisted

Threats

PID
Process
Class
Message
1516
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
3604
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
No debug info