URL: | http://zhengzhouseo.cyou |
Full analysis: | https://app.any.run/tasks/533b120d-82b7-4366-a1c7-9c9a1a705b78 |
Verdict: | Malicious activity |
Analysis date: | October 20, 2020, 10:19:12 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MD5: | 41BD5ED97642A09DDD76A296FAAFD25D |
SHA1: | 697AE157D0D7C7B37A71C82E458658DCA676F530 |
SHA256: | 3705AD0E362CFB2F711BB7495BD0316FC2ECD01A38A8888EE154393FAB3E1749 |
SSDEEP: | 3:N1KE0vLLLn:CE0vLv |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2620 | "C:\Program Files\Internet Explorer\iexplore.exe" http://zhengzhouseo.cyou | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) | ||||
532 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2620 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) |
PID | Process | Filename | Type | |
---|---|---|---|---|
532 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\Cab4D69.tmp | — | |
MD5:— | SHA256:— | |||
532 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\Tar4D6A.tmp | — | |
MD5:— | SHA256:— | |||
532 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F | — | |
MD5:— | SHA256:— | |||
532 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F | — | |
MD5:— | SHA256:— | |||
532 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\onejs[1].js | text | |
MD5:230D9E5B4987867841C82624B5D98272 | SHA256:043D35A04BF70C9DD12E48B5B279DE70386878521BBF4FD334A9CCDD7C7A475A | |||
532 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 | binary | |
MD5:0E38D1F7B675B0F0AD21533CC6D696FC | SHA256:750DBB3CD8077B4D55071464E24D4808C4010E973F4636B1E31514F7EA9BDDB0 | |||
532 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\load[1].js | text | |
MD5:E159640F9D1610ED3AF5A26BD7CA37B7 | SHA256:14A25C417BCF2315CB0802A430ACD5EDE7E41519DB45E627E67076AE838A2302 | |||
532 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E | binary | |
MD5:034910FBDAC383E9811ECD5997397A7A | SHA256:69567F04451E50912B38C510BFA32122004F9A6A1F2921668067C3626E2FF0D2 | |||
532 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\chartbeat_mab[1].js | text | |
MD5:82DF93C405AF41DA5A9AAB63B6761266 | SHA256:B1CECD2562EA0F5ECE56326332C374E3AA62CFA1D3D4AC1A8F277212222651A7 | |||
532 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E | der | |
MD5:728C425EE21D3445912DDB071597332A | SHA256:B003F1FB627734F8050F724055723A2DC40017DDE9263BEFC7CC1FBE04029FBF |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
532 | iexplore.exe | GET | 200 | 23.247.5.140:80 | http://zhengzhouseo.cyou/ | US | html | 292 Kb | unknown |
532 | iexplore.exe | GET | 200 | 13.224.190.125:80 | http://static.chartbeat.com/js/chartbeat_mab.js | US | text | 9.14 Kb | whitelisted |
532 | iexplore.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D | US | der | 471 b | whitelisted |
532 | iexplore.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D | US | der | 471 b | whitelisted |
532 | iexplore.exe | GET | 200 | 104.75.89.83:80 | http://s.ntv.io/serve/load.js | NL | text | 98.2 Kb | whitelisted |
532 | iexplore.exe | GET | 200 | 99.86.4.207:80 | http://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US&adInstanceId=65fbfb71-0187-4864-a8c1-a476d6acab1e | US | text | 7.11 Kb | whitelisted |
532 | iexplore.exe | GET | 200 | 104.26.8.50:80 | http://literally-media.videoplayerhub.com/galleryplayer.js | US | text | 32.0 Kb | suspicious |
532 | iexplore.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D | US | der | 471 b | whitelisted |
532 | iexplore.exe | GET | 200 | 13.35.253.170:80 | http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D | US | der | 1.70 Kb | whitelisted |
532 | iexplore.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQDiGXpCRmLhzwC5FHxofMG1 | US | der | 472 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
532 | iexplore.exe | 23.247.5.140:80 | zhengzhouseo.cyou | Global Frag Networks | US | unknown |
532 | iexplore.exe | 199.232.193.131:443 | ads.blogherads.com | — | US | unknown |
532 | iexplore.exe | 8.241.90.122:443 | s.chzbgr.com | Level 3 Communications, Inc. | US | unknown |
532 | iexplore.exe | 8.238.35.250:443 | i.chzbgr.com | Level 3 Communications, Inc. | US | unknown |
— | — | 104.75.89.83:80 | s.ntv.io | Akamai Technologies, Inc. | NL | unknown |
532 | iexplore.exe | 104.26.8.50:80 | literally-media.videoplayerhub.com | Cloudflare Inc | US | shared |
— | — | 13.224.190.125:80 | static.chartbeat.com | — | US | unknown |
532 | iexplore.exe | 151.139.128.14:80 | ocsp.comodoca.com | Highwinds Network Group, Inc. | US | suspicious |
532 | iexplore.exe | 99.86.4.207:80 | z-na.amazon-adsystem.com | AT&T Services, Inc. | US | unknown |
532 | iexplore.exe | 44.229.243.197:443 | api.b2c.com | University of California, San Diego | US | unknown |
Domain | IP | Reputation |
---|---|---|
zhengzhouseo.cyou |
| unknown |
s.chzbgr.com |
| suspicious |
ads.blogherads.com |
| whitelisted |
s.ntv.io |
| whitelisted |
static.chartbeat.com |
| whitelisted |
i.chzbgr.com |
| suspicious |
api.b2c.com |
| whitelisted |
literally-media.videoplayerhub.com |
| suspicious |
z-na.amazon-adsystem.com |
| whitelisted |
ocsp.comodoca.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |
532 | iexplore.exe | Generic Protocol Command Decode | SURICATA STREAM FIN out of window |