URL:

givemeredditstreams.xyz

Full analysis: https://app.any.run/tasks/2915d448-213b-4b3f-84d8-e6de1cee62af
Verdict: Malicious activity
Analysis date: March 13, 2024, 03:25:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

57E299EF6907A10FCF4330C99B3EB5E9

SHA1:

7D2BCCAD6C0EA1321747418E348DB389B58604E3

SHA256:

3A5FA483C3CBC609513C44D059D334E2A8B49D6D7E5A17F515F1E056D353D191

SSDEEP:

3:FB6wRXhfA:76/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3692"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3700 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3700"C:\Program Files\Internet Explorer\iexplore.exe" "givemeredditstreams.xyz"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
15 431
Read events
15 300
Write events
95
Delete events
36

Modification events

(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
338522224
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31094006
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
638684724
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31094006
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
9
Text files
16
Unknown types
5

Dropped files

PID
Process
Filename
Type
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jquery.min[1].jstext
MD5:9C4C522636859B8A7284CCD5CAFD73D1
SHA256:4CD356041C1765B1B544E524BEB52E8872A249B2634F8B62D38F2F837FF4F84A
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\7JONOM7H.htmhtml
MD5:107FF36EE675FE69DB4B37AEA485D13B
SHA256:94895DB220E7A4616070EC4A7F46BB04C892D26D8BDD3853E259A13F6FA9A345
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\moment.min[1].jstext
MD5:99D33210B6EB23CF25FCD4AB7CFC9F2A
SHA256:081737985335AF4BE15FC676ED4CCC0703C7446C6B5CBC9317E40BCDC6428E5D
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\flatpickr.min[1].csstext
MD5:71BBC0054BD558C80BA48284E00B4761
SHA256:A67742A9DB92C3F1FBA7AAD828CA1C55F0A7D35084FC8D2BEFD315A556D2B83D
3692iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:F531455A7879137446FCAC977BEEC6F0
SHA256:FF53A63D399016F6856A12F08835EF23A0DEEDC97AD99176B709C38312DB13B7
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\ind[1].jstext
MD5:6C1B5BE43F48CBD41C940075E8B35687
SHA256:307C23A68686969C43BCEC0386B7B6D520FC43F4B61D32774DBDE67E05D7C36E
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\fa-brands-400[1].ttfbinary
MD5:95B991BBB94A2367A79B736321B69E47
SHA256:F0415AB0B1D72F271A60ABE4A656935718084ED8A59D8AD9DDA8D193E1CC6C68
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\fa-solid-900[1].ttfbinary
MD5:463AC9A28F5745FF177B994560ACE1C1
SHA256:69DB27A99522BFECCAB8DC48A89C97098E9FD2BEE3F4B8EEFDCF9B0624A2DBEE
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\flatpickr[1].jstext
MD5:2CDC4717B47183A393F929D97E406E13
SHA256:E0675896A807026E155C51A6AAAF221BF4CA239B5935FCD00671B93230165DE4
3692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\mdb.min[1].jstext
MD5:71631A46752E36B49D6BE3D90F63B615
SHA256:3ECB53AC68DAC10FED837079812E97C667AA1A3227A09E29C6256967C39B3113
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
95
DNS requests
14
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3692
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/
unknown
html
11.0 Kb
3692
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/css/style.css?v=1698506433
unknown
text
5.31 Kb
3692
iexplore.exe
GET
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/moment.min.js
unknown
3692
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/jquery.min.js
unknown
text
30.2 Kb
3692
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/css/font-awesome.css
unknown
text
19.9 Kb
3692
iexplore.exe
GET
188.114.97.3:80
http://givemeredditstreams.xyz/assets/css/flatpickr.min.css
unknown
3692
iexplore.exe
GET
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/flatpickr.js
unknown
3692
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/js/ind.js?ver=1698506434
unknown
text
601 b
3692
iexplore.exe
GET
188.114.97.3:80
http://givemeredditstreams.xyz/assets/webfonts/fa-brands-400.ttf
unknown
3692
iexplore.exe
GET
188.114.97.3:80
http://givemeredditstreams.xyz/assets/webfonts/fa-solid-900.ttf
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3692
iexplore.exe
188.114.97.3:80
givemeredditstreams.xyz
CLOUDFLARENET
NL
unknown
3692
iexplore.exe
184.24.77.133:443
a.espncdn.com
Akamai International B.V.
DE
unknown
3692
iexplore.exe
184.24.77.167:443
site.api.espn.com
Akamai International B.V.
DE
unknown
3692
iexplore.exe
195.181.170.18:443
www.displayvertising.com
Datacamp Limited
DE
unknown
3692
iexplore.exe
23.32.238.224:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3692
iexplore.exe
69.192.161.44:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
3700
iexplore.exe
92.123.104.33:443
www.bing.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
givemeredditstreams.xyz
  • 188.114.97.3
  • 188.114.96.3
unknown
a.espncdn.com
  • 184.24.77.133
  • 184.24.77.169
unknown
www.displayvertising.com
  • 195.181.170.18
  • 212.102.56.179
  • 212.102.56.181
  • 156.146.33.140
  • 195.181.175.16
  • 195.181.175.41
  • 156.146.33.138
unknown
site.api.espn.com
  • 184.24.77.167
  • 184.24.77.152
unknown
api.bing.com
  • 13.107.5.80
unknown
www.bing.com
  • 92.123.104.33
  • 92.123.104.62
  • 92.123.104.38
  • 92.123.104.32
  • 92.123.104.34
unknown
ctldl.windowsupdate.com
  • 23.32.238.224
  • 23.32.238.192
  • 23.32.238.210
  • 23.32.238.201
  • 23.32.238.203
  • 23.32.238.208
  • 23.32.238.211
  • 23.32.238.217
  • 23.32.238.219
unknown
x1.c.lencr.org
  • 69.192.161.44
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
iecvlist.microsoft.com
  • 152.199.19.161
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info