URL:

givemeredditstreams.xyz

Full analysis: https://app.any.run/tasks/fff0a1a2-935c-496a-a4f6-663783df1b4e
Verdict: Malicious activity
Analysis date: March 13, 2024, 03:11:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

57E299EF6907A10FCF4330C99B3EB5E9

SHA1:

7D2BCCAD6C0EA1321747418E348DB389B58604E3

SHA256:

3A5FA483C3CBC609513C44D059D334E2A8B49D6D7E5A17F515F1E056D353D191

SSDEEP:

3:FB6wRXhfA:76/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3348"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3672 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3672"C:\Program Files\Internet Explorer\iexplore.exe" "givemeredditstreams.xyz"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
21 817
Read events
21 691
Write events
91
Delete events
35

Modification events

(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
858656816
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31094004
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31094004
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
17
Text files
26
Unknown types
8

Dropped files

PID
Process
Filename
Type
3348iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style[1].csstext
MD5:8FD658BB05CC2D7274F10C789BB7501F
SHA256:0726A2D688E4977CCAAC972EAB68F825EC6C9A426C3682825E9379E4C7F47E7C
3348iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\ind[1].jstext
MD5:2F511F1B03A96D69A5D85BA05CABBF62
SHA256:6F5B63F93812B3322ADE005A0C25F7A7BE7E46E4FDF244448A82CEFFAEB77DB0
3348iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab819.tmpcompressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3348iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\flatpickr[1].jstext
MD5:BD6CEE2EE4C0E3A77AF73C987767B4B8
SHA256:BD04BB4978D38FCE197DA3095BFF68DA165F6DE18D2FC56AC5F1D7FB61C8E947
3348iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3348iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab82B.tmpcompressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3672iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Abinary
MD5:A22334B378C322F62635C5B17EFD5B89
SHA256:70C028D07CCDBFAE5ACBBE7467959983D33FE30091F50B418E0B83F932179ACF
3348iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:822467B728B7A66B081C91795373789A
SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9
3348iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:3EC64BC1EE96BC65C009978C13C651B5
SHA256:B3F86DDB5CFFDCDBFD0B7CB8BF00B5EBFEB40FC61A53638848D59EDDD99BBE63
3672iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Ader
MD5:B4847C3050E5E738F309421F13E030C7
SHA256:1C1F40EC09590EE2F93B770706675A1657DC2556E9670D89E2288841A3CD812D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
323
DNS requests
20
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/
unknown
html
11.0 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/moment.min.js
unknown
text
18.1 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/css/style.css?v=1698506433
unknown
text
6.01 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/jquery.min.js
unknown
text
30.2 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/css/flatpickr.min.css
unknown
text
2.95 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/css/font-awesome.css
unknown
text
19.9 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/mdb.min.js
unknown
text
43.4 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/assets/js/flatpickr.js
unknown
text
14.1 Kb
3348
iexplore.exe
GET
200
188.114.97.3:80
http://givemeredditstreams.xyz/js/ind.js?ver=1698506434
unknown
text
729 b
3348
iexplore.exe
GET
188.114.97.3:80
http://givemeredditstreams.xyz/assets/webfonts/fa-regular-400.ttf
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3348
iexplore.exe
188.114.97.3:80
givemeredditstreams.xyz
CLOUDFLARENET
NL
unknown
3348
iexplore.exe
184.24.77.133:443
a.espncdn.com
Akamai International B.V.
DE
unknown
3348
iexplore.exe
156.146.33.137:443
www.displayvertising.com
Datacamp Limited
DE
unknown
3348
iexplore.exe
23.32.238.219:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3348
iexplore.exe
23.32.238.210:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3348
iexplore.exe
184.24.77.152:443
site.api.espn.com
Akamai International B.V.
DE
unknown
3672
iexplore.exe
92.123.104.34:443
www.bing.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
givemeredditstreams.xyz
  • 188.114.97.3
  • 188.114.96.3
unknown
a.espncdn.com
  • 184.24.77.133
  • 184.24.77.169
unknown
www.displayvertising.com
  • 156.146.33.137
  • 212.102.56.178
  • 212.102.56.182
  • 156.146.33.141
  • 195.181.175.15
  • 195.181.175.40
  • 195.181.170.18
unknown
ctldl.windowsupdate.com
  • 23.32.238.210
  • 23.32.238.218
  • 23.32.238.235
  • 23.32.238.216
  • 23.32.238.217
  • 23.32.238.234
  • 23.32.238.232
  • 23.32.238.226
  • 23.32.238.219
unknown
api.bing.com
  • 13.107.5.80
unknown
www.bing.com
  • 92.123.104.28
  • 92.123.104.32
  • 92.123.104.33
  • 92.123.104.34
unknown
site.api.espn.com
  • 184.24.77.152
  • 184.24.77.167
unknown
x1.c.lencr.org
  • 69.192.161.44
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
d3mzokty951c5w.cloudfront.net
  • 18.245.78.90
  • 18.245.78.161
  • 18.245.78.175
  • 18.245.78.40
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info