analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://www.workshop-spiele.de/category/energyzer/

Full analysis: https://app.any.run/tasks/2f350439-c115-4722-bdb6-951a91dce7c3
Verdict: Malicious activity
Analysis date: September 30, 2020, 09:19:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

D2E466727EB735E61E8DA51283B8494E

SHA1:

E7F86F85C4307F1F75F9CF8F0A4AFB3E794C8317

SHA256:

410FF4F46228B22EB8691571E27F50E0FF0B4B4FC1A87113799879B29F4B406C

SSDEEP:

3:N1KJS4JOW4BIL0ERAC9LRuAa:Cc4AW0IgEmuL0Aa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2776)
    • Changes internet zones settings

      • iexplore.exe (PID: 3428)
    • Application launched itself

      • iexplore.exe (PID: 3428)
    • Creates files in the user directory

      • iexplore.exe (PID: 2776)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2776)
      • iexplore.exe (PID: 3428)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2776)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3428)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3428"C:\Program Files\Internet Explorer\iexplore.exe" http://www.workshop-spiele.de/category/energyzer/C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2776"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3428 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
502
Read events
391
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
45
Text files
66
Unknown types
19

Dropped files

PID
Process
Filename
Type
2776iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabD37D.tmp
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarD37E.tmp
MD5:
SHA256:
2776iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_ED0FFF804C23141606FA7CD20C2592B6der
MD5:55E07F4BDE5B930C89D97861E0D5272F
SHA256:F7AC46A2E4AB582032ADEEDBCDE79E40345E0C907C1D51C1FAD8B2E571B6D62C
2776iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\NI9B13NO.txttext
MD5:0A44A00071DB2B89CD1096969653706D
SHA256:5A11A5FC34C3513E7435A7CC9D44F026787FAD33D8B718D15C214A8D9B8627C9
2776iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Eder
MD5:4E3BB9CAFBD57BD729300DA56BEB9962
SHA256:EC5D4D3B64AE9CEAE31E1DCF58599F914B3BFB41DEDAF0EF152C1851153B554D
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\energyzer[1].htmhtml
MD5:1DF221346015B21E41EDA5EC65FC7CED
SHA256:5822DBEA81C1CB2F7423CD090E1D36C4407F840E7DC5F582C9243A004DDC937B
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\energyzer[1].htmhtml
MD5:25A5C91DBFCB0266A75452635F5B6006
SHA256:4F69CFF74099C566A98F07FD6E37D4F2FE036458E7FA19C97326A7295B36407F
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\lazy-images.min[1].jstext
MD5:A98841A9C05ABE0426B0935AFC965C06
SHA256:245E542EFDED75AF621B3A93818490CD57DF8A41DA0333184F643E2071C9EA0E
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\expressCheckout.min[1].jstext
MD5:66DC7E457890B1E13BDCC0A644599120
SHA256:0C5C88A6438A05E755A3E36CE44B2838CBC58B79A59DBFF1A51F589DC0247E98
2776iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\layout.min[1].csstext
MD5:79FC427301BA091CCD49FE610B8EE560
SHA256:7DB6B5AF1A72ABA5605285BCD4B21D9C7D95C7702852CC468E4794551837AEE8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
64
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
2776
iexplore.exe
GET
200
2.16.186.11:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOf3T3%2F%2BLs%2FTjvJ8699X9l9rA%3D%3D
unknown
der
527 b
whitelisted
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
der
727 b
whitelisted
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
der
727 b
whitelisted
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
2776
iexplore.exe
GET
301
172.67.220.220:80
http://www.workshop-spiele.de/category/energyzer/
US
html
258 b
unknown
2776
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2776
iexplore.exe
172.67.220.220:80
www.workshop-spiele.de
US
unknown
2776
iexplore.exe
151.101.2.109:443
cdn.jsdelivr.net
Fastly
US
suspicious
2776
iexplore.exe
172.67.220.220:443
www.workshop-spiele.de
US
unknown
2776
iexplore.exe
104.111.228.123:443
www.paypalobjects.com
Akamai International B.V.
NL
unknown
2776
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2776
iexplore.exe
192.0.77.37:443
c0.wp.com
Automattic, Inc
US
suspicious
3428
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2776
iexplore.exe
151.139.128.14:80
ocsp.comodoca.com
Highwinds Network Group, Inc.
US
suspicious
2776
iexplore.exe
184.31.82.203:443
t.paypal.com
Akamai International B.V.
NL
whitelisted
2776
iexplore.exe
192.0.76.3:443
stats.wp.com
Automattic, Inc
US
suspicious

DNS requests

Domain
IP
Reputation
www.workshop-spiele.de
  • 172.67.220.220
  • 104.31.83.10
  • 104.31.82.10
unknown
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
c0.wp.com
  • 192.0.77.37
whitelisted
www.workshop-spiele.dewp-content
unknown
www.paypalobjects.com
  • 104.111.228.123
whitelisted
cdn.jsdelivr.net
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
plausible.io
  • 157.230.103.136
  • 142.93.108.123
whitelisted
i2.wp.com
  • 192.0.77.2
whitelisted

Threats

No threats detected
No debug info