| URL: | https://blakemag.com/road-trip-test-bmw-vs-triumph/ |
| Full analysis: | https://app.any.run/tasks/3affea36-87d0-45e2-8486-3136144d8198 |
| Verdict: | Malicious activity |
| Analysis date: | April 29, 2024, 07:00:47 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 6A54415F14699AA9F56C2A6C0E32666E |
| SHA1: | 65905899A51F02EB62E0B8F4346AF2A44942C885 |
| SHA256: | 423A846C69266230D0444536EAD3F5D92FF638C727C40F0D7B7CB44B4A821E9A |
| SSDEEP: | 3:N8A6RXpscTWYITphfn:2A6PTejfn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2028 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3964 | "C:\Program Files\Internet Explorer\iexplore.exe" "https://blakemag.com/road-trip-test-bmw-vs-triumph/" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 4024 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3964 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 31103490 | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 214379664 | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 31103491 | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3964) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\road-trip-test-bmw-vs-triumph[1].htm | html | |
MD5:2A3F9D1202403FA08C2D6F00C751D34F | SHA256:3AA9850E897E16408DDAAAAD1DE4C7F9A9BBD5ADB12106B8E930D2348E649B1C | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\ruby-responsive[1].css | text | |
MD5:D2AE12EE3BC852058C797CEA55886790 | SHA256:78A7F7BED44EC2FB9BBC916E9B37256F5BEC308140F070817BDE4E228CB21E8A | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 | der | |
MD5:822467B728B7A66B081C91795373789A | SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9 | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:C8E773DE67B01B07BA36A1F92FDBC526 | SHA256:1550D7BD4B1C2AB653369DC84D20AB30764595A35BCB14E8E3C3ACB398050D4A | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0CFA9A8301B4AF356A0DFAC74F1640F9 | der | |
MD5:592F87E2AE3D8377333618810FDE7E98 | SHA256:C070A37308DAA3AE8EB4ED68CF1BAA34A0384A6D1F5942039839A0A16DC39BBF | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jquery-migrate.min[1].js | binary | |
MD5:79B4956B7EC478EC10244B5E2D33AC7D | SHA256:029E0A2E809FD6B5DBE76ABE8B7A74936BE306C9A8C27C814C4D44AA54623300 | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:5C59061286C17B01A9D2E5CC50C437BA | SHA256:588E27461C8FCB2B699CD6B8B713EA8AB0A39158F5F23946809ECBA1CEE75A18 | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ruby-style[1].css | text | |
MD5:AEAAC9D42E9EBE72E387FD1504A555F1 | SHA256:FAD7ADDC55D61133C7824CB2CB25547A36E87C6D36372076F721B6AA9B8B66E4 | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\animation[1].css | text | |
MD5:1FA6EEE79FAB511A63609DE851EA2CF7 | SHA256:C6D2D3CFF0BBB71A13A17627DB5180499941F7AAF58064C080600FBDFC4D62FB | |||
| 4024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\ruby-shortcodes-script[1].js | text | |
MD5:BC353578B2653C8107A537FCA2312E4F | SHA256:AB757D1D7CB91490D8D8F71262DC1DC2B70F500C7FF80D04E69840267CC77CCA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4024 | iexplore.exe | GET | 304 | 95.101.54.123:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9b5f474efa3999f3 | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 142.250.186.35:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDq8VlpL7aJJwm1OnoGOVwL | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 95.101.54.139:80 | http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgTIZwYKHn%2BDuJrF2oz7hrVQsg%3D%3D | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 304 | 95.101.54.217:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?068eb670bb243701 | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 2.19.105.18:80 | http://x1.c.lencr.org/ | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 142.250.186.35:80 | http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEFFNAL5y0qOaCU1agms6UWo%3D | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 142.250.186.35:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 104.18.38.233:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 142.250.186.35:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCNbnFNjxLCZRKVsCHt2Y3B | unknown | — | — | unknown |
4024 | iexplore.exe | GET | 200 | 104.18.38.233:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCECO3bePBuysaUZYeCOq3ZOg%3D | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4024 | iexplore.exe | 91.121.179.87:443 | blakemag.com | OVH SAS | FR | unknown |
4024 | iexplore.exe | 95.101.54.217:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
4024 | iexplore.exe | 95.101.54.123:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
4024 | iexplore.exe | 2.19.105.18:80 | x1.c.lencr.org | AKAMAI-AS | DE | unknown |
4024 | iexplore.exe | 95.101.54.139:80 | r3.o.lencr.org | Akamai International B.V. | DE | unknown |
4024 | iexplore.exe | 142.250.186.106:443 | fonts.googleapis.com | GOOGLE | US | whitelisted |
4024 | iexplore.exe | 142.250.185.136:443 | www.googletagmanager.com | GOOGLE | US | unknown |
Domain | IP | Reputation |
|---|---|---|
blakemag.com |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
fonts.googleapis.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
www.youtube.com |
| whitelisted |
region1.google-analytics.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1088 | svchost.exe | A Network Trojan was detected | ET MALWARE SocGholish Domain in DNS Lookup (trademark .iglesiaelarca .com) |
1088 | svchost.exe | Exploit Kit Activity Detected | ET EXPLOIT_KIT Fake Browser Update Domain in DNS Lookup (ipscanadvsf .com) |
4024 | iexplore.exe | Misc activity | ET INFO Observed ZeroSSL SSL/TLS Certificate |
4024 | iexplore.exe | Misc activity | ET INFO Observed ZeroSSL SSL/TLS Certificate |
4024 | iexplore.exe | Exploit Kit Activity Detected | ET EXPLOIT_KIT Fake Browser Update Domain in TLS SNI (ipscanadvsf .com) |
4024 | iexplore.exe | Exploit Kit Activity Detected | ET EXPLOIT_KIT Fake Browser Update Domain in TLS SNI (ipscanadvsf .com) |