analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://box2012.temp.domains/~chwsolut/services.html

Full analysis: https://app.any.run/tasks/0c594c04-a894-4e7f-bf5f-db4d7437de62
Verdict: Malicious activity
Analysis date: March 14, 2019, 20:21:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MD5:

99E91541D62131B85181EF730964DB06

SHA1:

8FA122A5C04B69DC23C980E642F304CA0576DF1C

SHA256:

42A1B5A13BD268ABBE8489088109A1C7B0A5E32ED267476D227435BAF352356A

SSDEEP:

3:N1KcA+KIXKS1aSWS7XAGQn:CcA+KIXx/TAGQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3632)
      • iexplore.exe (PID: 3516)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3516)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3516)
    • Application launched itself

      • iexplore.exe (PID: 2864)
    • Changes internet zones settings

      • iexplore.exe (PID: 2864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2864"C:\Program Files\Internet Explorer\iexplore.exe" http://box2012.temp.domains/~chwsolut/services.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3516"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2864 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3632C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Total events
449
Read events
379
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
37
Unknown types
5

Dropped files

PID
Process
Filename
Type
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\849-layout[1].csstext
MD5:CEE165F8D348BE1DC2557C56434F6BBB
SHA256:EC0909A0A784320EF760F20B25998B9A2C673B8E65CB6F85CCA65FF932A5D464
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\services[1].htmlhtml
MD5:01750AA5D6F488CA942F80D72B370174
SHA256:DA2F03D5A6505A332A5AEBBF6AC5766C044722C21BB0780316245DB44280D149
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\style[1].csstext
MD5:0D3B750FEE57E1A962495944D39755B2
SHA256:31955E986FA380B543ED7171A77AB2E2734150B1A7130C1A5537FCB5B16AE424
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\jssor[1].jstext
MD5:1397A8A69723F763949DE3A6014A85DE
SHA256:504984DF1C171AD985CA44AF299019CB992F679C7CE1CE989E3A45F177142A9F
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\helper[1].jstext
MD5:0AF11E80E33169AB815F9AB2721C3745
SHA256:F85F1CE135B6810B880273CD052B8A5CC1B4A96936A2AD9D8F0F83A8EE0B0CFA
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\respond.min[1].jshtml
MD5:9CCCBCD9BC6AED2BB14DF1013E185CE3
SHA256:82069C15EDD6943DFAA59F5AC3F6ACC86FD44A28FE925E410CCDCADEC194A8BA
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\wp-emoji-release.min[1].jstext
MD5:C17B309D8AB4B4E9653876D3C35C397D
SHA256:C533B791A8EEF65604F15D20433506E1614C693EEBA9DF749E8A7677E43B466C
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\bootstrap.min[1].csstext
MD5:2F624089C65F12185E79925BC5A7FC42
SHA256:EECE6E0C65B7007AB0EB1B4998D36DAFE381449525824349128EFC3F86F4C91C
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\font-awesome.min[1].csstext
MD5:0831CBA6A670E405168B84AA20798347
SHA256:936FFCCDC35BC55221E669D0E76034AF76BA8C080C1B1149144DBBD3B5311829
3516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\underscore.min[1].jstext
MD5:0BD7146B45C933AD9BFE210A41CD79B1
SHA256:EDE1815B17E451C16258034BCF89A7957256C67884AEFFFEFBB97020770FDC06
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
47
TCP/UDP connections
12
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-includes/css/dist/block-library/style.min.css?ver=5.1.1
US
text
5.07 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-content/themes/dazzling/inc/css/bootstrap.min.css?ver=5.1.1
US
text
24.4 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-content/plugins/slider/js/jssor.js?ver=5.1.1
US
text
32.1 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-content/uploads/bb-plugin/cache/849-layout.css?ver=1e5128d0462f9a847fa4408c45729b21
US
text
6.10 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-content/plugins/slider/js/helper.js?ver=5.1.1
US
text
2.17 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-content/themes/dazzling/style.css?ver=5.1.1
US
text
6.96 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-content/themes/dazzling/inc/css/font-awesome.min.css?ver=5.1.1
US
text
6.69 Kb
suspicious
3516
iexplore.exe
GET
200
2.16.186.83:80
http://a.vimeocdn.com/js/froogaloop2.min.js?ver=5.1.1
unknown
text
735 b
whitelisted
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/services.html
US
html
7.07 Kb
suspicious
3516
iexplore.exe
GET
200
74.220.219.168:80
http://box2012.temp.domains/~chwsolut/wp-includes/js/wp-emoji-release.min.js?ver=5.1.1
US
text
4.79 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3516
iexplore.exe
172.217.18.174:80
www.google-analytics.com
Google Inc.
US
whitelisted
2864
iexplore.exe
74.220.219.168:80
box2012.temp.domains
Unified Layer
US
suspicious
3516
iexplore.exe
2.16.186.83:80
a.vimeocdn.com
Akamai International B.V.
whitelisted
2864
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3516
iexplore.exe
74.220.219.168:80
box2012.temp.domains
Unified Layer
US
suspicious

DNS requests

Domain
IP
Reputation
box2012.temp.domains
  • 74.220.219.168
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
a.vimeocdn.com
  • 2.16.186.83
  • 2.16.186.49
whitelisted
www.google-analytics.com
  • 172.217.18.174
whitelisted
chwsolutions.com
  • 74.220.219.168
suspicious

Threats

PID
Process
Class
Message
3516
iexplore.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
3516
iexplore.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
3516
iexplore.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
No debug info