analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://agrebeldinger.clickfunnels.com/optin1649750667827

Full analysis: https://app.any.run/tasks/4479f5b0-f669-4f3e-a22b-dba81d0c511c
Verdict: Malicious activity
Analysis date: May 20, 2022, 20:03:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

4C5716C89A66742740B5D650552CD26A

SHA1:

C89D623D9BB17DD39553656F97857690A382CA79

SHA256:

4600240D9A44D6E696B02A84F9B701811A58C464B2FD282567D9800FFF4EF440

SSDEEP:

3:N8JigM2AbG6etIRVRFs5TSdXSn:2oJntecVI5L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3340)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2860)
      • iexplore.exe (PID: 3340)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3340)
      • iexplore.exe (PID: 2860)
    • Reads the computer name

      • iexplore.exe (PID: 3340)
      • iexplore.exe (PID: 2860)
    • Application launched itself

      • iexplore.exe (PID: 2860)
    • Changes internet zones settings

      • iexplore.exe (PID: 2860)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3340)
      • iexplore.exe (PID: 2860)
    • Creates files in the user directory

      • iexplore.exe (PID: 3340)
      • iexplore.exe (PID: 2860)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3340)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2860"C:\Program Files\Internet Explorer\iexplore.exe" "https://agrebeldinger.clickfunnels.com/optin1649750667827"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3340"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2860 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
12 202
Read events
12 089
Write events
113
Delete events
0

Modification events

(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30960772
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30960772
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2860) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
7
Text files
24
Unknown types
4

Dropped files

PID
Process
Filename
Type
3340iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\YZ0I7MZC.txttext
MD5:80D99A1E3E4582FDC9A04877D99A5C28
SHA256:B2748C4578315B576FF556FDD1C7BB0583E761E0F0164803CDB47C2F82D8F244
3340iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\KI8V29RX.txttext
MD5:6397ACBB2639E9B6061A76A75ED338DE
SHA256:890F031A716E36C74A4962ED0E4BB1E616669EA07DB2101FD32359B20F7C5DAF
3340iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\H0BKVUNL.txttext
MD5:B3F85ED24291C85B545E6128A62EA6B9
SHA256:534F77E7B4B5C2F6B365331E52CE59F76F8843B335C2C693057D08C1FA63D42A
2860iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:1C84AAC4BA312AD9CE64FE19FCFA3B73
SHA256:5189C4B4E70DDB75563C722F822D3CF7E61BBF8FEC9802A040A2EA490C0865A0
3340iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\2FBZAAB2.txttext
MD5:ECF1212F8309881AC0A0814578C84B6B
SHA256:BC7D69BAC3AE73DAA7D5376E1668AB74DC5A3DD7D216FF0B61166D643B12F80E
3340iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:7AD81D029A426E52614651B548A136F1
SHA256:55306296E598222FB3DFB6254AA0A99B469E2E215AB01C967ADC049D1A9A92F9
3340iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:5C1113B7526A7723B64400D44129FA78
SHA256:9ECC27C740862AB2712DA2C4FF31592E2C0A8643576E64551EE344A73FBE2494
3340iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\v1[1].jshtml
MD5:A91B43B7E2E06ED618DBF6EE8BA4F637
SHA256:D59183B623B80B4E5DB53CB0402516B70E3CA6341B555CCA40F5F84A7A84124B
3340iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_119B7D7B0D2C01F93010581FDB010927binary
MD5:DDE6EB2852D301625F9024A7F5149395
SHA256:2096D4D2B8C6B8EEC2D0F4435EA16C9A8911F051B6F49F251782C896CBBD9C30
3340iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_119B7D7B0D2C01F93010581FDB010927der
MD5:A7EEA915598018EC66CC06711A66358F
SHA256:CC5604991E7073152A72553E365BFD57D996EE1F0E6ACCA54C2211A3ACAD0D07
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
27
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2860
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3340
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
3340
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEAmppp1anPaBuqdXtmdSV6g%3D
US
der
280 b
whitelisted
2860
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3340
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?28a000374674e96d
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2860
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3340
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3340
iexplore.exe
104.16.15.194:443
agrebeldinger.clickfunnels.com
Cloudflare Inc
US
shared
2860
iexplore.exe
104.16.15.194:443
agrebeldinger.clickfunnels.com
Cloudflare Inc
US
shared
2860
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3340
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
104.16.15.194:443
agrebeldinger.clickfunnels.com
Cloudflare Inc
US
shared
2860
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
104.16.14.194:443
agrebeldinger.clickfunnels.com
Cloudflare Inc
US
shared
3340
iexplore.exe
104.16.13.194:443
agrebeldinger.clickfunnels.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
agrebeldinger.clickfunnels.com
  • 104.16.15.194
  • 104.16.14.194
  • 104.16.13.194
  • 104.16.12.194
  • 104.16.16.194
malicious
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info