URL:

https://u.pcloud.link/publink/show?code=8aA

Full analysis: https://app.any.run/tasks/fdcc7155-b9b7-45d0-bbfe-0c438f59a3fc
Verdict: Malicious activity
Analysis date: May 30, 2020, 16:38:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

9933C95EB3AB2AB0294AB670BE281A3C

SHA1:

B2ED5E101612AEDB6EB6BAB90851784F70768C58

SHA256:

485BAF1D5C34C79A03E909BD02A4D8D456F27F39F055009C4B08BB267C65E382

SSDEEP:

3:N8sVnLoHCokGk:2sCiodk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • LoL Hack & Cheat Map Hacks.exe (PID: 184)
      • LoL Hack & Cheat Map Hacks.exe (PID: 384)
    • Changes settings of System certificates

      • LoL Hack & Cheat Map Hacks.exe (PID: 384)
      • LoL Hack & Cheat Map Hacks.exe (PID: 184)
  • SUSPICIOUS

    • Executed via COM

      • DllHost.exe (PID: 3484)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2712)
    • Adds / modifies Windows certificates

      • LoL Hack & Cheat Map Hacks.exe (PID: 384)
      • LoL Hack & Cheat Map Hacks.exe (PID: 184)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 2384)
      • iexplore.exe (PID: 2544)
    • Changes internet zones settings

      • iexplore.exe (PID: 2416)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2416)
      • iexplore.exe (PID: 2384)
      • iexplore.exe (PID: 2544)
    • Creates files in the user directory

      • iexplore.exe (PID: 2384)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2416)
    • Application launched itself

      • iexplore.exe (PID: 2416)
    • Reads settings of System Certificates

      • LoL Hack & Cheat Map Hacks.exe (PID: 384)
      • iexplore.exe (PID: 2384)
      • iexplore.exe (PID: 2544)
      • iexplore.exe (PID: 2416)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2416)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2416)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe iexplore.exe iexplore.exe winrar.exe lol hack & cheat map hacks.exe lol hack & cheat map hacks.exe PhotoViewer.dll no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
184"C:\Users\admin\AppData\Local\Temp\Rar$EXa2712.11716\LoL Hack & Cheat Map Hacks\LoL Hack & Cheat Map Hacks.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2712.11716\LoL Hack & Cheat Map Hacks\LoL Hack & Cheat Map Hacks.exe
WinRAR.exe
User:
admin
Company:
The ICU Project
Integrity Level:
MEDIUM
Description:
ICU Data DLL
Exit code:
0
Version:
53, 1, 0, 0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2712.11716\lol hack & cheat map hacks\lol hack & cheat map hacks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
384"C:\Users\admin\AppData\Local\Temp\Rar$EXa2712.11753\LoL Hack & Cheat Map Hacks\LoL Hack & Cheat Map Hacks.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2712.11753\LoL Hack & Cheat Map Hacks\LoL Hack & Cheat Map Hacks.exe
WinRAR.exe
User:
admin
Company:
The ICU Project
Integrity Level:
MEDIUM
Description:
ICU Data DLL
Exit code:
0
Version:
53, 1, 0, 0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2712.11753\lol hack & cheat map hacks\lol hack & cheat map hacks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2384"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2416 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2416"C:\Program Files\Internet Explorer\iexplore.exe" https://u.pcloud.link/publink/show?code=8aAC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2544"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2416 CREDAT:1053959 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2712"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\LoL Hack & Cheat Map Hacks.zip"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3484C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3976"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa2712.11900\READMY.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
11 715
Read events
2 453
Write events
6 208
Delete events
3 054

Modification events

(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
3879178166
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30815904
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000A1000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2416) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
73
Text files
48
Unknown types
37

Dropped files

PID
Process
Filename
Type
2384iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabB222.tmp
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarB223.tmp
MD5:
SHA256:
2416iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_AD59C201C52F2EA45B60DE6C0B473A40der
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\show[1].htmhtml
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2EE749B7E1A15635422518BB5EBFD338_388E20A320CEBA7AEDB565C151C4A458der
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBder
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_7DC3E633EDFAEFC3AA3C99552548EC2Fbinary
MD5:
SHA256:
2384iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
71
DNS requests
30
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2384
iexplore.exe
GET
35.158.10.169:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBQizVAdki5cQPHmWNk6O3DgVg1ovgQUkRlirVsXpzD78N45JbG9jLm4UScCFCQaPeAVhxCmyWGJqV9iMv93uJYJ
DE
whitelisted
2384
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEAQoXs0GkwDRCAAAAAA%2Bvho%3D
US
der
471 b
whitelisted
2384
iexplore.exe
GET
200
35.158.10.169:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBQizVAdki5cQPHmWNk6O3DgVg1ovgQUkRlirVsXpzD78N45JbG9jLm4UScCFCQaPeAVhxCmyWGJqV9iMv93uJYJ
DE
der
1.54 Kb
whitelisted
2384
iexplore.exe
GET
200
35.158.10.169:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTyhcKR1A4XhQLFZRt5u%2BT8TDsYdQQUGoRivEhMMyUE1O7Q9gPEGUbRlGsCFEiYLeKpLLM54cj5MzWCddPk%2BIJV
DE
der
1.78 Kb
whitelisted
2384
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRyyuDOSqb8BtprWZSAvBT9kFoYdwQU%2BftQxItnu2dk%2FoMhpqnOP1WEk5kCECDJGUwBrGnx4AjOSmT2OJk%3D
US
der
471 b
whitelisted
2384
iexplore.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDkbwjNvPLFRm7zMB3V80
US
der
1.49 Kb
whitelisted
2384
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2384
iexplore.exe
GET
200
35.158.10.169:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBQizVAdki5cQPHmWNk6O3DgVg1ovgQUkRlirVsXpzD78N45JbG9jLm4UScCFCQaPeAVhxCmyWGJqV9iMv93uJYJ
DE
der
1.54 Kb
whitelisted
2384
iexplore.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEQCTi7COYph7T3X5jLalBFyW
US
der
728 b
whitelisted
2384
iexplore.exe
GET
200
35.158.10.169:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTyhcKR1A4XhQLFZRt5u%2BT8TDsYdQQUGoRivEhMMyUE1O7Q9gPEGUbRlGsCFEiYLeKpLLM54cj5MzWCddPk%2BIJV
DE
der
1.78 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2384
iexplore.exe
104.18.20.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared
2384
iexplore.exe
151.101.2.109:443
cdn.polyfill.io
Fastly
US
suspicious
2384
iexplore.exe
35.158.10.169:80
ocsp.quovadisglobal.com
Amazon.com, Inc.
DE
whitelisted
2384
iexplore.exe
172.217.22.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2384
iexplore.exe
216.58.212.163:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2384
iexplore.exe
216.58.210.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2384
iexplore.exe
157.240.20.19:443
connect.facebook.net
Facebook, Inc.
US
whitelisted
2384
iexplore.exe
74.120.9.90:443
api.pcloud.com
Lemuria Communications Inc.
US
malicious
2384
iexplore.exe
151.101.112.157:443
static.ads-twitter.com
Fastly
US
suspicious
2384
iexplore.exe
74.120.9.121:443
api.pcloud.com
Lemuria Communications Inc.
US
malicious

DNS requests

Domain
IP
Reputation
u.pcloud.link
  • 74.120.9.123
  • 74.120.9.93
  • 74.120.8.102
  • 74.120.8.105
  • 74.120.8.103
  • 74.120.8.104
  • 74.120.10.7
  • 74.120.8.110
  • 74.120.8.115
  • 74.120.10.5
  • 74.120.9.66
  • 74.120.10.6
  • 74.120.9.94
suspicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.usertrust.com
  • 151.139.128.14
whitelisted
fonts.googleapis.com
  • 216.58.208.42
whitelisted
pcdn-u.pcloud.com
  • 185.82.210.141
suspicious
cdn.polyfill.io
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp.quovadisglobal.com
  • 35.158.10.169
whitelisted
ocsp.pki.goog
  • 216.58.212.163
whitelisted

Threats

Found threats are available for the paid subscriptions
12 ETPRO signatures available at the full report
No debug info