URL:

https://fluxus.mobi/

Full analysis: https://app.any.run/tasks/546b151a-47fc-430a-92ef-5e6bddada8f8
Verdict: Malicious activity
Analysis date: March 08, 2024, 18:38:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

433E5C984A9BC0DD6134B052001D802A

SHA1:

428BAF2E6FF960E7584CD327B9C136C3BC4A2901

SHA256:

4A89533B4816EDD6283C78D25D6EEAE5F7A4E2AAFCD7D34C739D5694B3C85951

SSDEEP:

3:N8UdX3sK:223sK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • Fluxus V7.exe (PID: 3976)
      • Fluxus V7.exe (PID: 3620)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2000)
    • Manual execution by a user

      • WinRAR.exe (PID: 2000)
      • Fluxus V7.exe (PID: 680)
      • Fluxus V7.exe (PID: 3976)
      • Fluxus V7.exe (PID: 3620)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3536)
      • WinRAR.exe (PID: 2000)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3536)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2000)
    • Application launched itself

      • iexplore.exe (PID: 3536)
    • Checks supported languages

      • Fluxus V7.exe (PID: 3976)
      • Fluxus V7.exe (PID: 3620)
    • Reads the computer name

      • Fluxus V7.exe (PID: 3976)
      • Fluxus V7.exe (PID: 3620)
    • Reads the machine GUID from the registry

      • Fluxus V7.exe (PID: 3976)
      • Fluxus V7.exe (PID: 3620)
    • Reads Environment values

      • Fluxus V7.exe (PID: 3976)
      • Fluxus V7.exe (PID: 3620)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe winrar.exe fluxus v7.exe no specs fluxus v7.exe fluxus v7.exe

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Users\admin\Downloads\Fluxus\Fluxus V7.exe" C:\Users\admin\Downloads\Fluxus\Fluxus V7.exeexplorer.exe
User:
admin
Company:
Fluxteam
Integrity Level:
MEDIUM
Description:
Fluxus
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\fluxus\fluxus v7.exe
c:\windows\system32\ntdll.dll
2000"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\Fluxus.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3536"C:\Program Files\Internet Explorer\iexplore.exe" "https://fluxus.mobi/"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3620"C:\Users\admin\Downloads\Fluxus\Fluxus V7.exe" C:\Users\admin\Downloads\Fluxus\Fluxus V7.exe
explorer.exe
User:
admin
Company:
Fluxteam
Integrity Level:
HIGH
Description:
Fluxus
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\fluxus\fluxus v7.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3732"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3536 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3976"C:\Users\admin\Downloads\Fluxus\Fluxus V7.exe" C:\Users\admin\Downloads\Fluxus\Fluxus V7.exe
explorer.exe
User:
admin
Company:
Fluxteam
Integrity Level:
HIGH
Description:
Fluxus
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\downloads\fluxus\fluxus v7.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
30 637
Read events
30 437
Write events
162
Delete events
38

Modification events

(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31093127
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31093127
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3536) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
1
Suspicious files
31
Text files
95
Unknown types
18

Dropped files

PID
Process
Filename
Type
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\375RQGMT.htmhtml
MD5:F1631D70C2C7174C25BC29CA2239BA36
SHA256:1EC33DE6DB884C8FA5531A0064DD708215BAB9583205B2CE37D97CEFA1EED6C2
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\post-5[1].csstext
MD5:3F2A9EF97529A350E6189FA88FA560DE
SHA256:D8AEE999478FC93C386739FA717AA8623C70AE6306002683390C9A1D0C3F70FB
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\header.min[1].csstext
MD5:3E4ABAA77D9CEC962A9367CD0482D170
SHA256:E776A7F761E5975D81C3D8A5ECE5139FC9AC0DD13E3C494A941CF34C7A426EF8
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\brands.min[1].csstext
MD5:144E43C3B3D8EA5B278C062C202C92F2
SHA256:9CD63B8CEA25045C14623C538D26752518A58C0C682795CE6AD3078976C65A37
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\frontend-lite.min[1].csstext
MD5:788883FA142B0B5FDB6C795072AC213F
SHA256:3C9EF71CB1059C3B6059B62872BB1CB9EAEA460B73ECD5431A8B3FE719A131D7
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\content.min[1].csstext
MD5:9ACB830371E27A4371CCE079BC3E6316
SHA256:B1BC53033D3CFC5F7C22AF24A9512F3FF21170B8B500ED0AE7E5BC8CB1BB8AC6
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\footer.min[1].csstext
MD5:1A577CF8E4F855F5F02812A1E86F3AB7
SHA256:43C239F270B71525869B3A8FCFBAA2BEF403B6A7E8656B471B2F5A685E3431B2
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\swiper.min[1].csstext
MD5:A2431BC290CF34E330E11EC4CFCE1247
SHA256:C57E64FCB72BDDAFA9C38DE574441C3E69AC6C961DF96B0CAD34DA83658BD196
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\elementor-icons.min[1].csstext
MD5:45F978120A537B249DFAC36306ED5471
SHA256:67AC597BED179B5842D996FAD80472C6B9514EDDE408ADE8B892161BCF9E9C88
3732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\post-10[1].csstext
MD5:F9A5B6BD788CD2046989A0650A867173
SHA256:CC0513BCB40B3DB5EB71F0E0716B351040F47AAE3671507CBFC88C72041BB8E6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
73
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3732
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
binary
724 b
unknown
3732
iexplore.exe
GET
304
2.16.197.214:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?545e1839169dd0e6
unknown
unknown
3732
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
3732
iexplore.exe
GET
304
2.16.197.214:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5b0325f31ae0f9b6
unknown
unknown
3732
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
unknown
binary
724 b
unknown
3732
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEH6FWuT3fbHwEAPEHSB2q%2B0%3D
unknown
binary
471 b
unknown
3732
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCimReIRyQtphKmdTNhBzaE
unknown
binary
472 b
unknown
3732
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQC%2BP0iGO7o7nQoIudW3BwdU
unknown
binary
472 b
unknown
3536
iexplore.exe
GET
304
2.16.197.214:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?96c8eb5dfc595a04
unknown
unknown
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
binary
1.47 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
3732
iexplore.exe
188.114.97.3:443
fluxus.mobi
CLOUDFLARENET
NL
unknown
3732
iexplore.exe
2.16.197.214:80
ctldl.windowsupdate.com
Akamai International B.V.
BR
unknown
3536
iexplore.exe
2.16.197.71:443
www.bing.com
Akamai International B.V.
BR
unknown
4
System
192.168.100.255:138
whitelisted
3732
iexplore.exe
142.250.185.195:80
ocsp.pki.goog
GOOGLE
US
whitelisted
3732
iexplore.exe
142.250.186.170:443
fonts.googleapis.com
GOOGLE
US
whitelisted
3732
iexplore.exe
216.58.206.40:443
www.googletagmanager.com
GOOGLE
US
unknown
3732
iexplore.exe
216.58.206.34:443
pagead2.googlesyndication.com
GOOGLE
US
unknown
3732
iexplore.exe
104.20.67.115:443
s10.histats.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
fluxus.mobi
  • 188.114.97.3
  • 188.114.96.3
unknown
ctldl.windowsupdate.com
  • 2.16.197.214
  • 2.16.197.207
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 2.16.197.71
  • 2.16.197.78
  • 2.16.197.72
  • 2.16.197.81
  • 2.16.197.82
  • 2.16.197.86
whitelisted
ocsp.pki.goog
  • 142.250.185.195
whitelisted
fonts.googleapis.com
  • 142.250.186.170
whitelisted
www.googletagmanager.com
  • 216.58.206.40
whitelisted
pagead2.googlesyndication.com
  • 216.58.206.34
whitelisted
s10.histats.com
  • 104.20.67.115
  • 104.20.66.115
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

No threats detected
No debug info