analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://tiothralad.duckdns.org

Full analysis: https://app.any.run/tasks/36d1b9fd-433f-443a-ba97-5004666ef11f
Verdict: Malicious activity
Analysis date: October 20, 2020, 05:17:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

082A38FE32F42AD5D44FF3F7758F407A

SHA1:

EE7223C480135B90BE50C3CF2DEC8B31CB48FFB8

SHA256:

4BF804919B59119D5044135021E200795D57D29F360503E4D112E5CF9F5F560E

SSDEEP:

3:N1KKMKFEKsGEWf:CKHBsGEWf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2472)
    • Changes internet zones settings

      • iexplore.exe (PID: 2472)
    • Application launched itself

      • iexplore.exe (PID: 2472)
      • firefox.exe (PID: 3376)
      • firefox.exe (PID: 1944)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2472)
      • firefox.exe (PID: 1944)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2472)
    • Manual execution by user

      • firefox.exe (PID: 3376)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2472)
    • Creates files in the user directory

      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2472)
      • firefox.exe (PID: 1944)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1516)
    • Creates files in the program directory

      • firefox.exe (PID: 1944)
    • Reads CPU info

      • firefox.exe (PID: 1944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
8
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
2472"C:\Program Files\Internet Explorer\iexplore.exe" http://tiothralad.duckdns.orgC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1516"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2472 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3376"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
1944"C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
3256"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1944.0.710060935\514435658" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1944 "\\.\pipe\gecko-crash-server-pipe.1944" 1184 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
2980"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1944.3.966330579\1647940825" -childID 1 -isForBrowser -prefsHandle 1728 -prefMapHandle 1724 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1944 "\\.\pipe\gecko-crash-server-pipe.1944" 1748 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
2624"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1944.13.106617436\1183558102" -childID 2 -isForBrowser -prefsHandle 2948 -prefMapHandle 2952 -prefsLen 5996 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1944 "\\.\pipe\gecko-crash-server-pipe.1944" 2960 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
2760"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1944.20.578801711\2077108504" -childID 3 -isForBrowser -prefsHandle 3604 -prefMapHandle 3616 -prefsLen 7565 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 1944 "\\.\pipe\gecko-crash-server-pipe.1944" 3632 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Total events
1 069
Read events
947
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
80
Text files
72
Unknown types
64

Dropped files

PID
Process
Filename
Type
1516iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\GE5EE42T.txt
MD5:
SHA256:
1516iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZQWLXT97.txt
MD5:
SHA256:
1516iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab4480.tmp
MD5:
SHA256:
1516iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar4481.tmp
MD5:
SHA256:
1516iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZLWSX7CB.txttext
MD5:E3A86ACD20C09D090368B37EE20E0F76
SHA256:6E2237F1C1F24897D6AE8637DD7F99C1649AC333E6D3B20C16519C2DE68AEDD5
1516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:F67A32081047EA2F12F6D47EF60C22E4
SHA256:8C0EDA943303F3C8095C53E7AA680C460EE7779225F2656C4492084C70AE7C7B
1516iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\31G3I3KE.txttext
MD5:BF21B16C76F1F485259AEA149FA81F94
SHA256:277F78F26C5C4B7B8F04F970E3AFA65A383CCC8890D1B0761094BFD06E74EB06
1516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\question2answer-qa-logo-white-454x40[1].pngimage
MD5:EC11DE632ED97F965EA70CE3AFE50608
SHA256:5DED4A46691B3EE6CB10D3608CA01655A42A8089633814786ED9C18FE8F73BEF
1516iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\a_004[1].jpgimage
MD5:576B10239013F4202A796AA2E915F209
SHA256:22A0FED477E50EBCF6AF81AF036D1D1D999018325918BDA640EBEE4F1EC96A32
1516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:3723741C1AA80B2A2A7B00DD6B287332
SHA256:813E1EB25265A8393B42848323A14C17C233E7DCA9C5E6996C95734F2498969C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
50
DNS requests
85
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1516
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
1516
iexplore.exe
GET
200
151.139.236.246:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I
US
der
1.63 Kb
whitelisted
1944
firefox.exe
GET
302
185.162.9.176:80
http://tiothralad.duckdns.org/
NL
malicious
1516
iexplore.exe
GET
200
151.139.236.246:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I
US
der
1.63 Kb
whitelisted
1516
iexplore.exe
GET
200
5.45.205.241:80
http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEDa8vXdAngh37rPnjRFyHyk%3D
RU
der
1.48 Kb
whitelisted
1516
iexplore.exe
GET
200
151.139.236.246:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso
US
der
1.58 Kb
whitelisted
1516
iexplore.exe
GET
302
185.162.9.176:80
http://tiothralad.duckdns.org/
NL
malicious
1516
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.30 Kb
whitelisted
1516
iexplore.exe
GET
200
5.45.205.241:80
http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEDa8vXdAngh37rPnjRFyHyk%3D
RU
der
1.48 Kb
whitelisted
1516
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEASN0yBwImska04MqUNKUKI%3D
US
der
279 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1516
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1516
iexplore.exe
77.88.21.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted
1516
iexplore.exe
5.45.205.241:80
yandex.ocsp-responder.com
YANDEX LLC
RU
whitelisted
1516
iexplore.exe
185.162.9.176:80
tiothralad.duckdns.org
WorldStream B.V.
NL
malicious
1516
iexplore.exe
151.139.236.246:80
subca.ocsp-certum.com
netDNA
US
unknown
2472
iexplore.exe
104.28.15.209:443
findsqa.online
Cloudflare Inc
US
shared
1516
iexplore.exe
104.28.15.209:443
findsqa.online
Cloudflare Inc
US
shared
1944
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
2472
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2472
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
tiothralad.duckdns.org
  • 185.162.9.176
malicious
findsqa.online
  • 104.28.15.209
  • 172.67.168.68
  • 104.28.14.209
suspicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
mc.yandex.ru
  • 77.88.21.119
  • 87.250.251.119
  • 87.250.250.119
  • 93.158.134.119
whitelisted
subca.ocsp-certum.com
  • 151.139.236.246
whitelisted
yandex.ocsp-responder.com
  • 5.45.205.241
  • 5.45.205.244
  • 5.45.205.242
  • 5.45.205.243
  • 5.45.205.245
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info