URL:

https://client-data.knak.io/

Full analysis: https://app.any.run/tasks/a35a23ff-a8a6-4cda-8db2-ceb361f655ba
Verdict: Malicious activity
Analysis date: August 18, 2021, 16:29:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

886D1ED8E5C17A5FD7AD574E06AF6597

SHA1:

2041E1EF8FA660C376C74A2CAFDC11CAF8AFE4C3

SHA256:

4C202824F57BC7900C1C5604F280B6EA448AAE07654B8FE13D517E6985F8AC07

SSDEEP:

3:N8UIERF4R:2UyR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2012)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 1456)
      • iexplore.exe (PID: 2012)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2012)
      • iexplore.exe (PID: 1456)
    • Checks supported languages

      • iexplore.exe (PID: 2012)
      • iexplore.exe (PID: 1456)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2012)
      • iexplore.exe (PID: 1456)
    • Changes internet zones settings

      • iexplore.exe (PID: 1456)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2012)
    • Application launched itself

      • iexplore.exe (PID: 1456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1456"C:\Program Files\Internet Explorer\iexplore.exe" "https://client-data.knak.io/"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2012"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1456 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
11 052
Read events
10 937
Write events
115
Delete events
0

Modification events

(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30905422
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30905422
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1456) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
9
Text files
5
Unknown types
7

Dropped files

PID
Process
Filename
Type
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:4FD682DC609B244BFC47631D5CDE2FE8
SHA256:E311B5AA02F05CC985EAA0409A6C27569C775EA4E6F8B888733D5E3C051C9FCC
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC5A820A001B41D68902E051F36A5282_225CE625424D090DAB4370336628D78Abinary
MD5:667EC15042C114EF002E008C40175FF5
SHA256:1F1CB183C4D86B731743EAFF230E402FD7D8C2E22DBBB6627ECAC28334F30851
1456iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:A86464081077D979B690F80D93726F65
SHA256:B083B8A635F1E5E1D989F20E03B3109CB4D5AE70603A445E1B08FC6A12575CBA
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_225CE625424D090DAB4370336628D78Ader
MD5:038B0D8EC3A14FBD31829C888E387F8D
SHA256:904D55720A0D6C2F7DD340846DA5A0776C449FF7F9BD9D64CCCBC305CFA30D0C
1456iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:32243CA12BE2DD60037E3899C6DBF5CD
SHA256:2ED7DC6F0808CA474285B24249D365D90A2F7BF8A483EDF0F39C144E12BEDE1E
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:199FAC87B483A3459FBACFC73723D9BA
SHA256:61760FF1DB0BE3987315A8845CB5F0A19030586C2483D683450014110DC5414E
1456iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:975FD7D3DBBE0ACF543E9A5E71E953A6
SHA256:DD8C9B67A0FFC7ED4FBC5E01A3137036DC6C1EF9264221DF9A3B29512033F506
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62der
MD5:F4071DE88F72C3A232408940EE909DEF
SHA256:84753B8021473E8D9311E5260F891EA46339E0FD3A0A86EBE189485967EE086B
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fder
MD5:709D9C13496B4A7F6FA5D82754441FEA
SHA256:BBB7741CF5F1124B25A87B666F7674036589F7804775A78FDFA69EBE77F52771
2012iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:ACE0FC715435A53F7CEC3EAB550ED594
SHA256:16A41D505A7B50FFE9593E67C7045DA69D4E4287F3ED79FA3E4D7D1D4EB26113
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1456
iexplore.exe
GET
304
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8d52f63768919161
US
whitelisted
1456
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2012
iexplore.exe
GET
200
65.9.84.191:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEA8XHbKJgLx3CiMFP0juebU%3D
US
der
471 b
whitelisted
1456
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1672
svchost.exe
GET
304
67.26.83.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?880ee01b2c3de996
US
whitelisted
2012
iexplore.exe
GET
200
65.9.84.150:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2012
iexplore.exe
GET
200
65.9.84.191:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2012
iexplore.exe
GET
200
65.9.84.43:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2012
iexplore.exe
GET
200
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c67b69eb93e1e5ec
US
compressed
4.70 Kb
whitelisted
2012
iexplore.exe
GET
200
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?194b4db5d7b70cf8
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2012
iexplore.exe
65.9.73.94:443
client-data.knak.io
AT&T Services, Inc.
US
unknown
2012
iexplore.exe
65.9.84.43:80
o.ss2.us
AT&T Services, Inc.
US
unknown
2012
iexplore.exe
65.9.84.150:80
ocsp.rootg2.amazontrust.com
AT&T Services, Inc.
US
whitelisted
2012
iexplore.exe
205.185.216.42:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
1456
iexplore.exe
205.185.216.42:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
2012
iexplore.exe
65.9.84.191:80
ocsp.rootg2.amazontrust.com
AT&T Services, Inc.
US
whitelisted
1456
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1456
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1456
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
client-data.knak.io
  • 65.9.73.94
  • 65.9.73.29
  • 65.9.73.85
  • 65.9.73.41
malicious
ctldl.windowsupdate.com
  • 205.185.216.42
  • 205.185.216.10
  • 67.26.83.254
  • 67.26.139.254
  • 67.26.73.254
  • 67.27.235.126
  • 67.26.137.254
whitelisted
o.ss2.us
  • 65.9.84.43
  • 65.9.84.92
  • 65.9.84.38
  • 65.9.84.221
whitelisted
ocsp.rootg2.amazontrust.com
  • 65.9.84.191
  • 65.9.84.140
  • 65.9.84.213
  • 65.9.84.150
whitelisted
ocsp.rootca1.amazontrust.com
  • 65.9.84.150
  • 65.9.84.191
  • 65.9.84.213
  • 65.9.84.140
shared
ocsp.sca1b.amazontrust.com
  • 65.9.84.191
  • 65.9.84.213
  • 65.9.84.225
  • 65.9.84.130
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info