analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://5.196.172.33/_nav/go.php?abre=0xHUWXSCDR&go=0xb914e2c8&dwe=0xWXMRJMMN

Full analysis: https://app.any.run/tasks/170b4e72-6198-4c30-9121-5e2cc4c1c6cd
Verdict: Malicious activity
Analysis date: March 21, 2019, 14:42:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

EDC13208907A1C5A0DA20A008AB533AB

SHA1:

7484B63D107D8F887D20929E2D0C111CD066E11C

SHA256:

4CCB37310ED9227449BF67DD6AFB837911B679916D6E750CFAE4BDD981D5B71F

SSDEEP:

3:N1K/ljeZnYAQtfVI0Xpy9ur:CAattfVtyW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2856)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2856)
      • iexplore.exe (PID: 3432)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3432)
    • Application launched itself

      • iexplore.exe (PID: 2856)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3432)
    • Creates files in the user directory

      • iexplore.exe (PID: 3432)
      • iexplore.exe (PID: 2856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2856"C:\Program Files\Internet Explorer\iexplore.exe" http://5.196.172.33/_nav/go.php?abre=0xHUWXSCDR&go=0xb914e2c8&dwe=0xWXMRJMMNC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3432"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2856 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
394
Read events
334
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
34
Unknown types
8

Dropped files

PID
Process
Filename
Type
2856iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2856iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\J30HDGEZ\ff-bank_asia[1].txt
MD5:
SHA256:
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4IEMV79M\styles-custom[1].csstext
MD5:0DC7A4548E5D97E6DB64AAB1D2DAA234
SHA256:54B35DEB26C4C0C01FA20B6F5CC7BC6D7631EA94EF4676FAD7E539245619CF54
3432iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@375460198[1].txttext
MD5:C72E87E707D7BAAC3103ECDA60F94CA6
SHA256:BBDEAE16781D403C8DD4754BEED17586C88211D5CEB38F1840F37751C212DF48
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:7AFED4D06E15AE27F36CC54BAD9D0291
SHA256:23229829B43001594B58A6701A9A752958BE892C598D42747B953FD5FDA55BCD
3432iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:AEAD87E585D7AB3551F6A35B07A24CAF
SHA256:1E65AC78DEF7077DE76387196F6B61180FB7C5BCC341CFDF6E16EF413335246B
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\J30HDGEZ\ff-bank_asia[1].htmhtml
MD5:F2EE1CE2996B41F8801B815F1E50FE79
SHA256:BFE486DB5EE070D54B2A3CFBD70B0A9248ACAB4C0F1DC1CCE6BFB7291B5CB17D
3432iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@ff-bank[1].txttext
MD5:7EF2E77120FAED3EBB7DDFA0AF3DA58A
SHA256:C397328F77E1D67409172C55EA2A45B009D84819D8C723DD636677CFE8581D9B
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:05A9D744C59C5315D941DBDFD0A28F09
SHA256:1199C3397FC74E4DB84492486891B9EDD1BEAB8DB7ABCA752D9E2A9C8DE328F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
13
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3432
iexplore.exe
GET
302
104.24.118.197:80
http://375460198.host/
US
shared
3432
iexplore.exe
GET
302
185.20.226.200:80
http://0xb914e2c8/
RU
malicious
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/landings/_common/fonts/PT_Sans/PTS75F_W.eot
US
text
87 b
shared
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/landings/_common/fonts/PT_Sans/PTS55F_W.eot
US
text
87 b
shared
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/landings/_common/fonts/HelveticaNeue/HelveticaNeueCyrThin.eot
US
text
87 b
shared
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/styles.css
US
text
2.80 Kb
shared
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/fb3.png
US
image
388 b
shared
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/styles-custom.css
US
text
183 b
shared
3432
iexplore.exe
GET
200
104.27.176.5:80
http://ff-bank.asia/landings/_common/fonts/PT_Sans/PTS56F_W.eot
US
text
87 b
shared
2856
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2856
iexplore.exe
104.27.176.5:80
ff-bank.asia
Cloudflare Inc
US
shared
3432
iexplore.exe
87.250.250.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted
2856
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3432
iexplore.exe
5.196.172.33:80
OVH SAS
FR
unknown
3432
iexplore.exe
104.27.176.5:80
ff-bank.asia
Cloudflare Inc
US
shared
3432
iexplore.exe
104.24.118.197:80
375460198.host
Cloudflare Inc
US
shared
3432
iexplore.exe
185.20.226.200:80
Domain names registrar REG.RU, Ltd
RU
malicious
3432
iexplore.exe
172.217.23.170:443
ajax.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
375460198.host
  • 104.24.118.197
  • 104.24.119.197
unknown
ff-bank.asia
  • 104.27.176.5
  • 104.27.177.5
unknown
ajax.googleapis.com
  • 172.217.23.170
  • 172.217.21.234
  • 172.217.22.10
  • 172.217.18.10
  • 216.58.206.10
  • 216.58.207.74
  • 172.217.16.170
  • 216.58.208.42
  • 172.217.16.138
  • 172.217.22.74
  • 172.217.22.106
whitelisted
mc.yandex.ru
  • 87.250.250.119
  • 77.88.21.119
  • 93.158.134.119
  • 87.250.251.119
whitelisted

Threats

PID
Process
Class
Message
3432
iexplore.exe
A Network Trojan was detected
ET MALWARE Hex Encoded IP HTTP Request - Likely Malware
No debug info