analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://europeancentralbank.tk

Full analysis: https://app.any.run/tasks/54f6e97b-41c9-4f08-aec9-ee86380f8b58
Verdict: Malicious activity
Analysis date: July 18, 2019, 11:45:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

36FA7D6B261B0407FB8380B11D9D12C0

SHA1:

F93F0EBCD1C88B78F8D304A158290C5E98A7EF2A

SHA256:

574E4613D371D8C02748B072946EC611BA8777BCE9CDD9E736B852E716A02EC9

SSDEEP:

3:N1KbJLlXrOU:CFLNrj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2668)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3676)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3488)
      • chrome.exe (PID: 3676)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3824)
    • Creates files in the user directory

      • iexplore.exe (PID: 3488)
      • iexplore.exe (PID: 3824)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2668)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3824)
    • Changes internet zones settings

      • iexplore.exe (PID: 3488)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3824)
    • Manual execution by user

      • chrome.exe (PID: 3676)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
63
Monitored processes
28
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3488"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3824"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3488 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2668C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
3676"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2540"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6a76a9d0,0x6a76a9e0,0x6a76a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3952"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3680 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3364"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1036,14569851882600928999,2247758846592961022,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=16332815623672622829 --mojo-platform-channel-handle=1048 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3800"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1036,14569851882600928999,2247758846592961022,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=10592303309340957624 --mojo-platform-channel-handle=1636 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2468"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,14569851882600928999,2247758846592961022,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4054689523729065523 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3584"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,14569851882600928999,2247758846592961022,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4636265410939656458 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2420 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
Total events
1 037
Read events
884
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
19
Text files
215
Unknown types
18

Dropped files

PID
Process
Filename
Type
3488iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico
MD5:
SHA256:
3488iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3824iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@freenom[2].txt
MD5:
SHA256:
3824iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@freenom[1].txttext
MD5:8FEC1A1BCB6E9CB2BE27B2BD31269184
SHA256:0A7ADA7D169D7EC62DC54D41D94D82EB46341DABAE7F8998346C7186FA08921C
3824iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RDSUBEUL\index[1].htmhtml
MD5:8872693DEF6083F7CF51AB8E199289AC
SHA256:3FF5C184D2DD6D021B9EFB2604CE3AB0A6A1C5917B115EEAB02EB8FBA27F41A3
3824iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:B0019621EAAA8E42B7F941F439267674
SHA256:B56A4D2C5367388E3D2D8AF61B12F7DC19D3C51C6F5C6754C9D7F1D26D4706B2
3488iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019071820190719\index.datdat
MD5:1CD957220397BDB6B285E5F0399BFFAA
SHA256:ACF037E95DAE5B5C106BED3F05DA31DC70D631AE2BAD8627800D1C110881FD2B
3824iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\WLGGF6H5\lander[1].csstext
MD5:859A6E25A07F5A7639111927E53B65F2
SHA256:94D7A7930BBDD72C10E20C6792D74523C59359EA0AC49870F8D1A9EDF4D58706
3824iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019071820190719\index.datdat
MD5:3BDC9ED3ACAB3D665CD7F259387621D1
SHA256:B258496AA2DF221C2634F22B06C8212E7A84E893554F499C51BF6C343812AE82
3824iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:FE6848AD998F998F065951E45BE87562
SHA256:90F36E5EE939B716FD3BB4810866721B5AA39875766C293BA8D396D5C31332C5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
42
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3824
iexplore.exe
GET
302
35.204.240.39:80
http://freenom.link/?k=80808080&_=1563450338
US
whitelisted
3824
iexplore.exe
GET
301
217.115.151.99:80
http://domain.dot.tk/p/?d=EUROPEANCENTRALBANK.TK&i=185.217.117.165&c=44&ro=0&ref=unknown&_=1563450338531
DE
whitelisted
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/css/lander.css
US
text
5.51 Kb
suspicious
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/js/searchr.js
US
text
1.93 Kb
suspicious
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/images.v2/bg-body.gif
US
image
1012 b
suspicious
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/images.v2/icon-dashboard.png
US
image
11.1 Kb
suspicious
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/en/routers.js
US
text
17.8 Kb
suspicious
3488
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/images.v2/bg-header.gif
US
image
1.07 Kb
suspicious
3824
iexplore.exe
GET
200
35.204.240.39:80
http://www.freenom.link/images.v2/pattern.gif
US
image
267 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3488
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3488
iexplore.exe
195.20.44.148:80
europeancentralbank.tk
Verotel International B.V.
NL
suspicious
3824
iexplore.exe
195.20.44.148:80
europeancentralbank.tk
Verotel International B.V.
NL
suspicious
3824
iexplore.exe
205.185.208.52:443
code.jquery.com
Highwinds Network Group, Inc.
US
unknown
3824
iexplore.exe
217.115.151.99:80
domain.dot.tk
Host Europe GmbH
DE
suspicious
3824
iexplore.exe
209.197.3.15:443
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
3824
iexplore.exe
35.204.240.39:80
freenom.link
Google Inc.
US
suspicious
3824
iexplore.exe
209.197.3.15:80
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
3824
iexplore.exe
172.217.16.170:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3824
iexplore.exe
172.217.18.110:443
www.youtube.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
europeancentralbank.tk
  • 195.20.44.148
suspicious
domain.dot.tk
  • 217.115.151.99
whitelisted
freenom.link
  • 35.204.240.39
whitelisted
www.freenom.link
  • 35.204.240.39
suspicious
maxcdn.bootstrapcdn.com
  • 209.197.3.15
whitelisted
fonts.googleapis.com
  • 172.217.16.170
whitelisted
code.jquery.com
  • 205.185.208.52
whitelisted
fonts.gstatic.com
  • 172.217.23.163
whitelisted
www.google-analytics.com
  • 172.217.16.174
whitelisted

Threats

PID
Process
Class
Message
3824
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3824
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3824
iexplore.exe
Misc activity
SUSPICIOUS [PTsecurity] Malicious Redirect (EK seen)
3488
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
No debug info