analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://squr.com/

Full analysis: https://app.any.run/tasks/56e57247-78d9-406e-a576-1eff054991de
Verdict: Malicious activity
Analysis date: April 01, 2023, 09:10:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

ED3B654D5B27E39E5CE2F945D8C68440

SHA1:

EF17076D3CE24547D04BB57186FA115631AA5702

SHA256:

5A119862B6A973F4E52693984BA25CA38659D647A7C17CD334C99398F72DB483

SSDEEP:

3:N1KNUQXyGn:CGQXyGn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2368)
    • Create files in a temporary directory

      • iexplore.exe (PID: 2368)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2368"C:\Program Files\Internet Explorer\iexplore.exe" "http://squr.com/"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\rpcrt4.dll
3180"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2368 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
25 974
Read events
25 758
Write events
212
Delete events
4

Modification events

(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
22
Text files
44
Unknown types
16

Dropped files

PID
Process
Filename
Type
3180iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\0CDAKYFR.txttext
MD5:47A66BD203894D658905DF35610C3E21
SHA256:B61465F2E3329974215CDD6784F5F5AAB233B2709F2814A0AC77D1CDA4557AD5
3180iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:F38ABED7C0362F77808F7E0C5AEDC8DF
SHA256:8F39EE855DFC4B0A19406C5A3109222CF09FE1ABF3A56577E8D0EB29FECC9C20
3180iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:95581ADD273FE2ABE6715A58CC9A0559
SHA256:4C2B69E763968F4E5005C8071C6B3E2E3CE81E1717AE01E6BCF32C543EB159A4
3180iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\WP8T4UYN.txttext
MD5:47A66BD203894D658905DF35610C3E21
SHA256:B61465F2E3329974215CDD6784F5F5AAB233B2709F2814A0AC77D1CDA4557AD5
3180iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:B189CE67316DA63B88086BDCFF5924E6
SHA256:EE2A0AB328304E128B0C29BBFEF29EBCD2B4E599A34270DFE361A657A6E0408B
3180iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\V1J1J09P.htmhtml
MD5:7DD12B9BA98F85699FA8BC40B0988FD6
SHA256:B49682F5E342184C28288383BAFA4095DB93DE0DA6288E6E8986C93E6436BD99
3180iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:340321D8DB87D2FB22B8A6151594F8DD
SHA256:B906CDC50D74EADBD02E5D56C482B5B385B718B89FD71AEFF6BE6593E4877A60
3180iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_6E9884AC344D631BA10C8790F95CD371binary
MD5:4F4034B6FB379218E5ED1538D434BF3A
SHA256:0D0B725FACFDF60DE29EDB3D4C59828245E04ED6B136493106CBC0C4E9A3ED87
3180iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_6E9884AC344D631BA10C8790F95CD371der
MD5:13AEA90B56C70F627CF1B6CF76BC9317
SHA256:E687F0B713563125F2E84AC8ED135C56FD2ED704DE83A2597695979DF25F8864
3180iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\MOHELRLB.txttext
MD5:9393E6036FE6CAB8176971C947BE1929
SHA256:C216E56C70FCEBD8EDBFEC217D32AA81A499E0297B629DF47CFAE861BADFF643
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
31
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3180
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3180
iexplore.exe
GET
200
185.53.177.54:80
http://squr.com/track.php?domain=squr.com&toggle=browserjs&uid=MTY4MDM0MDI0OC41NTk6MzdjZjI4YjExMjE0YjY1YWU0NTJjNmM0MmY1NmQ2MjdkNDcxMDBlNjQ2ODBiNDdjZWVlZGZhY2EwNzhlZWFjYjo2NDI3ZjUxODg4N2E5
DE
binary
20 b
malicious
2368
iexplore.exe
GET
200
185.53.177.54:80
http://squr.com/favicon.ico
DE
malicious
3180
iexplore.exe
GET
200
142.250.185.132:80
http://www.google.com/adsense/domains/caf.js?abp=1
US
text
52.6 Kb
whitelisted
3180
iexplore.exe
GET
200
185.53.177.54:80
http://squr.com/
DE
html
5.32 Kb
malicious
3180
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?75ddd6c5f8c75eb2
US
compressed
4.70 Kb
whitelisted
2368
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2368
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
3180
iexplore.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2368
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2368
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3180
iexplore.exe
142.250.184.194:443
partner.googleadservices.com
GOOGLE
US
suspicious
2368
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3180
iexplore.exe
185.53.177.54:80
Team Internet AG
DE
malicious
3180
iexplore.exe
142.250.186.131:80
ocsp.pki.goog
GOOGLE
US
whitelisted
2368
iexplore.exe
185.53.177.54:80
Team Internet AG
DE
malicious
3180
iexplore.exe
142.250.185.132:443
www.google.com
GOOGLE
US
whitelisted
3180
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
3180
iexplore.exe
142.250.185.132:80
www.google.com
GOOGLE
US
whitelisted
3180
iexplore.exe
18.66.121.69:80
d38psrni17bvxu.cloudfront.net
AMAZON-02
US
suspicious

DNS requests

Domain
IP
Reputation
www.google.com
  • 142.250.185.132
whitelisted
partner.googleadservices.com
  • 142.250.184.194
whitelisted
d38psrni17bvxu.cloudfront.net
  • 18.66.121.69
  • 18.66.121.135
  • 18.66.121.138
  • 18.66.121.190
suspicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.pki.goog
  • 142.250.186.131
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info