URL:

https://googleads.g.doubleclick.net/pcs/click?xai=AKAOjsuHornD_WCnnNUd3kP7d-eY63eSFSWx_UU9ijEEfbPAuEq9DC46J4X2p_5GZqtbiTZFj6gIpgDvjZH4fxUEuXJ7Xq_B4u-sPfVjkmZ8fEa9slJKEoeFBJZgRa8FVGxMH5RFFFg-fH0MMovJmM_XAY3Kka3ceNDdluhpiuHt2ViLkMlRySTGbsJDEiFe1Y7JsGGjSCViER1XtdlAMwqrH13KW__OF1K8U51t-C5tqniVYLg_vrISpecor4bzuTPRIIpCv82lk1uJLdqtIUV7MXs5Q-J9feVn1vMvnp5I6XiMA5Bbe9-f_2GJsSAc2WQ&sai=AMfl-YRyegCcuQsU4UqJv7Ag5Is2c-0bUk3qkb5fVnEO6Cp4dKOsuQLyvmCVdC8X5ke1di08rZkGNIB1JECVYBXBiLlSTsDFSVx2SU26RnDlMw&sig=Cg0ArKJSzLsRzVNHcBvm&adurl=https://lp.pctonics.com/sftndtn/%3Fx-context%3DXXXXX%26utm_source%3Dsftn950dtn%26utm_campaign%3Dsftn950dtn%26pxl%3DSFT4096_SFT3999_RUNT%26utm_pubid%3DXXXXX%26x-at%3D&nx=CLICK_X&ny=CLICK_Y

Full analysis: https://app.any.run/tasks/1d81b703-3bd1-4252-a6e6-aae59cab8374
Verdict: Malicious activity
Analysis date: April 26, 2019, 09:01:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

76399F47462CF057E0B0365831119380

SHA1:

7CAB4717374D1BFEC1FC61C003A8727683A4169B

SHA256:

5E1DA347BDE7C4AEE507D95D7340B39EB8D72CBBBCE4A0AE8B7037E138F57696

SSDEEP:

12:27EYIylWwws2ODUe7Mh0H5j4ZG+O39KToMi4hJL3dvzI2zRV0pbikEgH8mpkEeoe:27EEwsbDUe7MyZj44lz4htdk2zRVvkE9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • drivertonic[1].exe (PID: 2936)
      • drivertonic[1].exe (PID: 3716)
      • dtncsetup.exe (PID: 856)
      • dtn.exe (PID: 2908)
    • Uses Task Scheduler to run other applications

      • dtncsetup.tmp (PID: 3092)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3552)
    • Changes settings of System certificates

      • drivertonic[1].exe (PID: 2936)
      • dtn.exe (PID: 2908)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3868)
      • iexplore.exe (PID: 2668)
      • drivertonic[1].exe (PID: 2936)
      • dtncsetup.exe (PID: 856)
      • dtncsetup.tmp (PID: 3092)
    • Reads internet explorer settings

      • drivertonic[1].exe (PID: 2936)
    • Reads Internet Cache Settings

      • rundll32.exe (PID: 3120)
      • rundll32.exe (PID: 3480)
    • Uses RUNDLL32.EXE to load library

      • drivertonic[1].exe (PID: 2936)
    • Adds / modifies Windows certificates

      • drivertonic[1].exe (PID: 2936)
    • Reads Windows owner or organization settings

      • dtncsetup.tmp (PID: 3092)
    • Reads the Windows organization settings

      • dtncsetup.tmp (PID: 3092)
    • Uses TASKKILL.EXE to kill process

      • dtncsetup.tmp (PID: 3092)
    • Creates files in the user directory

      • dtncsetup.tmp (PID: 3092)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 2668)
    • Application launched itself

      • iexplore.exe (PID: 3868)
    • Changes internet zones settings

      • iexplore.exe (PID: 3868)
    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2356)
      • iexplore.exe (PID: 2668)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3868)
      • drivertonic[1].exe (PID: 2936)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2668)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3868)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3868)
    • Application was dropped or rewritten from another process

      • dtncsetup.tmp (PID: 3092)
    • Creates files in the program directory

      • dtncsetup.tmp (PID: 3092)
    • Creates a software uninstall entry

      • dtncsetup.tmp (PID: 3092)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
12
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs drivertonic[1].exe no specs drivertonic[1].exe rundll32.exe no specs rundll32.exe no specs dtncsetup.exe dtncsetup.tmp taskkill.exe no specs schtasks.exe no specs dtn.exe

Process information

PID
CMD
Path
Indicators
Parent process
856C:\Users\admin\AppData\Local\Temp\~ubfcasy.tmp\dtncsetup.exe /verysilent /inswtc /insavstC:\Users\admin\AppData\Local\Temp\~ubfcasy.tmp\dtncsetup.exe
drivertonic[1].exe
User:
admin
Company:
pctonics.com
Integrity Level:
HIGH
Description:
Driver Tonic Setup
Exit code:
0
Version:
1.0.1.7
Modules
Images
c:\users\admin\appdata\local\temp\~ubfcasy.tmp\dtncsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1412"C:\Windows\System32\taskkill.exe" /f /im "dtn.exe"C:\Windows\System32\taskkill.exedtncsetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\gdi32.dll
2356C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2668"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3868 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2908"C:\Program Files\Driver Tonic\dtn.exe" getdetailsC:\Program Files\Driver Tonic\dtn.exe
dtncsetup.tmp
User:
admin
Company:
pctonics.com
Integrity Level:
HIGH
Description:
Driver Tonic
Exit code:
0
Version:
1.0.1.7
Modules
Images
c:\program files\driver tonic\dtn.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2936"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\drivertonic[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\drivertonic[1].exe
iexplore.exe
User:
admin
Company:
pctonics.com
Integrity Level:
HIGH
Description:
Driver Tonic Setup
Exit code:
0
Version:
1.0.1.7
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\i0488cjo\drivertonic[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3092"C:\Users\admin\AppData\Local\Temp\is-I9LHU.tmp\dtncsetup.tmp" /SL5="$400EC,10500799,172544,C:\Users\admin\AppData\Local\Temp\~ubfcasy.tmp\dtncsetup.exe" /verysilent /inswtc /insavstC:\Users\admin\AppData\Local\Temp\is-I9LHU.tmp\dtncsetup.tmp
dtncsetup.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-i9lhu.tmp\dtncsetup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3120"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exedrivertonic[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3480"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 C:\Windows\system32\rundll32.exedrivertonic[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3552"C:\Windows\System32\schtasks.exe" /delete /tn "Driver Tonic_launcher" /fC:\Windows\System32\schtasks.exedtncsetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
1 349
Read events
1 141
Write events
206
Delete events
2

Modification events

(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{DB52368B-6801-11E9-A370-5254004A04AF}
Value:
0
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(3868) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E307040005001A000900010014002203
Executable files
29
Suspicious files
15
Text files
77
Unknown types
19

Dropped files

PID
Process
Filename
Type
3868iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
3868iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab32D5.tmp
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar32E5.tmp
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab32F6.tmp
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar32F7.tmp
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab33E2.tmp
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar33E3.tmp
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\57SXRVPF\sftndtn[1].txt
MD5:
SHA256:
2668iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@lp.pctonics[2].txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
30
DNS requests
15
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2936
drivertonic[1].exe
GET
200
216.245.208.194:80
http://www.winactiv.com/mtrack/?metd=trackBlog&x-fetch=1&utm_source=dtninstlr&utm_campaign=dtninstlr&pxl=DTN3231_DTN3159_RUNT
US
malicious
2668
iexplore.exe
GET
200
67.27.159.254:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.6 Kb
whitelisted
2908
dtn.exe
GET
200
91.199.212.52:80
http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt
GB
der
1.37 Kb
whitelisted
2668
iexplore.exe
GET
200
13.32.222.187:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2668
iexplore.exe
GET
200
13.32.222.187:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
3868
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2668
iexplore.exe
GET
200
13.32.222.187:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2668
iexplore.exe
GET
200
13.32.222.187:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2668
iexplore.exe
GET
200
67.27.159.254:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/47BEABC922EAE80E78783462A79F45C254FDE68B.crt
US
der
969 b
whitelisted
2668
iexplore.exe
GET
200
13.32.222.187:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3868
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2668
iexplore.exe
172.217.18.98:443
googleads.g.doubleclick.net
Google Inc.
US
whitelisted
2668
iexplore.exe
216.245.208.198:443
lp.pctonics.com
Limestone Networks, Inc.
US
unknown
2668
iexplore.exe
216.58.207.74:443
ajax.googleapis.com
Google Inc.
US
whitelisted
2668
iexplore.exe
67.27.159.254:80
www.download.windowsupdate.com
Level 3 Communications, Inc.
US
malicious
2668
iexplore.exe
64.233.167.157:443
stats.g.doubleclick.net
Google Inc.
US
whitelisted
2668
iexplore.exe
172.217.22.72:443
ssl.google-analytics.com
Google Inc.
US
whitelisted
2668
iexplore.exe
13.32.223.80:443
img.pctonics.com
Amazon.com, Inc.
US
unknown
2668
iexplore.exe
205.185.208.52:443
code.jquery.com
Highwinds Network Group, Inc.
US
unknown
2668
iexplore.exe
172.217.16.196:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
googleads.g.doubleclick.net
  • 172.217.18.98
whitelisted
lp.pctonics.com
  • 216.245.208.198
unknown
www.download.windowsupdate.com
  • 67.27.159.254
  • 67.27.235.254
  • 67.27.234.126
  • 67.26.73.254
  • 67.27.233.126
whitelisted
ajax.googleapis.com
  • 216.58.207.74
  • 172.217.16.170
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.74
  • 172.217.22.106
  • 172.217.18.106
  • 216.58.205.234
  • 172.217.21.234
  • 172.217.23.138
  • 216.58.206.10
  • 216.58.207.42
whitelisted
ssl.google-analytics.com
  • 172.217.22.72
whitelisted
stats.g.doubleclick.net
  • 64.233.167.157
  • 64.233.167.155
  • 64.233.167.156
  • 64.233.167.154
whitelisted
img.pctonics.com
  • 13.32.223.80
  • 13.32.223.83
  • 13.32.223.114
  • 13.32.223.90
whitelisted
code.jquery.com
  • 205.185.208.52
whitelisted
www.google.com
  • 172.217.16.196
malicious

Threats

PID
Process
Class
Message
2668
iexplore.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
2936
drivertonic[1].exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
No debug info