analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/73d6c01e-7e1a-41d9-a92d-f06204512767
Verdict: Malicious activity
Analysis date: June 16, 2019, 17:16:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines
MD5:

C43D49EC67989366F8F137E4D7D4850D

SHA1:

A59413C0B797CE2D5E43E823910F9451C01557A8

SHA256:

5F148FE20189DB999954644F6F2265EE562C5240F9736C8F662192240B3FE45B

SSDEEP:

96:jioOKIZRGKv71E8NJeo2BuUMmCvHI5Wytk8MownOCj2+mRQz:jiozWYaRTQBXMGW0MZnOCORQz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • iexplore.exe (PID: 2148)
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 916)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3368)
    • Changes internet zones settings

      • iexplore.exe (PID: 3368)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3248)
      • iexplore.exe (PID: 3368)
      • iexplore.exe (PID: 2148)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3248)
      • iexplore.exe (PID: 2148)
    • Creates files in the user directory

      • iexplore.exe (PID: 3368)
      • iexplore.exe (PID: 2148)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 916)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 2148)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3368)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3368)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3368)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe no specs iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3368"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3248"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3368 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2148"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3368 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
916C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Total events
934
Read events
799
Write events
130
Delete events
5

Modification events

(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{7A46EF1D-905A-11E9-A09E-5254004A04AF}
Value:
0
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(3368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E307060000001000110010001D00AF03
Executable files
0
Suspicious files
5
Text files
47
Unknown types
8

Dropped files

PID
Process
Filename
Type
3368iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
3368iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\R8ZJS4KE\ww25_sharebutton_co[1].txt
MD5:
SHA256:
3368iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF136FC78085AA31B9.TMP
MD5:
SHA256:
2148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:735212BF351DE1DE0E4036ECFFB04059
SHA256:41E046197F8BD4FFBE8BD05EAB1EB15F106D1BE3CBAE61F3EB80FAEC04957565
2148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JIN1BLJI\caf[1].jstext
MD5:EF3AE2802F33A1EEC8C6F0046AC9D827
SHA256:845A2A8040ED6A0E7C09415FA3DB70FE605CE76DF678B12CF04F57F7BE546818
3248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019061620190617\index.datdat
MD5:3C32C69C8D2C28B9C84648CF1A290D82
SHA256:6B12F8D186D80677D54B4B5E549BAA5FCF68DAD0260B02ED0D2D8C2DF376FF4C
2148iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@sharebutton[1].txttext
MD5:DEFA768E522B89CA2AAD6FFB01B5EDC2
SHA256:9FC24E12A9C4CE83EE9F5DC8708E1248F655C5793F0730CA6B096E2DE7FAFF0C
3368iexplore.exeC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:3349E043DE5478F5FC065FA7F40DBD32
SHA256:2D0A76A4DCED521D7CF8F3DD4F03A4C25FA71737CBABC96290696477C72234A6
2148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\R8ZJS4KE\ww25_sharebutton_co[1].htmhtml
MD5:627EC0F786DE67EE853A278CC6515682
SHA256:5496B23286E6A4E83CD5AF78AE37E3B2AEF850C51EC6EB255D367E3D22869883
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
26
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2148
iexplore.exe
GET
302
103.224.182.250:80
http://sharebutton.co/
AU
malicious
3368
iexplore.exe
GET
404
199.59.242.151:80
http://ww25.sharebutton.co/favicon.ico
US
html
3.93 Kb
malicious
2148
iexplore.exe
GET
200
199.59.242.151:80
http://ww25.sharebutton.co/
US
html
3.93 Kb
malicious
2148
iexplore.exe
GET
200
199.59.242.151:80
http://ww25.sharebutton.co/glp?r=&u=http%3A%2F%2Fww25.sharebutton.co%2F&rw=1280&rh=720&ww=788&wh=460&ie=8
US
text
8.97 Kb
malicious
2148
iexplore.exe
GET
200
172.217.22.110:80
http://www.google-analytics.com/analytics.js
US
text
17.1 Kb
whitelisted
2148
iexplore.exe
POST
200
199.59.242.151:80
http://ww25.sharebutton.co/gzb
US
text
39 b
malicious
2148
iexplore.exe
GET
200
172.217.16.196:80
http://www.google.com/adsense/domains/caf.js
US
text
55.7 Kb
whitelisted
3368
iexplore.exe
GET
404
199.59.242.151:80
http://ww25.sharebutton.co/favicon.ico
US
html
3.93 Kb
malicious
2148
iexplore.exe
GET
200
199.59.242.151:80
http://ww25.sharebutton.co/glp?r=&u=http%3A%2F%2Fww25.sharebutton.co%2F&rw=1280&rh=720&ww=788&wh=460&ie=8
US
text
8.97 Kb
malicious
2148
iexplore.exe
GET
200
13.107.4.50:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.2 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3368
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2148
iexplore.exe
172.217.22.110:80
www.google-analytics.com
Google Inc.
US
whitelisted
199.59.242.151:80
ww25.sharebutton.co
Bodis, LLC
US
malicious
2148
iexplore.exe
216.58.207.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2148
iexplore.exe
199.59.242.151:80
ww25.sharebutton.co
Bodis, LLC
US
malicious
172.217.16.196:80
www.google.com
Google Inc.
US
whitelisted
103.224.182.250:80
sharebutton.co
Trellian Pty. Limited
AU
unknown
2148
iexplore.exe
172.217.23.163:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3368
iexplore.exe
104.111.233.125:443
uk.godaddy.com
Akamai International B.V.
NL
whitelisted
2148
iexplore.exe
104.111.233.125:443
uk.godaddy.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
sharebutton.co
  • 103.224.182.250
malicious
ww25.sharebutton.co
  • 199.59.242.151
malicious
www.google.com
  • 172.217.16.196
whitelisted
fonts.googleapis.com
  • 216.58.207.42
whitelisted
www.google-analytics.com
  • 172.217.22.110
whitelisted
fonts.gstatic.com
  • 172.217.23.163
whitelisted
www.godaddy.com
  • 104.111.236.51
whitelisted
www.download.windowsupdate.com
  • 13.107.4.50
whitelisted
uk.godaddy.com
  • 104.111.233.125
whitelisted

Threats

PID
Process
Class
Message
2148
iexplore.exe
A Network Trojan was detected
ET CNC Ransomware Tracker Reported CnC Server group 1
No debug info