download:

index.html

Full analysis: https://app.any.run/tasks/d11575e6-59a1-4432-9002-4dda2a1de18a
Verdict: Malicious activity
Analysis date: June 19, 2019, 06:33:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, LF line terminators
MD5:

2DE089163FF2F89EA894DA84ECC16EF0

SHA1:

EF6A220F3200B4612AEA16D2CA8F97E52AFEAD32

SHA256:

604B1F50E619C316985A70D660295BE3835C155A81DB8222C5B481F2B302F458

SSDEEP:

384:KPzucrqowWl7QjDgFjoxi8n3/GPJaO2cKj:fajoxiEsaOlKj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 4088)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2464)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2144)
      • iexplore.exe (PID: 552)
    • Creates files in the user directory

      • iexplore.exe (PID: 2144)
      • iexplore.exe (PID: 552)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 4088)
      • iexplore.exe (PID: 2464)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 552)
      • iexplore.exe (PID: 2464)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 552)
    • Application launched itself

      • iexplore.exe (PID: 2464)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.txt | Text - UTF-8 encoded (100)

EXIF

HTML

HTTPEquivXUACompatible: IE=edge
ContentType: text/html; charset=UTF-8
Description: youtube,youtube music,unblock youtube,youtube videos,youtube to mp3,youtube songs,youtube movies,youtube music videos,youtube proxy,youtube broadcast yourself,listen to youtube,youtube broadcast,utube,youtub
Keywords: Unblock YouTube grants you access to any blocked web page. This site is compatible with YouTube Videos and has servers located in Europe.,youtube,youtube music,unblock youtube,youtube videos,youtube to mp3,youtube songs,youtube movies,youtube music videos,youtube proxy,youtube broadcast yourself,listen to youtube,youtube broadcast,utube,youtub
Title: Unblock YouTube grants you access to any blocked web page. This site is compatible with YouTube Videos and has servers located in Europe.youtube,youtube music,unblock youtube,youtube videos,youtube to mp3,youtube songs,youtube movies,youtube music videos,youtube proxy,youtube broadcast yourself,listen to youtube,youtube broadcast,utube,youtub
alexaVerifyID: fSWVak30jpQ63Nap7Sg7C4QUhc8
viewport: width=device-width, initial-scale=1, maximum-scale=1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
552"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2464 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2144"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2464 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2464"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4088C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
668
Read events
569
Write events
97
Delete events
2

Modification events

(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{2936B631-925C-11E9-A370-5254004A04AF}
Value:
0
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(2464) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E307060003001300060021002300C001
Executable files
0
Suspicious files
1
Text files
53
Unknown types
11

Dropped files

PID
Process
Filename
Type
2464iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2464iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\jquery-ui[1].csstext
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\s[1].jstext
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\style[1].csstext
MD5:
SHA256:
2464iexplore.exeC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\app[1].csstext
MD5:
SHA256:
552iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@vidco[1].txt
MD5:
SHA256:
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\bootstrap[1].jstext
MD5:D5A03D9CCA57637F008124916B86B585
SHA256:8E5884D1BE3041EAFBAB27D898B8E401E0263C5BEBABA17C97D82240064A362C
2144iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\application[1].jstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
28
DNS requests
13
Threats
36

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/themes/ytspace/upload_video.css
US
text
203 b
suspicious
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/css/style.css?v=1.2
US
text
3.87 Kb
suspicious
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/css/app.css
US
text
13.0 Kb
suspicious
552
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/
US
html
4.77 Kb
suspicious
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/css/bootstrap.css
US
text
20.2 Kb
suspicious
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/css/jquery-ui.css?v=1.2
US
text
6.03 Kb
suspicious
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/application.js
US
text
1.53 Kb
suspicious
2144
iexplore.exe
GET
200
172.217.16.138:80
http://ajax.googleapis.com/ajax/libs/jqueryui/1/jquery-ui.min.js
US
text
60.0 Kb
whitelisted
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/js/jquery.min.js
US
text
32.3 Kb
suspicious
2144
iexplore.exe
GET
200
104.27.153.110:80
http://vidco.su/static/css/simple-line-icons.css
US
text
2.32 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2144
iexplore.exe
172.217.16.138:80
ajax.googleapis.com
Google Inc.
US
whitelisted
172.217.16.138:80
ajax.googleapis.com
Google Inc.
US
whitelisted
2144
iexplore.exe
104.27.153.110:80
vidco.su
Cloudflare Inc
US
shared
4
System
209.197.3.15:445
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
2464
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
552
iexplore.exe
209.197.3.15:80
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
2464
iexplore.exe
104.27.153.110:80
vidco.su
Cloudflare Inc
US
shared
4
System
104.19.195.151:445
cdnjs.cloudflare.com
Cloudflare Inc
US
shared
552
iexplore.exe
23.111.8.154:443
oss.maxcdn.com
netDNA
US
unknown
4
System
104.19.198.151:139
cdnjs.cloudflare.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
maxcdn.bootstrapcdn.com
  • 209.197.3.15
whitelisted
vidco.su
  • 104.27.153.110
  • 104.27.152.110
suspicious
ajax.googleapis.com
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.74
  • 172.217.16.202
  • 172.217.18.106
  • 172.217.21.202
  • 216.58.205.234
  • 172.217.22.10
  • 172.217.18.170
  • 216.58.206.10
  • 216.58.207.42
  • 216.58.207.74
  • 172.217.16.170
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.googletagmanager.com
  • 172.217.16.200
whitelisted
cdnjs.cloudflare.com
  • 104.19.197.151
  • 104.19.199.151
  • 104.19.195.151
  • 104.19.196.151
  • 104.19.198.151
whitelisted
oss.maxcdn.com
  • 23.111.8.154
whitelisted
www.google-analytics.com
  • 216.58.210.14
whitelisted
pariwiki.com.ph
  • 51.159.22.40
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
1068
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2144
iexplore.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
No debug info