URL:

fitnessmentor.org

Full analysis: https://app.any.run/tasks/0acaebdb-ec16-4f4b-8ece-7f5e5da4edb9
Verdict: Malicious activity
Analysis date: March 11, 2024, 14:46:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

16197404EE3BEFA1D10C0D1DF19381F9

SHA1:

DE2906C8831376199A6026357B58940C2E2E7F3F

SHA256:

642E865C9534193FB23AE50CF7E23DC642BA02986EA9902FFE2E4BD6D1825279

SSDEEP:

3:ijeE:6d

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3700"C:\Program Files\Internet Explorer\iexplore.exe" "fitnessmentor.org"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3952"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3700 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
18 910
Read events
18 787
Write events
89
Delete events
34

Modification events

(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31093698
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31093698
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3700) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
17
Text files
49
Unknown types
14

Dropped files

PID
Process
Filename
Type
3952iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\MRB2XEJP.htmhtml
MD5:FBA0C65EE3A81F20CB2983FCAAB7143C
SHA256:DB05C386CBD4F8BF2164578486637E2ED14CE5A9F9863BAB21B14752AB285BCE
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D236B434241483EC69D0996F9C6FA934
SHA256:249735437F1F7B2D8B3912301DC10622A30F26C2B541071513BEFC6E873BE7DD
3952iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\7JONOM7H.htmhtml
MD5:4F8E702CC244EC5D4DE32740C0ECBD97
SHA256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:3AA266767A1C01C4A6DA7BAAA7AFA7C4
SHA256:42C2CABE121EC70F66921B44F2D9E62B273F02B696063911EC96D463B0A1CA8C
3952iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabC6E.tmpcompressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
3700iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Abinary
MD5:A36C2C8003D95D52FD3E8E3F663B6691
SHA256:AF64A2C2E1AE682A7F23E919E1C5288914609C5759B16EF0D0DED1174B61B85E
3952iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarC6F.tmpbinary
MD5:DD73CEAD4B93366CF3465C8CD32E2796
SHA256:A6752B7851B591550E4625B832A393AABCC428DE18D83E8593CD540F7D7CAE22
3700iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Ader
MD5:5D8F7B1C393FF00DE21F682F78942993
SHA256:FC8EF68E41508D55F9272B96BC7D075B05A35800A8781E1AF1D6D82171B103C1
3952iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\styles[1].csstext
MD5:3FD2AFA98866679439097F4AB102FE0A
SHA256:CCD31FFA708D025833F954B3E0560CEDD58DF9A0D2706B2CCEE5F501C5B2467B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
49
DNS requests
26
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3952
iexplore.exe
GET
301
161.35.59.170:80
http://fitnessmentor.org/
unknown
html
162 b
unknown
GET
304
23.43.57.26:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f78d505714a595e3
unknown
unknown
GET
200
23.43.57.26:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?545e1839169dd0e6
unknown
compressed
67.5 Kb
unknown
3700
iexplore.exe
GET
304
23.43.57.26:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?18014fff35250a83
unknown
unknown
3700
iexplore.exe
GET
304
23.43.57.26:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?76ad697231f9b13b
unknown
unknown
3952
iexplore.exe
GET
200
2.22.41.69:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
3952
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
3700
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
314 b
unknown
3952
iexplore.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
binary
1.42 Kb
unknown
3952
iexplore.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
binary
1.42 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
3952
iexplore.exe
161.35.59.170:80
fitnessmentor.org
DIGITALOCEAN-ASN
US
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3952
iexplore.exe
161.35.59.170:443
fitnessmentor.org
DIGITALOCEAN-ASN
US
unknown
3952
iexplore.exe
23.43.57.26:80
ctldl.windowsupdate.com
Akamai International B.V.
US
unknown
3700
iexplore.exe
95.100.98.75:443
www.bing.com
Akamai International B.V.
IE
unknown
3700
iexplore.exe
23.43.57.26:80
ctldl.windowsupdate.com
Akamai International B.V.
US
unknown
3952
iexplore.exe
2.22.41.69:80
x1.c.lencr.org
Telia Company AB
SE
unknown

DNS requests

Domain
IP
Reputation
fitnessmentor.org
  • 161.35.59.170
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 95.100.98.83
  • 95.100.98.75
  • 95.100.98.107
  • 95.100.98.104
  • 95.100.98.96
whitelisted
ctldl.windowsupdate.com
  • 23.43.57.26
  • 23.43.57.18
whitelisted
x1.c.lencr.org
  • 2.22.41.69
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
secure.gravatar.com
  • 192.0.73.2
whitelisted
code.jquery.com
  • 151.101.2.137
  • 151.101.194.137
  • 151.101.130.137
  • 151.101.66.137
whitelisted
www.google.com
  • 216.58.206.36
whitelisted
ocsp.pki.goog
  • 142.250.186.67
whitelisted

Threats

PID
Process
Class
Message
3952
iexplore.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
1080
svchost.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in DNS Lookup (flyspecialline .com)
1080
svchost.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in DNS Lookup (greenfastline .com)
3952
iexplore.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in TLS SNI (flyspecialline .com)
3952
iexplore.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in TLS SNI (flyspecialline .com)
1080
svchost.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in DNS Lookup (greenfastline .com)
1080
svchost.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in DNS Lookup (greenfastline .com)
3952
iexplore.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in TLS SNI (greenfastline .com)
3952
iexplore.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in TLS SNI (greenfastline .com)
1080
svchost.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Balada Domain in DNS Lookup (specialtaskevents .com)
No debug info