analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.kohls.com

Full analysis: https://app.any.run/tasks/80990828-34a0-4f3e-913d-4ec12f51b799
Verdict: Malicious activity
Analysis date: March 26, 2022, 02:18:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

92D5AA777D9324EE51667B08D5512993

SHA1:

9450798C835A5640F5716062E6D65AF4948C55AB

SHA256:

661A3E0AB2C23300D70B9F3B9BBDF2446323BACDB2917811A5E9B6284ED7D409

SSDEEP:

3:N8DSLXYLGT:2OLZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2100)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2100)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2100)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2100)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2244)
  • INFO

    • Reads CPU info

      • iexplore.exe (PID: 2244)
    • Reads the computer name

      • iexplore.exe (PID: 3596)
      • iexplore.exe (PID: 2244)
    • Checks supported languages

      • iexplore.exe (PID: 3596)
      • iexplore.exe (PID: 2244)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3596)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 2244)
    • Changes internet zones settings

      • iexplore.exe (PID: 3596)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3596)
      • iexplore.exe (PID: 2244)
    • Application launched itself

      • iexplore.exe (PID: 3596)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2244)
    • Creates files in the user directory

      • iexplore.exe (PID: 2244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3596"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.kohls.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2244"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3596 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2100C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\lpk.dll
Total events
26 214
Read events
25 753
Write events
461
Delete events
0

Modification events

(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30949559
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30949559
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
61
Text files
345
Unknown types
70

Dropped files

PID
Process
Filename
Type
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6binary
MD5:82BDA383A42615ADADB6A5726B728926
SHA256:6CDB9A3CB5E409C45E1AFD8A877D58D5E46230B9F404ED9D498EF2411E64A0FC
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:3B77A6376EAAABB53FFC7CBDAA29DF27
SHA256:4CCE80DF3F124075B7A9D8B3FC9BD9896CAA61B46579F1597B25A787FB5B9E15
2244iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\KHM0BA90.txttext
MD5:CC8B71F3681162C05286389C84A573B5
SHA256:6130CCC30628EB47F63437CD61455D8FE2B0B33D1C489C4BC48F39E5BCA304A7
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:657EAAC2CDFC463413D2EA111A124C9F
SHA256:719B869AEAFEBE6507D8F4431365BA226480D910A8C56DD40DB8203070C7463F
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\environ3[1].jstext
MD5:EBB0F7F7BE6A4099F02CBEB52C1900DE
SHA256:93665E091EA14353EA84E86DBACE3AC77400BEA2168C6F5D8D6779BF7252EB3C
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\hp2-dm-20220324-offers-r1-02[1].jpgimage
MD5:2615400C1561134DB2C9E5D72045B462
SHA256:B49C40CDBE9E5A01093FE48277107EAD0C55021E88C08BA3A0E9D4208B3C1D0C
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\hp2-dm-20220324-offers-r1-03[1].jpgimage
MD5:F8608FE45056EE274D182AB5A8A8211F
SHA256:E5D94411C7EE4665915E4BD25B80DEA1DFF5F4A727618C4070A5D0BDD252CE51
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6der
MD5:B19B39EAC88BEECFBF399FD2CA8A080D
SHA256:696E1DA94B9CDDBD98343828B61529D13A94BEB07C97E7C89C325CD3CE812F7A
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\hp2-d-20220113-drawer-kcash[1].pngimage
MD5:B153618EC949BDFB62A879D9237FF590
SHA256:2288425AD7E535A20484FEB71DE23F60CDCD784817FFDF0A6DC801414EFC4FB6
2244iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\GI95IEUI.txttext
MD5:345137FC5E67293692116B85FF81A552
SHA256:E019703A9E061065B74591D582E0235ED56EEFF96AA8EA00FF00C57BB93ADD35
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
58
TCP/UDP connections
215
DNS requests
92
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2244
iexplore.exe
GET
200
23.45.105.185:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAiUAg1J7ie9IHbDN8v5koI%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
65.9.58.194:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
3596
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAilokbNS1yMg9cCtLurU0k%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEARD8Rv8Qu1JvBnj%2BWRvWDA%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAneBfd%2BEo393L7vcILUOEM%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2244
iexplore.exe
23.32.238.178:80
ctldl.windowsupdate.com
XO Communications
US
suspicious
2244
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2244
iexplore.exe
23.45.107.60:443
Akamai International B.V.
NL
unknown
2244
iexplore.exe
104.75.89.210:443
media.kohlsimg.com
Akamai Technologies, Inc.
NL
unknown
2244
iexplore.exe
34.251.227.193:443
dpm.demdex.net
Amazon.com, Inc.
IE
unknown
2244
iexplore.exe
2.16.186.240:443
www.kohls.com
Akamai International B.V.
whitelisted
2244
iexplore.exe
65.9.58.194:80
o.ss2.us
AT&T Services, Inc.
US
suspicious
2244
iexplore.exe
52.51.88.158:443
cm.everesttech.net
Amazon.com, Inc.
IE
suspicious
2244
iexplore.exe
157.240.20.19:443
connect.facebook.net
Facebook, Inc.
US
whitelisted
2244
iexplore.exe
63.35.20.93:443
kohls.demdex.net
MCI Communications Services, Inc. d/b/a Verizon Business
US
unknown

DNS requests

Domain
IP
Reputation
www.kohls.com
  • 2.16.186.240
  • 2.16.186.232
suspicious
ctldl.windowsupdate.com
  • 23.32.238.178
  • 23.32.238.201
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
media.kohlsimg.com
  • 104.75.89.210
malicious
dpm.demdex.net
  • 34.251.227.193
  • 99.81.5.109
  • 52.215.111.225
  • 52.19.204.92
  • 34.253.74.200
  • 52.16.213.80
  • 54.76.200.156
  • 63.32.228.167
whitelisted
api-bd.kohls.com
  • 2.16.186.240
  • 2.16.186.232
suspicious
s2.go-mpulse.net
  • 104.18.20.226
  • 104.18.21.226
whitelisted
kohls.demdex.net
  • 63.35.20.93
  • 54.171.186.191
  • 54.194.228.85
  • 34.250.134.201
  • 52.213.129.58
  • 52.215.245.130
  • 34.251.227.193
  • 54.77.200.211
whitelisted
cm.everesttech.net
  • 52.51.88.158
  • 34.248.191.66
  • 54.229.178.120
  • 52.50.18.68
  • 54.216.2.121
  • 54.194.191.134
whitelisted
ww8.kohls.com
  • 15.188.95.229
  • 13.36.218.177
  • 15.236.176.210
suspicious

Threats

PID
Process
Class
Message
2244
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2244
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info