URL:

http://vortal.me

Full analysis: https://app.any.run/tasks/c624a3d1-d2f4-42ab-bf86-2527c49cbdcf
Verdict: Malicious activity
Analysis date: February 01, 2022, 21:04:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

7EE3D5E52A8137EDF818A5690668B788

SHA1:

A43B450CD2254C55B2D35507BC8C4D725D27B92A

SHA256:

6723C78DFD5C3CFBC6650A0A7A7ED406C44C2B36CB4E150EF4318BF2E692C65C

SSDEEP:

3:N1KIMRA:CIQA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3608)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 1324)
      • iexplore.exe (PID: 3608)
    • Checks supported languages

      • iexplore.exe (PID: 3608)
      • iexplore.exe (PID: 1324)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3608)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1324)
    • Changes internet zones settings

      • iexplore.exe (PID: 1324)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1324)
      • iexplore.exe (PID: 3608)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3608)
      • iexplore.exe (PID: 1324)
    • Creates files in the user directory

      • iexplore.exe (PID: 3608)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1324)
    • Application launched itself

      • iexplore.exe (PID: 1324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1324"C:\Program Files\Internet Explorer\iexplore.exe" "http://vortal.me"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3608"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1324 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
Total events
16 706
Read events
16 572
Write events
130
Delete events
4

Modification events

(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30939055
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30939055
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1324) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
18
Text files
50
Unknown types
36

Dropped files

PID
Process
Filename
Type
3608iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8Fbinary
MD5:CB85CEDD3C78ACAA4CDFD99EAEAFE3C8
SHA256:1801CD810873EA34BD02A3558F9E41CBE6BADF2E5AFEEFC88CEC033D96F9BB5E
3608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\autoptimize_single_e80d5eb46c87a4a7f7d0aee436959e0c[1].csstext
MD5:E419D40B3B094CC520E8D1D97B23B3E9
SHA256:F5F7BC98C6ED842AB5E9D52E4DBD5B796365DB3975577184F46056816F5B6A01
1324iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:F10142B5AB723DA3A8A6B890EC3E6A5B
SHA256:21DC91BFAAF8B4AC3602E93076C850001B59720658B74943240CCA64B24485B0
3608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\R3EY3C27.htmhtml
MD5:E1E1D89BAF3300FC904A21D6807D556A
SHA256:7EDB4D618E94EB485905D3F4F089804E7750791979CDDDCC3C9EF246597C56D3
3608iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_0E3E47DCB79A5C90729CD0F4FD50E1CFder
MD5:ABEA13323158D1AE97591FCADD7B0E8A
SHA256:FA43FA22C7B2AF7D5B9A2941DEB6E97F24196C68067112D7F963F68EE16BC071
3608iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:B87769DD1D8186A536BD9108589ABD2D
SHA256:B97BF97F5F9B748327299B07A30DC24E75BC457E9C62892383BDBFE4544CBCCA
3608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\autoptimize_single_74cdc5ec642f11d529a6c0c8435f8fc1[1].csstext
MD5:CA751BE9D3CF0FBF2FA8F0BBE6C2D3AA
SHA256:8D9A5E8E4D278930A216EF9F360AA39CB0BED2D9F2905AF7B16CBB012F1DD428
3608iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:9C7C7C4BD5396B1B1B42D1076FD373A3
SHA256:9C800A2B53518B28544B3D7A25C18B6CED3B03CC8D3588CEEF1705AB06576DF8
3608iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:6AC176FDF51611EA4589F00FBE525534
SHA256:1B37E5A8C3D6855A34DF23791A5273F1AC73B069FACC93CBAEAFEDDB5462AAE0
1324iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
86
DNS requests
33
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3608
iexplore.exe
GET
301
107.180.41.160:80
http://vortal.me/
US
unknown
1324
iexplore.exe
GET
200
67.27.157.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?aca855439deafb4e
US
compressed
4.70 Kb
whitelisted
3608
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.68 Kb
whitelisted
1324
iexplore.exe
GET
200
67.27.157.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5ece1ce4496c7b8b
US
compressed
4.70 Kb
whitelisted
3608
iexplore.exe
GET
200
104.18.30.182:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
der
727 b
whitelisted
3608
iexplore.exe
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3608
iexplore.exe
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQC2PrP09fGo%2BgoAAAABK3x6
US
der
472 b
whitelisted
3608
iexplore.exe
GET
200
104.18.31.182:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEA8m2t3FFu44pxyrELpYKGk%3D
US
der
471 b
whitelisted
3608
iexplore.exe
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEH4wYrandiOsCgAAAAErgCs%3D
US
der
471 b
whitelisted
1324
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.2:53
whitelisted
1324
iexplore.exe
67.27.157.126:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
3608
iexplore.exe
188.114.97.7:443
www.vortal.me
Cloudflare Inc
US
malicious
1324
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1324
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3608
iexplore.exe
89.187.169.47:443
sp-ao.shortpixel.ai
CZ
malicious
3608
iexplore.exe
216.58.212.138:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3608
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3608
iexplore.exe
142.250.185.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3608
iexplore.exe
142.250.74.206:443
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
vortal.me
  • 107.180.41.160
unknown
www.microsoft.com
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 67.27.157.126
  • 8.253.204.121
  • 8.248.133.254
  • 8.253.207.121
  • 8.253.95.120
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.vortal.me
  • 188.114.97.7
  • 188.114.96.7
malicious
crl3.digicert.com
  • 93.184.220.29
whitelisted
fonts.googleapis.com
  • 216.58.212.138
whitelisted
www.googletagmanager.com
  • 216.58.212.136
whitelisted

Threats

No threats detected
No debug info