analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://go.sparkpostmail1.com/

Full analysis: https://app.any.run/tasks/05a964b9-24c9-4ffe-b506-f7f79d787e81
Verdict: Malicious activity
Analysis date: December 14, 2018, 09:38:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E70FF0392ECC350791CA411249E03177

SHA1:

BFBFECC1B5D1990BCBBEF98EAFDD6202F4FF1DD9

SHA256:

68428DA95F566A3BE1BDE7F091517E76DE3458E5E94A97817DB1DE24E82EF903

SSDEEP:

3:N1KZKLWfuEL:C0iWEL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 3196)
    • Changes internet zones settings

      • iexplore.exe (PID: 2680)
    • Application launched itself

      • iexplore.exe (PID: 2680)
      • chrome.exe (PID: 2260)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3196)
      • iexplore.exe (PID: 2680)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3196)
    • Creates files in the user directory

      • iexplore.exe (PID: 2680)
      • iexplore.exe (PID: 3196)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2572)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3196)
    • Changes settings of System certificates

      • chrome.exe (PID: 2260)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
14
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2680"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3196"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2680 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2572C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
2260"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
3380"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x6bad00b0,0x6bad00c0,0x6bad00ccC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
2968"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3692 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
2444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=976,4336180940483287014,11847328860378142835,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=F591EB9CBCC6E1CC93C8496CE7DBBC24 --mojo-platform-channel-handle=1000 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
3832"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,4336180940483287014,11847328860378142835,131072 --enable-features=PasswordImport --service-pipe-token=9C471D6E227C6BDDAAC60922DC592263 --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9C471D6E227C6BDDAAC60922DC592263 --renderer-client-id=5 --mojo-platform-channel-handle=1920 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
2676"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,4336180940483287014,11847328860378142835,131072 --enable-features=PasswordImport --service-pipe-token=333BAB9AF93EDE3385929923726CCF11 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=333BAB9AF93EDE3385929923726CCF11 --renderer-client-id=3 --mojo-platform-channel-handle=2156 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
2116"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,4336180940483287014,11847328860378142835,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=5E2AAC48433E991EEB0338C697404BA9 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5E2AAC48433E991EEB0338C697404BA9 --renderer-client-id=6 --mojo-platform-channel-handle=3548 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
Total events
1 202
Read events
1 026
Write events
170
Delete events
6

Modification events

(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{0AB83353-FF84-11E8-834A-5254004A04AF}
Value:
0
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2680) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070C0005000E00090026002A006503
Executable files
0
Suspicious files
85
Text files
218
Unknown types
53

Dropped files

PID
Process
Filename
Type
2680iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2680iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\sparkpost_com[1].txt
MD5:
SHA256:
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\sparkpost_com[1].htmhtml
MD5:EC7CF5CEEEDAE5ED60F0CF790FAE1E5E
SHA256:5E63DA1B2290E0B4F2E740B0B2AAD4F683129CAC13C24F7BD2BB3F5B159187E6
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\forms2.min[1].jstext
MD5:019C040AB7D4E5162DBAD965E3B6DA82
SHA256:8A889F8CD41E5A86957E338C937F62848FF948EC2FD995280858CA90F5C01DFF
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\devicon.min[1].csstext
MD5:08954B05660D3AC8693E0B03F965A7F2
SHA256:43C55B8E833DEE67699DF24E4EF742F951AAE5A51207D45B0C1E79B21069C987
3196iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@sparkpost[1].txttext
MD5:C04244D5F27650D6900CDC6EF436D76E
SHA256:84EDA0933799F8552CAC6E53C08C6544141A8DB33723F26733D691C41AD383E9
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\print[1].csstext
MD5:40B2651F5A64A921070F95D41472FC9D
SHA256:66081BD94CD83BE7ED41E8A9DAB59DDAED9E81DB4D0664089A498B62A7F23416
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\essb-display-methods.min[1].csstext
MD5:B4764EAAD63647762A07AB327EFCB44C
SHA256:48FBB08519CC34EA752E7468A9AC3EF41688B1779643810EF391276CA97BCF53
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\4552732375[1].jstext
MD5:B5D7D01C779C7DA182936B703E8BE88E
SHA256:B4CE27F4595F894B0F12E653F6EF12BCE3B3CACB080E6168340A70696419DF38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
213
DNS requests
137
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3196
iexplore.exe
GET
301
54.213.236.16:80
http://go.sparkpostmail1.com/
US
html
191 b
whitelisted
3196
iexplore.exe
GET
200
13.107.4.50:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.2 Kb
whitelisted
3196
iexplore.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.2 Kb
whitelisted
2260
chrome.exe
GET
200
91.199.212.52:80
http://crt.comodoca.com/COMODORSAAddTrustCA.crt
GB
der
1.37 Kb
whitelisted
2260
chrome.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/47BEABC922EAE80E78783462A79F45C254FDE68B.crt
US
der
969 b
whitelisted
3196
iexplore.exe
GET
200
52.222.146.138:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2260
chrome.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/47BEABC922EAE80E78783462A79F45C254FDE68B.crt
US
der
969 b
whitelisted
3196
iexplore.exe
GET
200
52.222.146.137:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2680
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2680
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3196
iexplore.exe
2.19.34.83:443
cdn.optimizely.com
Akamai International B.V.
whitelisted
3196
iexplore.exe
104.109.84.52:443
app-abm.marketo.com
Akamai International B.V.
NL
whitelisted
3196
iexplore.exe
172.217.168.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted
3196
iexplore.exe
54.213.236.16:80
go.sparkpostmail1.com
Amazon.com, Inc.
US
unknown
3196
iexplore.exe
23.111.9.217:443
a.optmnstr.com
netDNA
US
unknown
3196
iexplore.exe
23.38.52.235:443
cloud.typography.com
Akamai International B.V.
NL
whitelisted
3196
iexplore.exe
104.20.43.99:443
www.sparkpost.com
Cloudflare Inc
US
shared
3196
iexplore.exe
104.20.44.99:443
www.sparkpost.com
Cloudflare Inc
US
shared
3196
iexplore.exe
151.101.2.110:443
fast.wistia.com
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
go.sparkpostmail1.com
  • 54.213.236.16
  • 52.32.77.126
  • 34.208.241.159
whitelisted
www.sparkpost.com
  • 104.20.43.99
  • 104.20.44.99
whitelisted
cdn.optimizely.com
  • 2.19.34.83
whitelisted
cloud.typography.com
  • 23.38.52.235
whitelisted
app-abm.marketo.com
  • 104.109.84.52
whitelisted
a.optmnstr.com
  • 23.111.9.217
whitelisted
www.googletagmanager.com
  • 172.217.168.8
whitelisted
fast.wistia.com
  • 151.101.2.110
  • 151.101.66.110
  • 151.101.130.110
  • 151.101.194.110
whitelisted
media.sparkpost.com
  • 104.20.44.99
  • 104.20.43.99
unknown

Threats

No threats detected
No debug info