analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://AMZNAMZN.COM/BILLWA

Full analysis: https://app.any.run/tasks/735acd72-b897-4b9f-b576-1d4599a803f4
Verdict: Malicious activity
Analysis date: June 27, 2022, 07:30:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

8D521BFCB207766733B450367818F0AC

SHA1:

1F547678F05D05EB37EABF029128A2B07C82D11E

SHA256:

6877DACB384436F178B5CBFAE6BD88830F5A46DE596039D54780B193D03E3EAB

SSDEEP:

3:N8KW/OXV:2hyV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 3168)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2444)
      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 3168)
    • Checks supported languages

      • iexplore.exe (PID: 2444)
      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 3168)
    • Changes internet zones settings

      • iexplore.exe (PID: 2444)
    • Application launched itself

      • iexplore.exe (PID: 2444)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 2444)
      • iexplore.exe (PID: 3168)
    • Reads internet explorer settings

      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 3168)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2444)
      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 3168)
    • Creates files in the user directory

      • iexplore.exe (PID: 912)
      • iexplore.exe (PID: 3168)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2444"C:\Program Files\Internet Explorer\iexplore.exe" "https://AMZNAMZN.COM/BILLWA"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
912"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2444 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3168"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2444 CREDAT:464162 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
27 099
Read events
26 922
Write events
177
Delete events
0

Modification events

(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30968311
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30968311
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2444) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
44
Text files
129
Unknown types
42

Dropped files

PID
Process
Filename
Type
912iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:E7D171E3E4BB6244EA2B9AF54A9983F6
SHA256:DB3C5099581F191ABE0225E90D7C9D19A395BE5E3B5D0C3A04CEAC0B7372480D
2444iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:C426C4C8AE96FA45E7482C749D2BB419
SHA256:FA97C753D59EE25C30EC9E1CADCC9911E06640A8A53F36033FD72B2420A807B5
912iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarAD6B.tmpcat
MD5:2D8A5090656DE9FB55DD0F3BA20F9299
SHA256:44AE1E61A4E6305C15AAA52FD1B29DDB060E69233703CBA611F5E781D766442E
912iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\BILLWA[1].htmhtml
MD5:41B6FA7AEC01135E17477AD3D25C8BD1
SHA256:F9B44BAE36D49027726FFF7D5F0B5CC99930B9D54697ED3EBC7F523F0D0FF7AC
912iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\GA1FMU7E.txttext
MD5:89A11569353C62EBC2A1007509C0CCC7
SHA256:20C9ACE0D959386A866C1410FC679C2F3CCC369B2508BACB174C6DDB1086A205
912iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarAD69.tmpcat
MD5:2D8A5090656DE9FB55DD0F3BA20F9299
SHA256:44AE1E61A4E6305C15AAA52FD1B29DDB060E69233703CBA611F5E781D766442E
912iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabAD6A.tmpcompressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
2444iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:28CC3D4B0DA8A29A9DCD6D4755C84342
SHA256:A4CA2DD1D4545838F7A9102623442BC76BDEB2185E9991A294BCB0B6456DDA0E
912iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabAD68.tmpcompressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
912iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\E6TXSHAS.txttext
MD5:2E07C3BE43B92FDEFE9CD9949D38C99F
SHA256:7572661BB5E985268CF69F3C10244D68807762DF870A7960DAE48BDC8925EECB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
59
TCP/UDP connections
142
DNS requests
53
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
912
iexplore.exe
GET
200
199.59.243.220:80
http://ww1.amznamzn.com/
US
html
915 b
malicious
912
iexplore.exe
POST
200
199.59.243.220:80
http://ww1.amznamzn.com/_fd
US
text
2.36 Kb
malicious
912
iexplore.exe
GET
200
2.18.212.243:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c0f72bb8d2957e0c
unknown
compressed
60.0 Kb
whitelisted
912
iexplore.exe
GET
200
199.59.243.220:80
http://ww1.amznamzn.com/js/parking.2.91.2.js
US
html
21.7 Kb
malicious
912
iexplore.exe
GET
200
2.18.212.243:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7a85ad4903b75cf8
unknown
compressed
60.0 Kb
whitelisted
912
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCED8LL4LoNrATCuVyHZQ7qcY%3D
US
der
471 b
whitelisted
912
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCfB0sRdF8W%2FBIjdfpYeZPw
US
der
472 b
whitelisted
912
iexplore.exe
GET
200
23.45.105.185:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
912
iexplore.exe
GET
200
199.59.243.220:80
http://ww1.amznamzn.com/px.gif?ch=2&rn=8.867647462927529
US
image
42 b
malicious
2444
iexplore.exe
GET
200
2.18.212.243:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7dd2f3291066ef71
unknown
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2444
iexplore.exe
13.107.22.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
912
iexplore.exe
199.59.243.220:80
ww1.amznamzn.com
US
malicious
912
iexplore.exe
2.18.212.243:80
ctldl.windowsupdate.com
Akamai International B.V.
unknown
912
iexplore.exe
23.45.105.185:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown
2444
iexplore.exe
2.18.212.243:80
ctldl.windowsupdate.com
Akamai International B.V.
unknown
912
iexplore.exe
5.79.79.212:443
amznamzn.com
LeaseWeb Netherlands B.V.
NL
malicious
2444
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2444
iexplore.exe
199.59.243.220:80
ww1.amznamzn.com
US
malicious
912
iexplore.exe
172.217.16.194:443
partner.googleadservices.com
Google Inc.
US
whitelisted
912
iexplore.exe
216.58.206.196:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
amznamzn.com
  • 5.79.79.212
malicious
ctldl.windowsupdate.com
  • 2.18.212.243
  • 2.18.212.211
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
x1.c.lencr.org
  • 23.45.105.185
whitelisted
r3.o.lencr.org
  • 2.16.218.144
  • 2.16.218.170
shared
ww1.amznamzn.com
  • 199.59.243.220
malicious
parking.bodiscdn.com
  • 104.22.40.120
  • 104.22.41.120
  • 172.67.5.15
whitelisted
www.google.com
  • 216.58.206.196
  • 142.250.185.196
whitelisted

Threats

PID
Process
Class
Message
3168
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3168
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info