analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ifavicon.ic_

Full analysis: https://app.any.run/tasks/bb010053-73f7-499e-87fd-04561f3682f2
Verdict: Malicious activity
Analysis date: October 14, 2019, 08:26:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines
MD5:

8AB08EA45AD0ED954B3309383891A7DF

SHA1:

1316B7EA0DCA6CF73277C786EF3A55B7A56A6607

SHA256:

6B2B314A129D1E139ED84AF28F68A435DC1C6D7F2732E2D7ACB2EE71819F95D8

SSDEEP:

48:+mcDTpF1l5MqU9tmtZVCYi98IMTf99jP5KCwH:gbU9SVhl9r5KCy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • DllHost.exe (PID: 2076)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 3676)
    • Application launched itself

      • iexplore.exe (PID: 2168)
    • Changes internet zones settings

      • iexplore.exe (PID: 2168)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3676)
    • Manual execution by user

      • explorer.exe (PID: 3992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

Title: cwsc.co.kr
ContentType: text/html; charset=utf-8
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe explorer.exe no specs Shell Security Editor no specs

Process information

PID
CMD
Path
Indicators
Parent process
2168"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\ifavicon.ic_.htmC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3676"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2168 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3992"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2076C:\Windows\system32\DllHost.exe /Processid:{4D111E08-CBF7-4F12-A926-2C7920AF52FC}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
353
Read events
300
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
2168iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF102648E255B8E0AE.TMP
MD5:
SHA256:
2168iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFB0E0F8C8DBBCB8F0.TMP
MD5:
SHA256:
2168iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF3319680DB7C9DD64.TMP
MD5:
SHA256:
2168iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF378D6F1443E975FA.TMP
MD5:
SHA256:
2168iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{5671921D-EE5C-11E9-AB41-5254004A04AF}.dat
MD5:
SHA256:
3676iexplore.exeC:\Users\admin\AppData\Local\Temp\JavaDeployReg.logtext
MD5:EBA30F823F8C3D30127EAC85E889EFC6
SHA256:19CD269B6545D8536849BF3E581E6F2DFB121C2ADFD35FB624B2800E5BE9E708
2168iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{5671921E-EE5C-11E9-AB41-5254004A04AF}.datbinary
MD5:ACE564443EEC7044196C96A3BCEE0356
SHA256:0639FEF2FDFC1B4F6939A8C6CCE708D3D540A850B63CF082E9953983CCE63D23
2168iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\RecoveryStore.{5671921F-EE5C-11E9-AB41-5254004A04AF}.datbinary
MD5:5DB8FD725B64BDF2605A20292847284F
SHA256:164B9813C6E25744BF2C97DEA0211BF1D51C4FB541324FE251F8C08256145C1D
3676iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019101420191015\index.datdat
MD5:A63A66955DFB1451FDD7FA4505FB4885
SHA256:9A80D897AE4B07ADFEB5B8B3FCB028631FA2BA637E2EACE03331F441D15DF870
2168iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\{56719220-EE5C-11E9-AB41-5254004A04AF}.datbinary
MD5:1B399B43661D42DDC18FB97B2CFA6C84
SHA256:5767DEEDFF842BC77C152D61B871D0479281B78C987DCE450D1C124E3CE9E45D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3676
iexplore.exe
GET
200
185.53.179.29:80
http://parkingcrew.net/assets/scripts/js3.js
DE
text
17.5 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3676
iexplore.exe
185.53.179.29:80
parkingcrew.net
Team Internet AG
DE
malicious
2168
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
parkingcrew.net
  • 185.53.179.29
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

No threats detected
No debug info