analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.ycovid19.org%2F&data=04%7C01%7Cgail.gordon%40wizards.com%7C0f4f3e4d31e443a56dde08d91a23b86e%7C701edd3ec7a84789b1ce8a243620d68f%7C0%7C0%7C637569563013806008%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0&sdata=Xv1UGoAkVMAGssJ%2BX4o9ElTZUk%2FuEK4HkXwSYVxgC%2BY%3D&reserved=0

Full analysis: https://app.any.run/tasks/a9fc0215-c05a-43fe-8d64-0d6d60a705d1
Verdict: Malicious activity
Analysis date: May 19, 2021, 12:45:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
covid19
Indicators:
MD5:

8265EA9D9D7A7139B45D42B3CECA9723

SHA1:

EF012EF75F6724416E6DF53452D408C12711E933

SHA256:

6C65455532827428DF5BA4DE65222E563F382A1F135D96E764A95312FFEFC826

SSDEEP:

6:2LV9iRXPNHszlTLCRn1bsWLjVoyTaAL1sz5N6eVaVbeAiJbUuRCmVB7IAXLkcidW:2LqVsx61IOVoPl5sKP7RPBcyLkhE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2064)
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 3956)
      • iexplore.exe (PID: 372)
    • Changes internet zones settings

      • iexplore.exe (PID: 372)
    • Application launched itself

      • iexplore.exe (PID: 372)
      • chrome.exe (PID: 2064)
    • Reads the hosts file

      • chrome.exe (PID: 2500)
      • chrome.exe (PID: 2064)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 372)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3956)
    • Drops Coronavirus (possible) decoy

      • iexplore.exe (PID: 3956)
    • Changes settings of System certificates

      • iexplore.exe (PID: 372)
    • Manual execution by user

      • chrome.exe (PID: 2064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
41
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
372"C:\Program Files\Internet Explorer\iexplore.exe" "https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.ycovid19.org%2F&data=04%7C01%7Cgail.gordon%40wizards.com%7C0f4f3e4d31e443a56dde08d91a23b86e%7C701edd3ec7a84789b1ce8a243620d68f%7C0%7C0%7C637569563013806008%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0&sdata=Xv1UGoAkVMAGssJ%2BX4o9ElTZUk%2FuEK4HkXwSYVxgC%2BY%3D&reserved=0"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3956"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:372 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2064"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1000"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6a69a9d0,0x6a69a9e0,0x6a69a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2384"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2268 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1972"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,5183609452478628022,13063727677680979598,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=8838495070610756109 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2500"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,5183609452478628022,13063727677680979598,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=18253470934855143137 --mojo-platform-channel-handle=1628 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3276"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,5183609452478628022,13063727677680979598,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12351824501950656540 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2368"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,5183609452478628022,13063727677680979598,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4987439446405539699 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3048"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,5183609452478628022,13063727677680979598,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17686885458060466818 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
838
Read events
696
Write events
134
Delete events
8

Modification events

(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
4005445136
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30887084
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
0
Suspicious files
43
Text files
305
Unknown types
17

Dropped files

PID
Process
Filename
Type
3956iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab2FA2.tmp
MD5:
SHA256:
3956iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar2FA3.tmp
MD5:
SHA256:
2064chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60A5087F-810.pma
MD5:
SHA256:
2064chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:FB5B20517A0D1F7DAD485989565BEE5E
SHA256:99405F66EDBEB2306F4D0B4469DCADFF5293B5E1549C588CCFACEA439BB3B101
3956iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:0675C0D0DA9A6EAC284A10C2DDDA636A
SHA256:7852903B2B3BD59C816AA0A74272A4C51BAE13F38BB72A67F3FD04B50D061B50
2064chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:D4322EEBAC92D1B8F7A6F5E39F6264B7
SHA256:A3EEDF21B850DCC7CE5AE04395ECDD2D29DA4EA549C8A185DD9E8B552A87B8C2
3956iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4der
MD5:9BD290C73C295139470B5A56F8D857BB
SHA256:BFC8F14E57E8FE77F10EC2C420B746A75291C034DD872BC673E459EBFDAC5968
2064chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
2064chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\973b3d32-11db-4ccd-bfdc-b9528b351ed0.tmp
MD5:
SHA256:
2064chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE
SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
83
DNS requests
41
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2500
chrome.exe
GET
301
52.49.20.157:80
http://www.ycovid19.org/
IE
suspicious
3956
iexplore.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/rootr3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEHgDGCDPAjbzpoUYuu%2B39wE%3D
US
der
1.48 Kb
whitelisted
3956
iexplore.exe
GET
301
52.49.20.157:80
http://www.ycovid19.org/
IE
suspicious
3956
iexplore.exe
GET
200
104.18.20.226:80
http://crl.globalsign.com/root-r3.crl
US
der
1.72 Kb
whitelisted
3956
iexplore.exe
GET
200
93.184.220.29:80
http://crl4.digicert.com/DigiCertGlobalRootCA.crl
US
der
631 b
whitelisted
3956
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/DigiCertGlobalRootCA.crl
US
der
631 b
whitelisted
3956
iexplore.exe
GET
200
2.22.9.80:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
unknown
der
1.16 Kb
whitelisted
3956
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEHgDGCDPAjbzpoUYuu%2B39wE%3D
US
der
1.48 Kb
whitelisted
3956
iexplore.exe
GET
200
23.203.65.92:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
2500
chrome.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
crx
242 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
372
iexplore.exe
131.253.33.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3956
iexplore.exe
104.47.56.156:443
nam11.safelinks.protection.outlook.com
Microsoft Corporation
US
suspicious
2500
chrome.exe
142.250.181.237:443
accounts.google.com
Google Inc.
US
suspicious
23.203.65.92:80
x1.c.lencr.org
Akamai Technologies, Inc.
US
unknown
3956
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2500
chrome.exe
142.250.186.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3956
iexplore.exe
52.49.20.157:443
www.ycovid19.org
Amazon.com, Inc.
IE
suspicious
3956
iexplore.exe
151.101.2.2:443
fonts.jimstatic.com
Fastly
US
shared
3956
iexplore.exe
2.22.9.80:80
crl.identrust.com
Akamai International B.V.
unknown
2500
chrome.exe
142.250.185.131:443
www.google.com.ua
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
nam11.safelinks.protection.outlook.com
  • 104.47.56.156
  • 104.47.57.156
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted
www.ycovid19.org
  • 52.49.20.157
  • 52.16.206.246
  • 54.246.199.25
  • 34.248.153.214
suspicious
crl.identrust.com
  • 2.22.9.80
  • 2.22.9.113
whitelisted
x1.c.lencr.org
  • 23.203.65.92
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
clientservices.googleapis.com
  • 142.250.186.131
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Suspicious Domain Request for Possible COVID-19 Domain M1
3956
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 Domain M1
3956
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious TLS SNI Request for Possible COVID-19 Domain M1
3956
iexplore.exe
Potentially Bad Traffic
ET INFO Possible COVID-19 Domain in SSL Certificate M2
Potentially Bad Traffic
ET INFO Suspicious Domain Request for Possible COVID-19 Domain M1
372
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious TLS SNI Request for Possible COVID-19 Domain M1
372
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious TLS SNI Request for Possible COVID-19 Domain M1
372
iexplore.exe
Potentially Bad Traffic
ET INFO Possible COVID-19 Domain in SSL Certificate M2
372
iexplore.exe
Potentially Bad Traffic
ET INFO Possible COVID-19 Domain in SSL Certificate M2
Potentially Bad Traffic
ET INFO Suspicious Domain Request for Possible COVID-19 Domain M1
No debug info