analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/3bd8b1cf-3947-49bb-bc8b-cbe241f10a7c
Verdict: Malicious activity
Analysis date: October 09, 2019, 16:22:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines
MD5:

ADBC271B61727B86097A82191190ACEF

SHA1:

9B05371018435267F15D744E8C74D68ED5E5A195

SHA256:

6D2EE3CA3B7BFDA7626C76D303BCDB0DAEB8038675CC6D379398A91FD5D88207

SSDEEP:

96:j6ILZo3ui3uWDWLJZgG5SHkt9avt230Af8kJnjdv+b3fqo:WUZAuMuWSL75SS9Ktk0Gpkbvqo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2652)
      • chrome.exe (PID: 2528)
    • Creates files in the user directory

      • iexplore.exe (PID: 2764)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2764)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2764)
    • Changes internet zones settings

      • iexplore.exe (PID: 2652)
    • Reads the hosts file

      • chrome.exe (PID: 2136)
      • chrome.exe (PID: 2528)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2764)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2764)
    • Manual execution by user

      • chrome.exe (PID: 2528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
13
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2652"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2764"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2652 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2528"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2932"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6cfda9d0,0x6cfda9e0,0x6cfda9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2112"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2444 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1896"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,12271620204724591325,8496513518891911387,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=3714886232738866982 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2136"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1020,12271620204724591325,8496513518891911387,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=4915692051702084824 --mojo-platform-channel-handle=1652 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12271620204724591325,8496513518891911387,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13815399653850117021 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3792"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12271620204724591325,8496513518891911387,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5219764028096042214 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2384 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2016"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12271620204724591325,8496513518891911387,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6824988025413028619 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
Total events
582
Read events
467
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
11
Text files
58
Unknown types
1

Dropped files

PID
Process
Filename
Type
2652iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico
MD5:
SHA256:
2652iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019092020190921\index.dat
MD5:
SHA256:
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\license.packed[1].jstext
MD5:DA9879E02DA2871468F03A5387E81C69
SHA256:2CBC7F685A57B2703D40D58D843824B0960C0718324BDCC2047A169228EA9DED
2764iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@google[1].txttext
MD5:EDE21D610AEBCB5107BFDED290C6672B
SHA256:BF8613380FD154A3A0804A3AA4E70E369E7570440230EFF02AD1AFBE9CBF79F6
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\plusone[1].jshtml
MD5:CFF7D998A50D9B668F1F34A13B9E4D3B
SHA256:7C18430A74C8363FE8F6BD1354295886ADF9ED0EAA6C0343755A0E8141E166C1
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019100920191010\index.datdat
MD5:377B33BED23539F283A1DDD30868B14F
SHA256:A96C99D1BF7AF68B5F6F8009451A777EAFD9A16E2B1F2B5B4FD55129EF14C69F
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\script.packed[1].jstext
MD5:A427D75014900B8FB637E51A2506B941
SHA256:2CC0E962131D1C568862EDAF2EA9A6F8A4980AA8C7290FB05B6B33B6D96F0D36
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\widgets[1].jstext
MD5:1D8D0709ED691E2BC0472DBFC17C8ABD
SHA256:90476F48E0B8A9F9C5C11FD16F13FC6A8772FE281D12C8E63153A6F948CDD348
2764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\ErrorPageTemplate[1]text
MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
SHA256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
39
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2764
iexplore.exe
GET
200
93.184.220.66:80
http://platform.twitter.com/widgets.js
US
text
28.0 Kb
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
GET
185.180.12.142:80
http://r3---sn-n02xgoxufvg3-8pxe.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=185.183.107.236&mm=28&mn=sn-n02xgoxufvg3-8pxe&ms=nvh&mt=1570638150&mv=m&mvi=2&pl=24&shardbypass=yes
AT
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
2764
iexplore.exe
GET
200
172.217.16.142:80
http://apis.google.com/js/plusone.js
US
html
16.6 Kb
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
2764
iexplore.exe
OPTIONS
400
185.60.216.35:80
http://www.facebook.com/
IE
html
1.42 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2764
iexplore.exe
172.217.23.106:80
ajax.googleapis.com
Google Inc.
US
whitelisted
2764
iexplore.exe
172.217.16.142:80
apis.google.com
Google Inc.
US
whitelisted
4
System
185.60.216.35:445
www.facebook.com
Facebook, Inc.
IE
whitelisted
2652
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2764
iexplore.exe
104.31.75.221:443
bitcoines.com
Cloudflare Inc
US
unknown
2764
iexplore.exe
93.184.220.66:80
platform.twitter.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2764
iexplore.exe
185.60.216.35:80
www.facebook.com
Facebook, Inc.
IE
whitelisted
2136
chrome.exe
216.58.205.227:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
185.60.216.35:137
www.facebook.com
Facebook, Inc.
IE
whitelisted
2136
chrome.exe
172.217.16.142:443
apis.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
ajax.googleapis.com
  • 172.217.23.106
  • 172.217.16.170
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.74
  • 172.217.22.106
  • 172.217.23.170
  • 216.58.205.234
  • 172.217.21.234
  • 172.217.22.10
  • 172.217.23.138
whitelisted
apis.google.com
  • 172.217.16.142
whitelisted
platform.twitter.com
  • 93.184.220.66
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
bitcoines.com
  • 104.31.75.221
  • 104.31.74.221
malicious
www.facebook.com
  • 185.60.216.35
whitelisted
clientservices.googleapis.com
  • 216.58.205.227
whitelisted
accounts.google.com
  • 172.217.18.13
shared
www.google.com.ua
  • 216.58.207.35
whitelisted
fonts.googleapis.com
  • 216.58.210.10
whitelisted

Threats

Found threats are available for the paid subscriptions
11 ETPRO signatures available at the full report
No debug info