URL:

https://app.adjust.com/jsr?url=https%3A%2F%2Fpzwv.adj.st%2F%3Fc%3Dom%26s%3Dmv%26bid%3D47322%26t%3D3%26adjust_t%3Dn9s5k1_9du0cf%26adjust_campaign%3Dcrm_bra_mix_gro_aut_%7B%7Bcampaign.%24%7Bname%7D%7D%7D_%7B%7Bcampaign.%24%7Bapi_id%7D%7D%7D_ct-AbandonedCartLocalshops%26adjust_deeplink%3Dtalabat%253A%252F%252F%253Fc%253Dom%2526s%253Dmv%2526bid%253D47322%2526t%253D3%26adjust_redirect%3Dhttp%3A%2F%2F1vd6d6.gygoxw.zidoragroup.com%2Fcol%2FQklfZGFuZV9wcm9kdWt0X21vaGl0b0BscHBzYS5jb20=

Full analysis: https://app.any.run/tasks/3eae668f-b0b7-46c5-b4d7-2343b84870a4
Verdict: Malicious activity
Analysis date: December 08, 2023, 07:55:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
greatness
Indicators:
MD5:

C8486BCE4AEFDA8E90D455BC8CA849C6

SHA1:

3030F3AEF9EFE95BD48F85BA73D47299240C1E96

SHA256:

6D44341692417831E39F8EFF7B4987C5E97E0343117018303A8F92BA474CEC3A

SSDEEP:

12:2NXrny8IFtSSKy0ShRSRSM75fiSIzVvVXZq8sMd2hXFuvSY:2hrnyi2KfbIXZhvr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • iexplore.exe (PID: 2136)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • wmpnscfg.exe (PID: 3140)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3140)
    • Application launched itself

      • iexplore.exe (PID: 280)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe #PHISHING iexplore.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Internet Explorer\iexplore.exe" "https://app.adjust.com/jsr?url=https%3A%2F%2Fpzwv.adj.st%2F%3Fc%3Dom%26s%3Dmv%26bid%3D47322%26t%3D3%26adjust_t%3Dn9s5k1_9du0cf%26adjust_campaign%3Dcrm_bra_mix_gro_aut_%7B%7Bcampaign.%24%7Bname%7D%7D%7D_%7B%7Bcampaign.%24%7Bapi_id%7D%7D%7D_ct-AbandonedCartLocalshops%26adjust_deeplink%3Dtalabat%253A%252F%252F%253Fc%253Dom%2526s%253Dmv%2526bid%253D47322%2526t%253D3%26adjust_redirect%3Dhttp%3A%2F%2F1vd6d6.gygoxw.zidoragroup.com%2Fcol%2FQklfZGFuZV9wcm9kdWt0X21vaGl0b0BscHBzYS5jb20="C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2136"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:280 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3140"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
19 298
Read events
19 236
Write events
60
Delete events
2

Modification events

(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(280) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
33
Text files
40
Unknown types
0

Dropped files

PID
Process
Filename
Type
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_A6455B0223770C2BA5F3DCA84EF3C959binary
MD5:B1FCC5B2783647E33FBBC0EC7C452C55
SHA256:AEE1D09B5A4A9188C07CE21B8B92CD66D2112DBEC6564FAB83A170506E4ADF47
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:78E3A966B5FAA27C3073ADC363B8BE82
SHA256:5CD71DE775B6BA47F01301771064702CDD271DDA91F36264A120A96C63015250
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D76868C250B3240414CE3EFBB12518_DD401B9C1CC62D165027BC54294F7773binary
MD5:7AA629EA309201EC383F09C57C73D192
SHA256:AC20DA56B132F90CED9DEE41D30AC79574278D22893C5ADA9DDF3D1DCABA4272
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:E321789A8805CE063FED38452ADB1416
SHA256:F47D2D9352ADB4F583BE3CFA161DA3FA159E672022AD998F3A90E125DDD20F97
2136iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jsr[1].htmhtml
MD5:A6288FD887C3CC8B1534264016ACCD54
SHA256:139F1EEEFF6E29B6AEF1E921205208054EE77286594F0463E592E5178565DD12
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_A6455B0223770C2BA5F3DCA84EF3C959binary
MD5:40BDA14E4A0E86BEE5F013F605C63A0A
SHA256:C1D5858153243B582F6BFA4541F3C54641DC0BD523AB4A45C5522F280631B5A0
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D76868C250B3240414CE3EFBB12518_DD401B9C1CC62D165027BC54294F7773binary
MD5:31B8ACC6D755FE0F6A6F5D597C5DBC46
SHA256:3EF675E8775537F72B09D8B64963AB06E4610E61A46ACE993BAEA125A83501CE
2136iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabA40.tmpcompressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
2136iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:04E3CB76C03148406ABD6F0093C65150
SHA256:53DC64FF714633595CA3190E5ADE98C044239C91A6B8AB9123FD71D293B569D7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
48
DNS requests
22
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2136
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a88ccd45ad45c010
unknown
compressed
4.66 Kb
unknown
2136
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
2136
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAkraU94iP40ugbP0X2dzWg%3D
unknown
binary
471 b
unknown
2136
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSnxLiz3Fu1WB6n1%2FE6xWn1b0jXiQQUdIWAwGbH3zfez70pN6oDHb7tzRcCEAXnTeZY54cJ1p2DNaphzF4%3D
unknown
binary
471 b
unknown
2136
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?b32a6d7022c7cbce
unknown
compressed
65.2 Kb
unknown
2136
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4eebf07ed743eb5e
unknown
compressed
65.2 Kb
unknown
2136
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7c0985578a653cb5
unknown
compressed
4.66 Kb
unknown
2136
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
binary
471 b
unknown
2136
iexplore.exe
GET
200
184.24.77.54:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgQHQnKF7stKk4CO2ecPxyVCHA%3D%3D
unknown
binary
503 b
unknown
2136
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAz1vQYrVgL0erhQLCPM8GY%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2136
iexplore.exe
185.151.204.11:443
app.adjust.com
Adjust GmbH
US
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
2136
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2136
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2136
iexplore.exe
185.151.204.203:443
pzwv.adj.st
Adjust GmbH
US
unknown
2136
iexplore.exe
192.185.41.212:80
1vd6d6.gygoxw.zidoragroup.com
UNIFIEDLAYER-AS-1
US
unknown
2136
iexplore.exe
104.18.2.35:443
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
app.adjust.com
  • 185.151.204.11
  • 185.151.204.8
  • 185.151.204.14
  • 185.151.204.10
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
pzwv.adj.st
  • 185.151.204.203
  • 185.151.204.202
unknown
1vd6d6.gygoxw.zidoragroup.com
  • 192.185.41.212
unknown
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
  • 104.18.2.35
  • 104.18.3.35
malicious
x1.c.lencr.org
  • 23.212.210.158
whitelisted
x2.c.lencr.org
  • 23.212.210.158
whitelisted
aadcdn.msauth.net
  • 13.107.246.45
  • 13.107.213.45
whitelisted
www.office.com
  • 13.107.6.156
whitelisted

Threats

PID
Process
Class
Message
2136
iexplore.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Possible Public R2.dev Bucket Abuse to Phishing in TLS (Greatness)
1080
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2136
iexplore.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
2136
iexplore.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2136
iexplore.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2136
iexplore.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2136
iexplore.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
No debug info