URL:

mail.vpindustries.co.in

Full analysis: https://app.any.run/tasks/11691868-8155-4601-9cc5-ebdd94a77b79
Verdict: Malicious activity
Analysis date: March 02, 2024, 11:53:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

6A27A8990AE5876A24B1A95212885BCA

SHA1:

7BC4AA18A05532F51E7325878AE95604C2D19149

SHA256:

6DD737167202586FEFFDF37F3883461DE94A1C01051A32B30DB66FC1DB5A681D

SSDEEP:

3:5tLm7G:DD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3240"C:\Program Files\Internet Explorer\iexplore.exe" "mail.vpindustries.co.in"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3536"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3240 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
19 184
Read events
19 055
Write events
94
Delete events
35

Modification events

(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31091864
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31091864
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3240) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
15
Text files
36
Unknown types
5

Dropped files

PID
Process
Filename
Type
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\4HPL13QO.htmhtml
MD5:1AAFAD84E57315880D1170021153A139
SHA256:E58AA87528E1C7FAADFADE902D7A940840371E37EF74A5B1863897776B7736D4
3536iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:DD01F2A8EBAE93ADEB7C2136118D26A3
SHA256:5307293A44164ABA4864F7B3CE7A365FE2C6EDE64BCFD265C9217B454B856F42
3536iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:5265691D737C977C717FFDD9CF1B7BE7
SHA256:7D98CA69810E1C144B88511C03641CB66C79AB83FB1779285D975CF4552871C3
3536iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAder
MD5:AC89A852C2AAA3D389B2D2DD312AD367
SHA256:0B720E19270C672F9B6E0EC40B468AC49376807DE08A814573FE038779534F45
3536iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\46WHWCRF.txttext
MD5:87A3A5C902DC36F828CF0B2B0B38A21D
SHA256:855E5E52BD3FB28ACA113091EBE34FF9A3E092218EBCC606CAE04DBB878A28D2
3536iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:C87198D82B5525D8ED77C711890E791A
SHA256:AC56AADFFF3F6CCF4D1896A359411231471EFF11354C34B49F7ECBBD1E308AF6
3536iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\R3Z6ZC4D.txttext
MD5:34C59BE1DDAB2D75AA498E08E54546AF
SHA256:21FC36781E999DE23E70A68A2971683812B14F2EF39D83FFA613180E9E87558E
3536iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_279EB7E7074697CADB0A3844954F1B7Dbinary
MD5:5F84DF8B17B4A342086BD00F3670FCAA
SHA256:D3C5F6F1A8E9206BC08392BF9894EC2A6AC7BD8AA7AB0F33BBEC34F82F136966
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ga[1].jstext
MD5:E9372F0EBBCF71F851E3D321EF2A8E5A
SHA256:1259EA99BD76596239BFD3102C679EB0A5052578DC526B0452F4D42F8BCDD45F
3536iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\V4ERP3DH.txttext
MD5:8820C971DF7D86DFA99A5BAF91D3532C
SHA256:F7A1ABB087F60C4260234200F894C539CFD2C26EC04A17C607844FEFE158691A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
32
DNS requests
16
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/
IN
html
2.40 Kb
unknown
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/vp-industries.css
IN
text
3.67 Kb
unknown
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/1/js-image-slider.js
IN
text
5.66 Kb
unknown
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/slide/3.jpg
IN
image
190 Kb
unknown
3536
iexplore.exe
GET
103.53.42.223:80
http://mail.vpindustries.co.in/slide/2.jpg
IN
unknown
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/slide/1.jpg
IN
image
123 Kb
unknown
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/slide/4.jpg
IN
image
217 Kb
unknown
3536
iexplore.exe
GET
200
103.53.42.223:80
http://mail.vpindustries.co.in/slide/5.jpg
IN
image
201 Kb
unknown
3536
iexplore.exe
GET
404
103.53.42.223:80
http://mail.vpindustries.co.in/loading.gif
IN
image
355 b
unknown
3536
iexplore.exe
GET
304
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?1092bf53f2b6a28c
GB
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3536
iexplore.exe
103.53.42.223:80
mail.vpindustries.co.in
PUBLIC-DOMAIN-REGISTRY
IN
unknown
3536
iexplore.exe
142.250.185.206:443
www.google-analytics.com
GOOGLE
US
whitelisted
3536
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
3536
iexplore.exe
172.217.23.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
3240
iexplore.exe
103.53.42.223:80
mail.vpindustries.co.in
PUBLIC-DOMAIN-REGISTRY
IN
unknown
3240
iexplore.exe
23.73.216.19:443
www.bing.com
Akamai International B.V.
BR
unknown
3240
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted

DNS requests

Domain
IP
Reputation
mail.vpindustries.co.in
  • 103.53.42.223
malicious
www.google-analytics.com
  • 142.250.185.206
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.pki.goog
  • 172.217.23.99
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 23.73.216.19
  • 23.73.216.40
  • 23.73.216.49
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

PID
Process
Class
Message
3536
iexplore.exe
Potentially Bad Traffic
ET INFO 404 Response with Javascript Variable in Page
3240
iexplore.exe
Potentially Bad Traffic
ET INFO 404 Response with Javascript Variable in Page
No debug info