analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://gtly.to/JwPTcUCYC

Full analysis: https://app.any.run/tasks/b0b8fa15-9162-47b0-97d9-40f7b7c4ec48
Verdict: Malicious activity
Analysis date: September 29, 2020, 23:05:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

4E2948972B9FA6EBC4E0C28C85019A13

SHA1:

08765B4C46E1B0FC222D12826FA4CFBED92D3FBB

SHA256:

6EB08F122F149FD0DABA49373B80EA578B9264E3AF98AEFB7770D40C5CA6BB46

SSDEEP:

3:N1KZRSRwS:C6RT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 2380)
      • iexplore.exe (PID: 2552)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2552)
      • iexplore.exe (PID: 2380)
    • Application launched itself

      • iexplore.exe (PID: 2552)
    • Changes internet zones settings

      • iexplore.exe (PID: 2552)
    • Creates files in the user directory

      • iexplore.exe (PID: 2380)
      • iexplore.exe (PID: 2552)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2380)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2552)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2552"C:\Program Files\Internet Explorer\iexplore.exe" "http://gtly.to/JwPTcUCYC"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2380"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2552 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
599
Read events
497
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
51
Text files
53
Unknown types
29

Dropped files

PID
Process
Filename
Type
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab7D0A.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar7D0B.tmp
MD5:
SHA256:
2380iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_592839A8569F831D0F2306AE4BB5C24Bder
MD5:6E9290B7E91B00949C6B6757790DF4C3
SHA256:5294AB8C62E4FD5E49055E9F096E06F61316B47FF0846FD566072FCEAAF013CA
2380iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\128744D688B6BB72F6A10FF0B9B28AFDFDAC76910BA62195137CA1CDFD90B50D[1].htmhtml
MD5:956768358D727FB192DBD46FB83239A6
SHA256:12334F2D0DCFBD06E0120416DBFBC2E7DD6FBFA65886ACF2131F03019EF99D83
2380iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08der
MD5:30142B9712DB3BF56074DDC675C257FD
SHA256:E097553550D5FC623C5EF334D0ED27BD29BEFEDD25927556D934364E56A22A69
2380iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F6F92FBF4E8096C9272B135AF6140AA8_B17B1089B02E21E65D57F1A8D7A76C5Cbinary
MD5:F03BA812C7B970D13CDBAD9600C8319A
SHA256:919E2F5D29204C234C81EE3E8615C2EE4F50E5FB11CBEA02A37F2327D6F1F430
2380iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\1325[1].csstext
MD5:0E1C63B51FD1A1CA0CE722F517B31D7A
SHA256:15422526318D3D74E833128C8D7FCCD1E0CFE91B0201436866CD6969A21217BD
2380iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\TJ7RV2NK.txttext
MD5:2BF5A5FD0BE9E824545F07FAC01E65D2
SHA256:3603D1CD6D468F21A8BEE76311D7097CE42ACF29E5CC177D6847BAFCC3E06F77
2380iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F6F92FBF4E8096C9272B135AF6140AA8_B17B1089B02E21E65D57F1A8D7A76C5Cder
MD5:A1ED857CD4EE3F085BB1280940D1BAAF
SHA256:23AF96F9820DAA92A415F1D089586BAB3EE5056BD45769F60A6BAEB94884DCA7
2380iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\landers-default[1].csstext
MD5:C49BBB87D11B7062D291E7AD874E76BB
SHA256:19884FB49D56E7D4723EE4BC95B73ECA8087332AF51CB00E0007187222952279
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
72
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2380
iexplore.exe
GET
301
216.239.32.21:80
http://gtly.to/JwPTcUCYC
US
html
302 b
whitelisted
2380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEArLKLpGXuU5CHZ0cPPNxhI%3D
US
der
471 b
whitelisted
2380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTnvAI%2FnN49qPTJY2qTQtfkLxjvEAQUo53mH%2FnaOU%2FAbuiRy5Wl2jHiCp8CEAfs%2BW%2FLoAPPQYgNjcQ8BVA%3D
US
der
313 b
whitelisted
2380
iexplore.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
2380
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCoziyTHasflwIAAAAAekur
US
der
472 b
whitelisted
2380
iexplore.exe
GET
200
2.16.186.11:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
2380
iexplore.exe
GET
200
216.58.207.67:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2380
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2380
iexplore.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
2380
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEAyDrs7o0RpNCAAAAABXoKo%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2380
iexplore.exe
185.222.108.82:443
www.encuentraunamilf.es
unknown
2380
iexplore.exe
172.217.23.138:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2380
iexplore.exe
2.16.186.11:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
2380
iexplore.exe
212.32.250.17:443
mastersincash.g2afse.com
LeaseWeb Netherlands B.V.
NL
unknown
2380
iexplore.exe
216.239.32.21:80
gtly.to
Google Inc.
US
whitelisted
2380
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2380
iexplore.exe
216.58.207.36:443
www.google.com
Google Inc.
US
whitelisted
2380
iexplore.exe
216.58.208.40:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2380
iexplore.exe
143.204.208.150:443
djjcyqvteia9v.cloudfront.net
US
whitelisted
2380
iexplore.exe
216.58.207.67:80
ocsp.pki.goog
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
gtly.to
  • 216.239.32.21
  • 216.239.36.21
  • 216.239.38.21
  • 216.239.34.21
whitelisted
mastersincash.g2afse.com
  • 212.32.250.17
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.encuentraunamilf.es
  • 185.222.108.82
unknown
isrg.trustid.ocsp.identrust.com
  • 2.16.186.11
  • 2.16.186.35
whitelisted
fonts.googleapis.com
  • 172.217.23.138
whitelisted
www.google.com
  • 216.58.207.36
whitelisted
djjcyqvteia9v.cloudfront.net
  • 143.204.208.150
  • 143.204.208.195
  • 143.204.208.26
  • 143.204.208.52
whitelisted
www.googletagmanager.com
  • 216.58.208.40
whitelisted
ocsp.pki.goog
  • 216.58.207.67
  • 142.250.74.195
whitelisted

Threats

PID
Process
Class
Message
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
No debug info