URL:

gmai.com

Full analysis: https://app.any.run/tasks/9e7fc3e8-52e0-43fb-8cc9-64ae86b3b3c5
Verdict: Malicious activity
Analysis date: October 06, 2023, 03:12:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B5CB62647CCD822D6F8E50F923074CCA

SHA1:

03F84F343C5D27F8DF25C8D67A06C678C6862D9B

SHA256:

6F833158032A69B89BFF249CEA1EC97CA9702684D14FD40F619F9D1118B97D02

SSDEEP:

3:5ZIn:52n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
612"C:\Program Files\Internet Explorer\iexplore.exe" "gmai.com"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3460"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:612 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
21 416
Read events
21 354
Write events
62
Delete events
0

Modification events

(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
30
Text files
35
Unknown types
0

Dropped files

PID
Process
Filename
Type
3460iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\FEPSOP4B.txttext
MD5:33B4D2BC6AFB3A9FEECF4D862344F190
SHA256:AA366E1F5CF22D0959FF25BDAF7AA57E9756BFBE9260815307DC6019A41D50AD
3460iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\P8C0PPNC.txttext
MD5:FE67F54A498E268070DD9DBA5E595B8A
SHA256:266D08B572D6D3F98C045D2D45A34787C1C823E2395D8AC03E166F28636483FD
3460iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\OS0ZSV8R.txttext
MD5:196920095FD62F393E95E3582F0D80CF
SHA256:839D42806A8B855000D9635C3082D3FFE732E5511D28EE391A1E2760F94B85B0
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\aQxparBlG[1].jshtml
MD5:683A1BDF098B525F31B8864EE383BAF7
SHA256:465E6B4C7F0034B1BEAD6EC0F60CB319657908C8E8F758C0930F56837C6C23D8
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\PFFGUF3Xtext
MD5:32682312D17C7CBF18E73594F5570319
SHA256:E55FB1A1D731153E943B68844AF12DCCE8BFAC917C98FFDEA64C80DA0607DD47
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\86UZZN0U.htmhtml
MD5:6642F5D132E98CE32341E20D057439A8
SHA256:C598B6BD86621C1068799E4A87D57D30FB51D0900804E8678E585F9FB447C702
3460iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\0ANR86DS.txttext
MD5:F0F07C9455DCBEBE1D6F54B7D9756F02
SHA256:40E814B296D56F36CFED66DA466D93A73D5DAC34E8078660C3117AF1273C067D
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\caf[1].jstext
MD5:C8D0B7BDD8575526ACC98527C4AD0F59
SHA256:CAA02FF044BC4B9FAE9B8BB53B04B6BBB13E257EBD4D1D8EA65C52F1756DF891
3460iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_42DEC485767232C8B99FDCA35BF678E8binary
MD5:FA491D74419DDE846B652A565A038FF9
SHA256:27A74B25AAF12D5702BB6E7131219BE37EAD52A53D6A5F0FC922563E0D5A342D
3460iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_BBCE07F0D1D3591F7AACC4D200BCC3F0binary
MD5:AE5D71AA0E438260F532D2F999674D79
SHA256:6FB92509611D81F6238D7F25DADF34A1C49D3C0EA86CE8E1EB982EE67264D841
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
38
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3460
iexplore.exe
GET
200
199.59.243.225:80
http://ww1.gmai.com/
unknown
html
1009 b
unknown
3460
iexplore.exe
GET
302
78.41.204.39:80
http://gmai.com/
unknown
text
11 b
unknown
3460
iexplore.exe
GET
200
199.59.243.225:80
http://ww1.gmai.com/aQxparBlG.js
unknown
html
67.5 Kb
unknown
3460
iexplore.exe
GET
200
199.59.243.225:80
http://ww1.gmai.com/px.gif?ch=2&rn=8.473729736487918
unknown
image
42 b
unknown
3460
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?cb43d5953a2d69db
unknown
compressed
4.66 Kb
unknown
3460
iexplore.exe
POST
200
199.59.243.225:80
http://ww1.gmai.com/_fd
unknown
compressed
1.98 Kb
unknown
3460
iexplore.exe
GET
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDT17UIkLKbfRLCBYCPDA60
unknown
binary
472 b
unknown
3460
iexplore.exe
GET
200
199.59.243.225:80
http://ww1.gmai.com/px.gif?ch=1&rn=8.473729736487918
unknown
image
42 b
unknown
3460
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?842b3e01a16ab432
unknown
compressed
4.66 Kb
unknown
3460
iexplore.exe
GET
200
208.91.196.46:80
http://iyfbodn.com/?dn=gmai.com&pid=9POT3387I&pbsubid=22f5910c-20dc-4224-86f8-de24d0c2f4c1&noads=http%3A%2F%2Fiyfbodn.com%2F%3Fdn%3Dgmai.com%26skipskenzo%3Dtrue
unknown
html
28.2 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3460
iexplore.exe
78.41.204.39:80
gmai.com
Snel.com B.V.
NL
unknown
3460
iexplore.exe
199.59.243.225:80
ww1.gmai.com
AMAZON-02
US
unknown
3460
iexplore.exe
142.250.74.196:443
www.google.com
GOOGLE
US
whitelisted
3460
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
3460
iexplore.exe
142.250.181.227:80
ocsp.pki.goog
GOOGLE
US
whitelisted
3460
iexplore.exe
142.250.184.226:443
partner.googleadservices.com
GOOGLE
US
whitelisted
3460
iexplore.exe
172.217.16.195:443
www.gstatic.com
GOOGLE
US
whitelisted
3460
iexplore.exe
142.250.185.99:443
fonts.gstatic.com
GOOGLE
US
whitelisted
612
iexplore.exe
92.123.104.59:443
www.bing.com
Akamai International B.V.
DE
unknown
612
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
gmai.com
  • 78.41.204.39
whitelisted
ww1.gmai.com
  • 199.59.243.225
unknown
www.google.com
  • 142.250.74.196
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.pki.goog
  • 142.250.181.227
whitelisted
partner.googleadservices.com
  • 142.250.184.226
whitelisted
www.gstatic.com
  • 172.217.16.195
whitelisted
fonts.gstatic.com
  • 142.250.185.99
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 92.123.104.59
  • 92.123.104.63
  • 92.123.104.60
  • 92.123.104.28
  • 92.123.104.62
  • 92.123.104.38
  • 92.123.104.34
  • 92.123.104.31
  • 92.123.104.32
whitelisted

Threats

No threats detected
No debug info