analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://megawrzuta.pl/download/fd58c653885ca6d77d2c19c5d95afd44.html

Full analysis: https://app.any.run/tasks/ff8ceb7f-a8b6-46c3-a657-1c60946c781e
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: June 27, 2022, 10:51:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MD5:

129E7541C0208BBBF47B64A45086C2EC

SHA1:

0183505E2BCA104E305F390C3022DD4724F1A4E4

SHA256:

726C54968C43CBFF4CF3F7C2BB6C25FDB806511B538942C07BD1AC0D9BC2A395

SSDEEP:

3:N8XBELjBSCu5WIRsqQ6tQn:2YSj5DRsqvQn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3348)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3936)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2964)
      • iexplore.exe (PID: 3348)
      • chrome.exe (PID: 3936)
      • chrome.exe (PID: 2176)
      • chrome.exe (PID: 2608)
      • chrome.exe (PID: 3324)
      • chrome.exe (PID: 2508)
      • chrome.exe (PID: 1180)
      • chrome.exe (PID: 3480)
      • chrome.exe (PID: 3636)
      • chrome.exe (PID: 448)
      • chrome.exe (PID: 916)
      • chrome.exe (PID: 4092)
      • chrome.exe (PID: 1848)
      • chrome.exe (PID: 2552)
      • chrome.exe (PID: 3356)
      • chrome.exe (PID: 2764)
      • chrome.exe (PID: 3696)
      • chrome.exe (PID: 3376)
      • chrome.exe (PID: 1132)
      • chrome.exe (PID: 3312)
      • chrome.exe (PID: 580)
    • Reads the computer name

      • iexplore.exe (PID: 2964)
      • iexplore.exe (PID: 3348)
      • chrome.exe (PID: 3936)
      • chrome.exe (PID: 2508)
      • chrome.exe (PID: 2608)
      • chrome.exe (PID: 3636)
      • chrome.exe (PID: 3696)
    • Application launched itself

      • iexplore.exe (PID: 2964)
      • chrome.exe (PID: 3936)
    • Changes internet zones settings

      • iexplore.exe (PID: 2964)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3348)
      • iexplore.exe (PID: 2964)
      • chrome.exe (PID: 2608)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3348)
      • iexplore.exe (PID: 2964)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 2964)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3348)
    • Manual execution by user

      • chrome.exe (PID: 3936)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3348)
    • Reads the hosts file

      • chrome.exe (PID: 2608)
      • chrome.exe (PID: 3936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
22
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2964"C:\Program Files\Internet Explorer\iexplore.exe" "https://megawrzuta.pl/download/fd58c653885ca6d77d2c19c5d95afd44.html"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3348"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2964 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3936"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
Explorer.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
2176"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6eded988,0x6eded998,0x6eded9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
2508"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1028,7718660002770260838,10879450250975590909,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1052 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
2608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1028,7718660002770260838,10879450250975590909,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1296 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3324"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,7718660002770260838,10879450250975590909,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1948 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
86.0.4240.198
1180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,7718660002770260838,10879450250975590909,131072 --enable-features=PasswordImport --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1976 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
3480"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,7718660002770260838,10879450250975590909,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
916"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1028,7718660002770260838,10879450250975590909,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Total events
30 839
Read events
30 663
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
156
Text files
99
Unknown types
19

Dropped files

PID
Process
Filename
Type
2964iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:5F13CB1C77670C83850F5E26AC0F533B
SHA256:CF5D5A7AAB8438305313AF2959A490A1D002FE505F926C91D0EBCED997E3B4EF
2964iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:28CC3D4B0DA8A29A9DCD6D4755C84342
SHA256:A4CA2DD1D4545838F7A9102623442BC76BDEB2185E9991A294BCB0B6456DDA0E
3348iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DBAD959FCDB6931E57E37453875DCF52der
MD5:DB5491A7BC56DBA9A9F886EB31FA731F
SHA256:81B5EE8D1F44FD30A0043A15E5C449C45498A732F10B5FCF17939679A5FCDF8B
3348iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabF34.tmpcompressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
3348iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\fd58c653885ca6d77d2c19c5d95afd44[1].htmhtml
MD5:D739CA209534A2089DB67A469BD4A632
SHA256:E23E8D429DF457CDFFC869C7345C095BA47EFA627C694C791872E0AE913F130C
3348iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
2964iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF9254A57D8BE1460B.TMPgmc
MD5:FD00CFE91FAAD0BECCCFD88801FE9827
SHA256:7F11B049E5CD35463EC4BEC51A3E6DE550F693196102BE9B1EF64F7723E720F2
2964iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF82F1A52248F0F505.TMPgmc
MD5:8571AD1675D0B8AE0B3F62BC321A7895
SHA256:09549DAAEEEA4A7E8A96BF5A44155FFB8093CEA90A56DE91B59C2B654169E29D
3348iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:2A556FB62A8CC843AC25ED1E51AFBA6F
SHA256:C3D277ADA291F93B0531F274C02E135A9A7CBB418743BCC49DA3682E1E1DD0E8
2964iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:05101333A8537F7CC5FD09FA03476852
SHA256:3340F7FDB30D7CD4FC1A4CE9F7AA9A5E6A8DCEC580B5D4C957BA474FF349D4C2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
77
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3348
iexplore.exe
GET
200
184.24.77.62:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgNkbOtuTNehEvW6WGFS1V1zRw%3D%3D
US
der
503 b
shared
2608
chrome.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
crx
242 Kb
whitelisted
2964
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3348
iexplore.exe
GET
200
96.16.145.230:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
3348
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?8cc0879a1ae2339e
US
compressed
60.0 Kb
whitelisted
2964
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?58119ce511d89f2b
US
compressed
4.70 Kb
whitelisted
3348
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?5f4491e319cd9d85
US
compressed
60.0 Kb
whitelisted
2964
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?828d55acd2f71243
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2964
iexplore.exe
131.253.33.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2964
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3348
iexplore.exe
96.16.145.230:80
x1.c.lencr.org
Akamai Technologies, Inc.
US
suspicious
3348
iexplore.exe
184.24.77.62:80
r3.o.lencr.org
Time Warner Cable Internet LLC
US
unknown
3348
iexplore.exe
78.47.238.48:443
megawrzuta.pl
Hetzner Online GmbH
DE
malicious
3348
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2964
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2608
chrome.exe
172.217.16.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3348
iexplore.exe
142.250.185.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
78.47.238.48:443
megawrzuta.pl
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
megawrzuta.pl
  • 78.47.238.48
malicious
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
x1.c.lencr.org
  • 96.16.145.230
whitelisted
r3.o.lencr.org
  • 184.24.77.62
  • 184.24.77.78
  • 184.24.77.81
  • 184.24.77.65
  • 184.24.77.73
  • 184.24.77.58
  • 184.24.77.74
  • 184.24.77.76
  • 184.24.77.64
shared
pagead2.googlesyndication.com
  • 142.250.74.194
whitelisted
fonts.googleapis.com
  • 142.250.185.106
whitelisted
clientservices.googleapis.com
  • 172.217.16.131
whitelisted

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info