analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://malware.wicar.org/data/js_crypto_miner.html

Full analysis: https://app.any.run/tasks/096059b2-41b0-4e29-93b0-7a7dbc7447ca
Verdict: Malicious activity
Analysis date: September 30, 2020, 00:13:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
coinhive
miner
Indicators:
MD5:

FE8566407FCEA3C4CDDB267B3FC10046

SHA1:

F414C6B6F80884E24FA34CDF4C1DA069D5D7D44B

SHA256:

734D84D52590DC46B0EA7B56AA61CB558E8C5E5BDF4F548511F53D61061A34AC

SSDEEP:

3:N1KTTTXoPsGMVRhIKAX5G:CmsGURebX8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MINER was detected

      • iexplore.exe (PID: 2220)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 2124)
    • Changes internet zones settings

      • iexplore.exe (PID: 2124)
    • Application launched itself

      • iexplore.exe (PID: 2124)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 2124)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2220)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe #MINER iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2124"C:\Program Files\Internet Explorer\iexplore.exe" "http://malware.wicar.org/data/js_crypto_miner.html"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2220"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2124 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
674
Read events
605
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
8
Text files
4
Unknown types
3

Dropped files

PID
Process
Filename
Type
2124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2124iexplore.exeC:\Users\admin\AppData\Local\Temp\Cab390E.tmp
MD5:
SHA256:
2124iexplore.exeC:\Users\admin\AppData\Local\Temp\Tar390F.tmp
MD5:
SHA256:
2124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver392F.tmp
MD5:
SHA256:
2124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f7ruq93\imagestore.datbinary
MD5:FA41B35133C7A2751010C68587C55026
SHA256:5E632C2790749CE88E116367E6FAD351DBBA6875781EE3D840C8F33B37222B44
2124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203binary
MD5:95F2F5A220E480F46E58504FBDCDF9B8
SHA256:02A2264CA59F2FA40EFED54E821A3AEEC62E0D94ED7D55FFEF4BCF4E3781BA64
2124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].icoimage
MD5:9FB559A691078558E77D6848202F6541
SHA256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
2124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xmlxml
MD5:095C72688DE7D90E6526DC0D8878F3F6
SHA256:8684403DA59628039E9B4B0D245C5B7E1FAC1242A087DED44EAF3B792E4A231E
2124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203der
MD5:D058A0F8195CBF92DBCA8263C31F35F8
SHA256:E07B34E9B6AA2618DF204E8861FFF805ADA4E42B151155371456B00AA5B31B40
2124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\urlblockindex[1].binbinary
MD5:FA518E3DFAE8CA3A0E495460FD60C791
SHA256:775853600060162C4B4E5F883F9FD5A278E61C471B3EE1826396B6D129499AA7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
12
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2124
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2124
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2220
iexplore.exe
GET
200
208.94.116.21:80
http://malware.wicar.org/data/js_crypto_miner.html
US
html
287 b
malicious
2124
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2124
iexplore.exe
GET
200
208.94.116.21:80
http://malware.wicar.org/favicon.ico
US
image
953 b
malicious
2124
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2124
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2124
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2124
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2220
iexplore.exe
208.94.116.21:80
malware.wicar.org
GridFury, LLC
US
malicious
2124
iexplore.exe
208.94.116.21:80
malware.wicar.org
GridFury, LLC
US
malicious

DNS requests

Domain
IP
Reputation
malware.wicar.org
  • 208.94.116.21
malicious
coinhive.com
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
2220
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Coinhive/DeepMiner JavaScript Miner
No debug info