analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://icagwafqfr7l6mdlante7ieobz45txya6b2ikqtcsio3w4gy-ipfs-dweb-link.translate.goog/?_x_tr_hp=bafybeicctn&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp#[email protected]

Full analysis: https://app.any.run/tasks/df526a85-6017-4cb5-a674-1ec8be5d2202
Verdict: Malicious activity
Analysis date: June 27, 2022, 06:50:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

0D26E5DD35990B1CD6097E269A84A8BD

SHA1:

4FCA2089C52C009C640DAD185D4F5AC1631A03E0

SHA256:

74C07474F168B39AC84F1488448FF9DA5F84B094B3E81C0A8009895CB8943C07

SSDEEP:

6:2ODX65cOhvaZuCTHqcpGqvdebde7rt2bzn:2265DxTMKMEXn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2128)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2128)
      • iexplore.exe (PID: 1560)
    • Reads the computer name

      • iexplore.exe (PID: 2128)
      • iexplore.exe (PID: 1560)
    • Application launched itself

      • iexplore.exe (PID: 1560)
    • Changes internet zones settings

      • iexplore.exe (PID: 1560)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2128)
      • iexplore.exe (PID: 1560)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2128)
    • Creates files in the user directory

      • iexplore.exe (PID: 2128)
      • iexplore.exe (PID: 1560)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2128)
      • iexplore.exe (PID: 1560)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1560)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1560"C:\Program Files\Internet Explorer\iexplore.exe" "https://icagwafqfr7l6mdlante7ieobz45txya6b2ikqtcsio3w4gy-ipfs-dweb-link.translate.goog/?_x_tr_hp=bafybeicctn&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp#[email protected]"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2128"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1560 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
Total events
15 504
Read events
15 339
Write events
163
Delete events
2

Modification events

(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
809439424
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30968306
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30968306
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
21
Text files
27
Unknown types
15

Dropped files

PID
Process
Filename
Type
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:359BC5825A162A7B2BB7D3253C30B280
SHA256:813D85E46B0364C8F2E2AD51217126967E19970E607F94A402973451D1E7DF6C
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:64F0D4A5A9C61C6339FA43BECFB991A9
SHA256:11ABA84D014E4448BE0DECA37089CC50E4A8867B35199E861966097FDC3B35FA
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_71CFDC33F7EFAD323AB8A970CA557090der
MD5:710E91DC6E4B713C00A4C427CFA2A9F1
SHA256:98B564D9D19F6E333488546281E5E007988D221BD1E0724EA372C363A3401CDE
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_71CFDC33F7EFAD323AB8A970CA557090binary
MD5:CB7D2A98B9C1D727D239820CC0AA6AE4
SHA256:5F46A6BD4D4AFAA3F475C84645E704C409CF40DF179E1580667BE1877EE4E4C7
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9binary
MD5:698B2F93A1962EBF13BE9B98045998D6
SHA256:76753FCE78DDBA024A1741249423B8AA9BD348BE2D58047CCD39EF1C924F1F96
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_6C6637CE25033BE2BB3CA46AB846F0E2binary
MD5:D8E535F2E599BB40F3C47D90859665F7
SHA256:C91AB88634EA340A92D0CC984C0293872B5FAF328B8C8869B07AB4C1CDEC4B30
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAder
MD5:5A11C6099B9E5808DFB08C5C9570C92F
SHA256:91291A5EDC4E10A225D3C23265D236ECC74473D9893BE5BD07E202D95B3FB172
2128iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\646C991C2A28825F3CC56E0A1D1E3FA9der
MD5:3523BFA7B3ACACA361AC9814166709AD
SHA256:CE82F93FDB091E30497236D7F04BB67F7008E8E4133D2A8445B531C16D13AA67
2128iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\2BX9Z3I5.htmhtml
MD5:7B503C907A3C6BBEE039CDC0B229ECE2
SHA256:6C7D7F79FCA7F096D40168A24A58F127922A9C3E08200DC047F6781E41B53EF3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
70
DNS requests
36
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2128
iexplore.exe
GET
200
142.250.186.99:80
http://crl.pki.goog/gsr1/gsr1.crl
US
der
1.61 Kb
whitelisted
2128
iexplore.exe
GET
200
142.250.74.206:80
http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl
US
der
12.4 Kb
whitelisted
2128
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCED8LL4LoNrATCuVyHZQ7qcY%3D
US
der
471 b
whitelisted
2128
iexplore.exe
GET
200
104.89.32.83:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
2128
iexplore.exe
GET
200
95.140.236.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?839ad0190c7a26b1
GB
compressed
60.0 Kb
whitelisted
2128
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2128
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCqm%2FLZVwk%2FcRLv5CtSZANu
US
der
472 b
whitelisted
2128
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEESz3%2FmlG2yGCtBzjzp1dVc%3D
US
der
471 b
whitelisted
2128
iexplore.exe
GET
200
95.140.236.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fe9d7b17c2dae316
GB
compressed
4.70 Kb
whitelisted
2128
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1560
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2128
iexplore.exe
172.217.18.3:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2128
iexplore.exe
142.250.186.99:80
crl.pki.goog
Google Inc.
US
whitelisted
2128
iexplore.exe
172.217.18.99:443
www.gstatic.com
Google Inc.
US
whitelisted
2128
iexplore.exe
95.140.236.128:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
GB
malicious
2128
iexplore.exe
142.250.184.193:443
icagwafqfr7l6mdlante7ieobz45txya6b2ikqtcsio3w4gy-ipfs-dweb-link.translate.goog
Google Inc.
US
whitelisted
2128
iexplore.exe
104.17.24.14:443
cdnjs.cloudflare.com
Cloudflare Inc
US
suspicious
2128
iexplore.exe
69.16.175.10:443
code.jquery.com
Highwinds Network Group, Inc.
US
malicious
2128
iexplore.exe
51.210.32.103:443
i.ibb.co
GB
unknown
2128
iexplore.exe
142.250.185.170:443
ajax.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
icagwafqfr7l6mdlante7ieobz45txya6b2ikqtcsio3w4gy-ipfs-dweb-link.translate.goog
  • 142.250.184.193
malicious
ctldl.windowsupdate.com
  • 95.140.236.128
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ocsp.pki.goog
  • 172.217.18.3
whitelisted
crl.pki.goog
  • 142.250.186.99
whitelisted
www.gstatic.com
  • 172.217.18.99
whitelisted
i.ibb.co
  • 51.210.32.103
  • 51.210.3.236
  • 51.210.32.132
  • 217.182.228.53
  • 51.210.32.106
shared
code.jquery.com
  • 69.16.175.10
  • 69.16.175.42
whitelisted
cdnjs.cloudflare.com
  • 104.17.24.14
  • 104.17.25.14
whitelisted

Threats

No threats detected
No debug info