URL:

https://kshow123.net/show/running-man/episode-568.html

Full analysis: https://app.any.run/tasks/aab1ea8a-31b3-42fd-9490-05fbcdba0f51
Verdict: Malicious activity
Analysis date: August 31, 2021, 15:41:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

664C049188DCE3BD1BADB1F0865DE7B7

SHA1:

AA5BBF8286C490BC116B1FA60D0877ED7E8FDDEA

SHA256:

768FC99F88764F753F81B5D13E0E635206C10C4071425B9A469BE79BA621F1FB

SSDEEP:

3:N8TNKnFfJKkFNuaJ:28nFfJKyNuaJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1736)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 1660)
    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 1660)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 1660)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 1660)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2056)
      • iexplore.exe (PID: 1736)
    • Changes internet zones settings

      • iexplore.exe (PID: 2056)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2056)
      • iexplore.exe (PID: 1736)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2056)
    • Reads CPU info

      • iexplore.exe (PID: 1736)
    • Checks supported languages

      • iexplore.exe (PID: 1736)
      • iexplore.exe (PID: 2056)
    • Application launched itself

      • iexplore.exe (PID: 2056)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2056)
      • iexplore.exe (PID: 1736)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1736)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2056)
    • Creates files in the user directory

      • iexplore.exe (PID: 1736)
      • iexplore.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1660C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Exit code:
0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1736"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2056 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2056"C:\Program Files\Internet Explorer\iexplore.exe" "https://kshow123.net/show/running-man/episode-568.html"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
18 789
Read events
18 589
Write events
198
Delete events
2

Modification events

(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30908030
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30908030
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
20
Text files
144
Unknown types
55

Dropped files

PID
Process
Filename
Type
2056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8Fbinary
MD5:
SHA256:
1736iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\styles.min[1].csstext
MD5:
SHA256:
2056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86Cder
MD5:
SHA256:
2056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86Cbinary
MD5:
SHA256:
2056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
2056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
1736iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\UCRDTK5O.txttext
MD5:
SHA256:
2056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:
SHA256:
2056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\urlblockindex[1].binbinary
MD5:FA518E3DFAE8CA3A0E495460FD60C791
SHA256:775853600060162C4B4E5F883F9FD5A278E61C471B3EE1826396B6D129499AA7
1736iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\roommate[1].jpgimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
84
TCP/UDP connections
108
DNS requests
50
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1672
svchost.exe
GET
304
67.27.157.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a4a8b423b0895b18
US
whitelisted
1672
svchost.exe
GET
304
67.27.157.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?880ee01b2c3de996
US
whitelisted
2056
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.68 Kb
whitelisted
2056
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/DigiCertGlobalRootCA.crl
US
der
631 b
whitelisted
1736
iexplore.exe
GET
200
104.21.78.19:80
http://icdn.kshow123.net/cover/running-man.jpg
US
image
57.1 Kb
whitelisted
1736
iexplore.exe
GET
200
172.67.214.134:80
http://kshow123.net/theme/js/global.js?v=201612009
US
compressed
40.2 Kb
whitelisted
1736
iexplore.exe
GET
200
104.21.78.19:80
http://icdn.kshow123.net/thumb/roommate.jpg
US
image
29.5 Kb
whitelisted
1736
iexplore.exe
GET
200
104.21.78.19:80
http://icdn.kshow123.net/thumb/my-husband-is-a-foreigner.jpg
US
image
18.5 Kb
whitelisted
1736
iexplore.exe
GET
200
104.21.78.19:80
http://icdn.kshow123.net/thumb/law-of-the-jungle.jpg
US
image
31.0 Kb
whitelisted
2056
iexplore.exe
GET
200
67.27.157.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?4972a4eea06c8cf8
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2056
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1736
iexplore.exe
172.67.214.134:443
kshow123.net
US
unknown
1736
iexplore.exe
184.30.24.121:80
s7.addthis.com
GTT Communications Inc.
US
suspicious
2056
iexplore.exe
67.27.157.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
2056
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1736
iexplore.exe
51.89.115.15:80
embogsoarers.com
GB
unknown
1736
iexplore.exe
13.107.5.80:443
api.bing.com
Microsoft Corporation
US
whitelisted
1736
iexplore.exe
172.67.214.134:80
kshow123.net
US
unknown
1736
iexplore.exe
104.21.78.19:80
kshow123.net
Cloudflare Inc
US
unknown

DNS requests

Domain
IP
Reputation
kshow123.net
  • 172.67.214.134
  • 104.21.78.19
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 67.27.157.254
  • 67.27.159.126
  • 8.253.204.120
  • 67.27.235.254
  • 67.27.159.254
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
fristminyas.com
  • 172.255.6.54
  • 176.31.68.255
  • 146.59.211.253
  • 51.178.195.168
  • 146.59.211.227
  • 51.195.21.154
  • 51.68.186.41
  • 51.254.89.232
  • 146.59.188.42
  • 51.195.115.102
  • 51.89.1.51
suspicious
icdn.kshow123.net
  • 104.21.78.19
  • 172.67.214.134
unknown

Threats

PID
Process
Class
Message
1736
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
1736
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
No debug info