URL:

qq.com

Full analysis: https://app.any.run/tasks/f7887821-7ed3-4bdd-886c-5fc72877313a
Verdict: Malicious activity
Analysis date: December 18, 2023, 02:12:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

AB735A258A90E8E1F3E3DCF231BF53A9

SHA1:

EA96376E64DC86683C64E7284EF032D3CF654FFC

SHA256:

77F3E4BCA5E8A0BE07CF5AD6C4D2F4BFF369C458965E6767F59D4A5AA7EDFE7C

SSDEEP:

3:NLGT:ZK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1056"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2040 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2040"C:\Program Files\Internet Explorer\iexplore.exe" "qq.com"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2332"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2040 CREDAT:2037003 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
25 063
Read events
24 974
Write events
87
Delete events
2

Modification events

(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2040) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
67
Text files
191
Unknown types
0

Dropped files

PID
Process
Filename
Type
1056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D29B8600016E5B155F44DEC08954FE0B
SHA256:42B3FF524F4E07D585745E8025D7053E57A5BD911AE93A3E364C66DF2EDE8BCC
1056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\MMWFX6P1.htmhtml
MD5:C1B8907767AD65E0B13E09700ABDCA7A
SHA256:498896A219BC4F7661CE1631A2B9DFE701D1C3D933A7E6C9E179B113AC28C78C
1056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475binary
MD5:D71BCBB484DBCE4313629DC4DDDF8F76
SHA256:53A548B02C4C3148CB08B45A1F0E8A1810200E92928D3B6EF9B1376A558690E6
1056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_4CBB9675BC1B0A9532841D0EFEA0E99Cbinary
MD5:9FD7F177A642A583EA06A09F8638C1EE
SHA256:6F53D5562E5AEEB43BC3D7A3A504890986B7D7433C2E4F7E0C6C9D80F78AF0BE
1056iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
1056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\0[4].pngimage
MD5:45B05C3849B4F47B83230F257DB5EEBC
SHA256:36B36F1A4A1B2F35AFB498C2FDF582DDD79F7682F6F508778F523F140DE0BE48
1056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\0[2].pngimage
MD5:EA0B1233737234D09096050F3D1D8D63
SHA256:93E206E275FC147CFD003FD8E27F1B33E59FFDF33758B67D854079724EAA7EB4
1056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\0[2].pngimage
MD5:66D1AC0674AB82D0088588EA83607F9B
SHA256:E7FD3003680756897D554A6A051D0EC5CAA0B20E8A32DD7643FE521A12C8B6E0
1056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\0[1].pngimage
MD5:F3EDD999B89CCF1595D0B3015CF7981E
SHA256:D5772765312FBFCA46740F16B04F73ADB893F3C32B89A6D626B9F61B9C00EBD9
1056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\0[1].pngimage
MD5:51507CBB084D397D72247462D603D924
SHA256:C874F52E800045BFD53EA27D9549E260A2F45CDE6988BBD47E82FDF0B46DB65B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
124
DNS requests
47
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1056
iexplore.exe
GET
302
123.150.76.218:80
http://qq.com/
unknown
html
137 b
unknown
1056
iexplore.exe
GET
200
95.101.54.105:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f6bf34dbb61e71d7
unknown
compressed
4.66 Kb
unknown
1056
iexplore.exe
GET
200
95.101.54.105:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?608cb4ab6d3f68d3
unknown
compressed
4.66 Kb
unknown
1056
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
1056
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDkcHsQGaDFetObPhfan5
unknown
binary
1.41 Kb
unknown
1056
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/gsorganizationvalsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSVLM6m9XSaK2pXyc357yFJVjgNwQQUaIa4fXrZbUlrhy8YixU0bNe0eg4CDE6TRZ%2BnMqw1TZ6syg%3D%3D
unknown
binary
1.43 Kb
unknown
1056
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/gsorganizationvalsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSVLM6m9XSaK2pXyc357yFJVjgNwQQUaIa4fXrZbUlrhy8YixU0bNe0eg4CDFhZC0TmFhpZ3rvPJw%3D%3D
unknown
binary
1.43 Kb
unknown
1056
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/gsorganizationvalsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSVLM6m9XSaK2pXyc357yFJVjgNwQQUaIa4fXrZbUlrhy8YixU0bNe0eg4CDHPbrB3tdu4CSPJD%2Bw%3D%3D
unknown
binary
1.43 Kb
unknown
1056
iexplore.exe
GET
200
163.181.56.215:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3D
unknown
binary
471 b
unknown
1056
iexplore.exe
GET
200
163.181.56.215:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAfhftOntfrm58qtJ6JauOY%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1056
iexplore.exe
123.150.76.218:80
qq.com
Tianjij,300000
CN
unknown
1056
iexplore.exe
23.196.244.121:443
www.qq.com
AKAMAI-AS
DE
unknown
1056
iexplore.exe
95.101.54.105:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
1056
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1056
iexplore.exe
101.33.10.108:443
mat1.gtimg.com
Tencent Building, Kejizhongyi Avenue
DE
unknown
1056
iexplore.exe
104.18.21.226:80
ocsp.globalsign.com
CLOUDFLARENET
shared
1056
iexplore.exe
2.16.184.177:443
inews.gtimg.com
AKAMAI-AS
DE
unknown
1056
iexplore.exe
43.135.106.184:443
pacaio.match.qq.com
Tencent Building, Kejizhongyi Avenue
HK
unknown

DNS requests

Domain
IP
Reputation
qq.com
  • 123.150.76.218
  • 203.205.254.157
  • 113.108.81.189
malicious
www.qq.com
  • 23.196.244.121
whitelisted
ctldl.windowsupdate.com
  • 95.101.54.105
  • 95.101.54.113
  • 87.248.202.1
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
pacaio.match.qq.com
  • 43.135.106.184
  • 43.135.106.117
whitelisted
mat1.gtimg.com
  • 101.33.10.108
  • 101.33.10.29
  • 101.33.10.106
whitelisted
inews.gtimg.com
  • 2.16.184.177
unknown
vm.gtimg.cn
  • 14.205.47.70
  • 61.54.7.127
  • 61.243.13.101
  • 175.43.23.247
  • 61.54.7.111
  • 42.7.60.137
  • 61.54.7.107
  • 116.177.242.62
  • 122.190.64.60
  • 61.54.7.129
  • 42.7.60.123
  • 175.43.23.80
  • 61.54.7.112
whitelisted
imgcache.qq.com
  • 118.212.235.76
  • 58.144.195.239
  • 61.54.94.215
  • 58.144.195.218
  • 61.241.148.55
  • 61.240.220.6
  • 118.212.235.97
  • 61.54.94.156
  • 58.144.195.158
  • 36.248.199.238
  • 157.255.135.6
  • 59.83.215.246
  • 36.248.199.212
  • 58.144.195.233
  • 118.212.236.104
whitelisted
ocsp.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted

Threats

No threats detected
No debug info