analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/f38aeafe-67e1-4f45-af9b-b1aab0d7a4a6
Verdict: Malicious activity
Analysis date: March 22, 2019, 10:18:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text
MD5:

DA383FA4A6FB64F203140C04F027862D

SHA1:

ED74395A569F691811A61064B70592B4C1FB2149

SHA256:

78C1F8B1B2BEF9E175CCF088DC5A4F016DFB9C771E8EB0A5B3653885900C3052

SSDEEP:

48:TquHVFiGPOZLwb8sN8Al2wWKrScg+FEcQ0q5d9tOgu:THHVFVGObn8AprDyz0q5d9tlu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 1336)
    • Application launched itself

      • iexplore.exe (PID: 1336)
    • Creates files in the user directory

      • iexplore.exe (PID: 2584)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2584)
      • iexplore.exe (PID: 1632)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2584)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2584)
      • iexplore.exe (PID: 1632)
      • iexplore.exe (PID: 1336)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2584)
      • iexplore.exe (PID: 1632)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1632)
      • iexplore.exe (PID: 2584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

viewport: width=device-width, initial-scale=1.0
HTTPEquivXUACompatible: ie=edge
Title: E-sign documents online, secure e-signature solutions | Adobe Sign
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1336"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2584"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1336 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1632"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1336 CREDAT:79874C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
700
Read events
527
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
26
Unknown types
12

Dropped files

PID
Process
Filename
Type
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\babel.min[1].js
MD5:
SHA256:
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\1Ptrg8zYS_SKggPNwIYqWqZPBA[1].eot
MD5:
SHA256:
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\polyfill[1].jstext
MD5:F24A732996F4C8114CE590C4998BEC26
SHA256:6DECFB49881D91E09D6DD2F56EB5764DBCF1E93BC4D70773AC82B966C140B744
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019032220190323\index.datdat
MD5:B34671638A3E140DB6A4AFE6CC718A6D
SHA256:5E60AAC6CBC723F5DD5FCEB929ED7EFF2C0683FE321B57542DF67C7233316D03
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\@curli[1].txttext
MD5:FB0B1F1592FC7C321F55359E2920C39B
SHA256:92AA439B3A256F82C2553B138DB77AD8751C1D6C23EB4D981B48216E3CD09FD9
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\css[1].txttext
MD5:A29DAC836E24C3E2C9D98ECC7960C2BA
SHA256:DECBFBFB611BECC9B1DAEE438DD76D06794C4BEA299F90AAB7DD3EFC6467F95F
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\css[1].txttext
MD5:2D1FDB6F49AD87629A962AD6BDDA2D98
SHA256:8D586CC74F47F6096E6131382AD27527EF0FBC4DE0879DC0FFB161CC7B8061D7
1632iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\css[2].txttext
MD5:DCD21E15F7883CE27163C0A046DC627E
SHA256:0D4F7DFEA51B0FEE54D1FAC5A383BC041031A4E33BD651290172C9877D183DE5
1632iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\babel.min[1].js
MD5:
SHA256:
2584iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\1Ptsg8zYS_SKggPNwE44TYFu[1].eoteot
MD5:C46CD683166E4EDD9E9248BFC35372F8
SHA256:CA0549E340224F3FE86F5E0069CBD8E1C3DDE74C5143F0E786D857D100F4186D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
43
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1336
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2584
iexplore.exe
216.58.205.234:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2584
iexplore.exe
151.101.2.109:443
cdn.polyfill.io
Fastly
US
suspicious
2584
iexplore.exe
104.19.198.151:443
cdnjs.cloudflare.com
Cloudflare Inc
US
shared
1336
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2584
iexplore.exe
52.188.192.18:443
curli.org
Microsoft Corporation
US
unknown
2584
iexplore.exe
104.16.122.175:443
unpkg.com
Cloudflare Inc
US
shared
1632
iexplore.exe
52.188.192.18:443
curli.org
Microsoft Corporation
US
unknown
2584
iexplore.exe
94.31.29.138:443
cdn.jsdelivr.net
netDNA
GB
unknown
1632
iexplore.exe
104.16.122.175:443
unpkg.com
Cloudflare Inc
US
shared
2584
iexplore.exe
216.58.207.67:443
fonts.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
cdn.polyfill.io
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
curli.org
  • 52.188.192.18
shared
cdn.jsdelivr.net
  • 94.31.29.138
whitelisted
fonts.googleapis.com
  • 216.58.205.234
whitelisted
unpkg.com
  • 104.16.122.175
  • 104.16.124.175
  • 104.16.125.175
  • 104.16.123.175
  • 104.16.126.175
whitelisted
cdnjs.cloudflare.com
  • 104.19.198.151
  • 104.19.196.151
  • 104.19.195.151
  • 104.19.197.151
  • 104.19.199.151
whitelisted
fonts.gstatic.com
  • 216.58.207.67
whitelisted

Threats

PID
Process
Class
Message
2584
iexplore.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
1632
iexplore.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
No debug info