URL:

http://superflix.net

Full analysis: https://app.any.run/tasks/78d2e52a-01fc-4187-813b-d5cd4c5c22fa
Verdict: Malicious activity
Analysis date: April 10, 2020, 08:50:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
covid19
Indicators:
MD5:

39464503C309D43B4721E392BF33A551

SHA1:

B91C0EA95653CCF70FD1615A0A5B0407ACFCF169

SHA256:

79359DA32F8DB0002FE0A3A83F61D4AB69AF31E50D316D014FEEA5CAAEB5B615

SSDEEP:

3:N1KNQVX0:CCV0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2052)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1852)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3420)
      • iexplore.exe (PID: 3900)
      • iexplore.exe (PID: 3408)
      • iexplore.exe (PID: 3524)
    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2052)
      • iexplore.exe (PID: 3408)
      • iexplore.exe (PID: 3420)
      • iexplore.exe (PID: 3524)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1852)
      • iexplore.exe (PID: 3900)
    • Drops Coronavirus (possible) decoy

      • iexplore.exe (PID: 3408)
    • Changes internet zones settings

      • iexplore.exe (PID: 3420)
    • Application launched itself

      • iexplore.exe (PID: 3420)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3408)
      • iexplore.exe (PID: 3900)
      • iexplore.exe (PID: 3524)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3900)
      • iexplore.exe (PID: 3408)
      • iexplore.exe (PID: 3524)
      • iexplore.exe (PID: 3420)
    • Dropped object may contain TOR URL's

      • iexplore.exe (PID: 3900)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3408)
      • iexplore.exe (PID: 3524)
      • iexplore.exe (PID: 3900)
      • iexplore.exe (PID: 3420)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3420)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1852C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2052C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3408"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3420 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3420"C:\Program Files\Internet Explorer\iexplore.exe" "http://superflix.net"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3524"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3420 CREDAT:660824 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3900"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3420 CREDAT:202018 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
15 651
Read events
3 204
Write events
8 619
Delete events
3 828

Modification events

(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
876731824
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30805781
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3420) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
0
Suspicious files
516
Text files
949
Unknown types
325

Dropped files

PID
Process
Filename
Type
3408iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\3PLWVN89.txt
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\yn2NczyOYekb4c8aBu1U32TauFQ[1].jpgimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\logosuper2[1].pngimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\73KrcLh1DpnBP3HwGpqoUUwKWF4[1].jpgimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\game-of-thrones-23-backdrop[1].jpgimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\jesus-novela-record-92x138[1].jpgimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\tAlGYFGssx7BoWtAPsz76uYCPWG[1].jpgimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\ygUsgb6WSTZ4iyZJXpjswgngqBY[1].jpgimage
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\C5MD1VIC.htmhtml
MD5:
SHA256:
3408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\zXfQcdTx0jxbH5Atpwjvb5z5VjE[1].jpgimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
454
TCP/UDP connections
807
DNS requests
255
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3408
iexplore.exe
GET
301
104.27.162.204:80
http://superflix.net/
US
whitelisted
3408
iexplore.exe
GET
200
104.27.162.204:80
http://www.superflix.net/wp-content/uploads/2017/08/logosuper2.png
US
image
6.07 Kb
suspicious
3408
iexplore.exe
GET
200
104.27.162.204:80
http://www.superflix.net/
US
html
56.1 Kb
suspicious
3408
iexplore.exe
GET
200
104.16.60.155:80
http://image.tmdb.org/t/p/w185/73KrcLh1DpnBP3HwGpqoUUwKWF4.jpg
US
image
16.7 Kb
whitelisted
3408
iexplore.exe
GET
200
104.27.162.204:80
http://www.superflix.net/wp-content/uploads/2020/03/corona.png
US
image
82.0 Kb
suspicious
3408
iexplore.exe
GET
200
104.16.60.155:80
http://image.tmdb.org/t/p/w185/z4jYhWtI8npPRoW59lo5xfvDNuW.jpg
US
image
9.19 Kb
whitelisted
3408
iexplore.exe
GET
200
104.16.60.155:80
http://image.tmdb.org/t/p/w185/tAlGYFGssx7BoWtAPsz76uYCPWG.jpg
US
image
13.0 Kb
whitelisted
3408
iexplore.exe
GET
200
104.16.60.155:80
http://image.tmdb.org/t/p/w185/ygUsgb6WSTZ4iyZJXpjswgngqBY.jpg
US
image
12.3 Kb
whitelisted
3408
iexplore.exe
GET
200
104.27.162.204:80
http://www.superflix.net/wp-content/uploads/2017/09/the-walking-dead-579-backdrop.jpg
US
image
66.0 Kb
suspicious
3408
iexplore.exe
GET
200
104.16.60.155:80
http://image.tmdb.org/t/p/w185/yn2NczyOYekb4c8aBu1U32TauFQ.jpg
US
image
11.5 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3408
iexplore.exe
104.27.163.204:80
www.superflix.net
Cloudflare Inc
US
unknown
3408
iexplore.exe
89.19.36.44:80
rotumal.com
unknown
3420
iexplore.exe
104.27.162.204:80
www.superflix.net
Cloudflare Inc
US
shared
3408
iexplore.exe
104.27.162.204:80
www.superflix.net
Cloudflare Inc
US
shared
3408
iexplore.exe
104.18.226.52:443
cdn.onesignal.com
Cloudflare Inc
US
malicious
3408
iexplore.exe
206.54.165.211:80
rotumal.com
Webzilla B.V.
NL
unknown
3408
iexplore.exe
104.16.60.155:80
image.tmdb.org
Cloudflare Inc
US
shared
3408
iexplore.exe
104.16.60.155:443
image.tmdb.org
Cloudflare Inc
US
shared
3408
iexplore.exe
172.217.22.35:80
fonts.gstatic.com
Google Inc.
US
whitelisted
3408
iexplore.exe
216.58.206.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
superflix.net
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.superflix.net
  • 104.27.162.204
  • 104.27.163.204
suspicious
cdn.onesignal.com
  • 104.18.226.52
  • 104.18.225.52
whitelisted
rotumal.com
  • 206.54.165.211
  • 89.19.36.44
malicious
www.googletagmanager.com
  • 216.58.206.8
whitelisted
image.tmdb.org
  • 104.16.60.155
  • 104.16.58.155
  • 104.16.59.155
  • 104.16.57.155
  • 104.16.61.155
whitelisted
fonts.gstatic.com
  • 172.217.22.35
whitelisted
ocsp.pki.goog
  • 216.58.205.227
  • 216.58.208.35
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.google-analytics.com
  • 216.58.210.14
whitelisted

Threats

PID
Process
Class
Message
3408
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M2
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
3900
iexplore.exe
Misc activity
SUSPICIOUS [PTsecurity] JS obfuscation (obfuscator.io)
3900
iexplore.exe
Misc activity
SUSPICIOUS [PTsecurity] Redirection JScript Obfuscated (seen Banload)
3900
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
3900
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
No debug info