analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://exchangeblog.pl

Full analysis: https://app.any.run/tasks/7f81d25b-8c66-4971-9fbb-a442572b5d6a
Verdict: Malicious activity
Analysis date: March 22, 2019, 01:27:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

5ABC96B8AA2618F3743639DABB0E4BE0

SHA1:

F8C1580BA7D71E5A3A80E7E941EE093741DD63A9

SHA256:

7CC50D46F079B6E93A93A931C87972A330E0C15B704980552EC7FD034846CC05

SSDEEP:

3:N1KbEWLCAdJn:C9C2Jn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 2608)
    • Changes internet zones settings

      • iexplore.exe (PID: 2368)
    • Creates files in the user directory

      • iexplore.exe (PID: 2368)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3532)
      • iexplore.exe (PID: 2608)
    • Application launched itself

      • iexplore.exe (PID: 2368)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2608)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2368"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2608"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2368 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3532C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Total events
434
Read events
370
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
43
Unknown types
7

Dropped files

PID
Process
Filename
Type
2368iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2368iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@exchangeblog[1].txt
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\WAY6VXBL\en[1].txt
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:96AD4ECA901179B1EF7AB6D967E33CEF
SHA256:E45282E08612E80806440530EDD3F0AEDE9FABEFD47A0E37E08E1F8D1B85C51A
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:49155161321329EDB29367186991D27B
SHA256:84B5E23775A920ABC6BE9D36A311F0F49BD77787845E6D61C6FD944A66468D96
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\K7OU9K05\cookiewarning[1].csstext
MD5:84936322B4120EFE480D710EBDF79AF3
SHA256:0E84453222B24133CAFBB7A93F7D44C89083B079139759A7715970FA241A645E
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:A0742250661824EC0889B61E506DFA93
SHA256:E9B04409C491852BC04E212100EB763AD6551753B8A0934421A00D422F5B4EFF
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\WAY6VXBL\en[1].htmhtml
MD5:4E6C9DF8180D70407B2794779A36C5ED
SHA256:0200C4AE467460C89C118BD8402EB4654044AB1AACA478F143F165F8E2F648E4
2608iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@exchangeblog[2].txttext
MD5:BA893EEEE022C668A82B6FBE3FC770D8
SHA256:7DD2DFA0F5EACA10AF5069A70F945219D981A9232983DCF76F657CBCB303C11B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
13
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/themes/mantra/style.css?ver=4.0.26
DE
text
11.8 Kb
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/plugins/cookie-warning/cookiewarning.css?ver=4.0.26
DE
text
461 b
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/en/
DE
html
14.8 Kb
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/plugins/cookie-warning/cookiewarning.js?ver=4.0.26
DE
html
1.72 Kb
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/uploads/2012/08/rss1_mini.png
DE
image
2.30 Kb
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/uploads/2015/03/image_thumb_543BB8CB.png
DE
image
43.3 Kb
suspicious
2608
iexplore.exe
GET
300
144.76.222.40:80
http://exchangeblog.pl/
DE
binary
20 b
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/plugins/yet-another-related-posts-plugin/style/widget.css?ver=4.0.26
DE
text
384 b
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/plugins/sitepress-multilingual-cms/res/css/language-selector.css?v=2.6.0
DE
text
1.42 Kb
suspicious
2608
iexplore.exe
GET
200
144.76.222.40:80
http://exchangeblog.pl/wp-content/plugins/wp-table-reloaded/css/plugin.css?ver=1.9.4
DE
text
414 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2608
iexplore.exe
172.217.22.110:80
www.google-analytics.com
Google Inc.
US
whitelisted
2608
iexplore.exe
144.76.222.40:80
exchangeblog.pl
Hetzner Online GmbH
DE
suspicious
2608
iexplore.exe
172.217.22.46:80
feeds.feedburner.com
Google Inc.
US
whitelisted
2608
iexplore.exe
172.217.18.8:443
ssl.google-analytics.com
Google Inc.
US
whitelisted
2368
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2608
iexplore.exe
185.172.148.128:80
cdn.printfriendly.com
proinity GmbH
DE
malicious
2368
iexplore.exe
144.76.222.40:80
exchangeblog.pl
Hetzner Online GmbH
DE
suspicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
exchangeblog.pl
  • 144.76.222.40
suspicious
www.google-analytics.com
  • 172.217.22.110
whitelisted
cdn.printfriendly.com
  • 185.172.148.128
whitelisted
feeds.feedburner.com
  • 172.217.22.46
whitelisted
ssl.google-analytics.com
  • 172.217.18.8
whitelisted

Threats

No threats detected
No debug info