analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://grc-events.com/t/gtl/5ff11c86-3d72-47c2-88df-b685a3a83676/MzQwMjEwLDU1OTE4NDI3Mywy/

Full analysis: https://app.any.run/tasks/ad22337c-3530-402d-9ce9-5574f57dcd83
Verdict: Malicious activity
Analysis date: June 27, 2022, 11:13:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

284BC075886804897466E0E84759B4B1

SHA1:

8D1E0F394FD22499CEA3B2327412543944DAF365

SHA256:

7F6631669C2D6F42A7F7C82AB2DB770110019113B78662AB8A3D6F692E3F59BD

SSDEEP:

3:N1KZXdWyTKRKGfNGdTVksSF6STPLP4dUr6vcS7n:CfW2GfNGRNSF3TPLPzr6ES7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3392)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 804)
      • iexplore.exe (PID: 3392)
    • Changes internet zones settings

      • iexplore.exe (PID: 804)
    • Reads the computer name

      • iexplore.exe (PID: 804)
      • iexplore.exe (PID: 3392)
    • Application launched itself

      • iexplore.exe (PID: 804)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 804)
      • iexplore.exe (PID: 3392)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3392)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 804)
      • iexplore.exe (PID: 3392)
    • Creates files in the user directory

      • iexplore.exe (PID: 3392)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
804"C:\Program Files\Internet Explorer\iexplore.exe" "http://grc-events.com/t/gtl/5ff11c86-3d72-47c2-88df-b685a3a83676/MzQwMjEwLDU1OTE4NDI3Mywy/"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3392"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:804 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
Total events
14 423
Read events
14 257
Write events
166
Delete events
0

Modification events

(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30968342
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
210620722
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30968343
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(804) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
23
Text files
42
Unknown types
21

Dropped files

PID
Process
Filename
Type
804iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:1D008794DC5D214AB74954658B8C7F51
SHA256:76ED2D87EACD07E7B1695B0918F617C8B92399250DE1DD60059EA7A50009D432
3392iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\L9WPB0BB.txttext
MD5:9E3AC63BC2BE7B3B2C436793E07ACD1E
SHA256:64F9AEB1313566EFF09FFA006BB7F2A314E1996AAA5197BBBB23E84AEAB276DA
3392iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_2A7FECD55F0549F6F418C45A70E1E703der
MD5:597B6860A8494E0E4F880CF16585565A
SHA256:028F7ECCD678BA52BA42A31E049BFF9F3A64C00271BB24CAEA45372DB1793739
804iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
804iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:28CC3D4B0DA8A29A9DCD6D4755C84342
SHA256:A4CA2DD1D4545838F7A9102623442BC76BDEB2185E9991A294BCB0B6456DDA0E
3392iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04der
MD5:5AA235614E07491B546686882C44846B
SHA256:8DE48B0F91139A9E0863256D72E7D5F19D99ADAAF206E7E04F7887377F6C797B
3392iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\socialrisk_76004[1].pngimage
MD5:488B61572AD447906FC067D00E29DD86
SHA256:7513123F1303D8ADD828DB0D174852245254EA7069772CD848DBCB93D2FA4E46
3392iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:6337B441F5E3AFBA0F9860B4DFBD3F23
SHA256:39B39C2D3FAD28CDF68B71A4305BE2B4097BCB4F6E6C6CB3CF0D943D08BDC831
804iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:877C620A64CE04100990E121587643FC
SHA256:F3A78DA159C8B8281837C9962F8ECD8CDA869EAF1E602843E5AAABCC55A654AA
3392iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:12F94602D21BCF619436D0B32FF64684
SHA256:47C3D766204EDEEA7CF40FFAE1CC2ACF850E007EFD20B68B0B12DDA890D875AD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
65
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
804
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3392
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
3392
iexplore.exe
GET
302
185.245.124.13:80
http://grc-events.com/t/gtl/5ff11c86-3d72-47c2-88df-b685a3a83676/MzQwMjEwLDU1OTE4NDI3Mywy/
unknown
html
162 b
suspicious
3392
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEESz3%2FmlG2yGCtBzjzp1dVc%3D
US
der
471 b
whitelisted
3392
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAne9nsKyr6pG1%2BzwnqUzyw%3D
US
der
471 b
whitelisted
3392
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
804
iexplore.exe
GET
200
8.252.42.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33b11c7597997c36
US
compressed
4.70 Kb
whitelisted
3392
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCqm%2FLZVwk%2FcRLv5CtSZANu
US
der
472 b
whitelisted
3392
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIAjrICMzZli2TN25s%3D
US
der
724 b
whitelisted
3392
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEG8ah82mu6j%2FCizjSGtvLoA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
804
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
804
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3392
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3392
iexplore.exe
34.252.9.76:443
www.grcworldforums.com
Amazon.com, Inc.
IE
unknown
3392
iexplore.exe
185.245.124.13:80
grc-events.com
suspicious
804
iexplore.exe
8.252.42.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
804
iexplore.exe
34.252.9.76:443
www.grcworldforums.com
Amazon.com, Inc.
IE
unknown
3392
iexplore.exe
142.250.186.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3392
iexplore.exe
104.17.24.14:443
cdnjs.cloudflare.com
Cloudflare Inc
US
suspicious
3392
iexplore.exe
142.250.74.194:443
securepubads.g.doubleclick.net
Google Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
grc-events.com
  • 185.245.124.13
suspicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 8.252.42.254
  • 8.252.191.254
  • 8.249.23.254
  • 8.252.73.126
  • 8.252.42.126
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.grcworldforums.com
  • 34.252.9.76
suspicious
cdnjs.cloudflare.com
  • 104.17.24.14
  • 104.17.25.14
whitelisted
fonts.googleapis.com
  • 142.250.186.106
whitelisted
securepubads.g.doubleclick.net
  • 142.250.74.194
whitelisted
ocsp.pki.goog
  • 172.217.18.3
whitelisted

Threats

No threats detected
No debug info