download:

Brothers_Dead_Sexy_Girlfriend_Tease_me_for_a_Long_Time.html

Full analysis: https://app.any.run/tasks/66ea790e-47d0-4fc6-8e78-3eb37811b6e2
Verdict: Malicious activity
Analysis date: July 04, 2018, 12:33:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
coinhive
opendir
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
MD5:

DB9262ADCA5EE2A4584F99F3BD3B1AF1

SHA1:

D213B4B7636B5045580F86ED8803858F9772B85B

SHA256:

856AD54053D1FBCCCF0EF71BB0D53DFBA786328E2078F9D8F23FEFC1EEE9A2E9

SSDEEP:

1536:TYWw9+OUMxR9Vxl9Sxr9wxy99xi99xZ9rxc9Qxh93x19qx69Lx09qxM93xgte9GR:TYWw9dUyv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 1360)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2480)
    • Application launched itself

      • iexplore.exe (PID: 1360)
    • Creates files in the user directory

      • iexplore.exe (PID: 2480)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2480)
    • Dropped object may contain URL's

      • iexplore.exe (PID: 2480)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

ContentType: text/html; charset=iso-8859-1
Title: Brother's Dead Sexy Girlfriend Tease me for a Long Time, Best Ass Sex Tube, Free Porn Videos, Big Black Hot Ass
Description: Free Porn Videos, Brother's Dead Sexy Girlfriend Tease me for a Long Time, She entered naked in my room and fuck my brain out that I didn't know where I am, Free Teen Asses, Ass Sex Tube, Black Nice Ass Fucking, Hot Ass Video, Best Porn Asses, Big Black ASS, Free Tube Ass, Teen Hot Ass, First time Ass at Ass1st
Rating: RTA-5042-1996-1400-1577-RTA
Keywords: big,boobs,brother,dead,fuck,girlfriend,hot,long,sexy,tease, ass, asses, big ass, hot ass, black ass, best ass, nice ass, teen ass big hot ass, ass porn, ass tube, ass sex
RevisitAfter: 1 days
Robots: all
googleSiteVerification: QdwCNonoqDDT8PakNOuIheaIIg_2pNnnBiT1eFeEP4Y
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1360"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\Brothers_Dead_Sexy_Girlfriend_Tease_me_for_a_Long_Time.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2480"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1360 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
401
Read events
313
Write events
86
Delete events
2

Modification events

(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{77A5753F-7F86-11E8-B27F-5254004AAD21}
Value:
0
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
5
(PID) Process:(1360) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070700030004000C0021002300D902
Executable files
0
Suspicious files
0
Text files
77
Unknown types
43

Dropped files

PID
Process
Filename
Type
1360iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LKO8ICX\favicon[1].ico
MD5:
SHA256:
1360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LM4BD81N\pro728[1].php
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@statcounter[1].txt
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LKO8ICX\21i7p6g[1].jpgimage
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BCPS3ZPQ\floater[1].jshtml
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OP5DQHUV\ads[1].htmhtml
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LM4BD81N\mootools.svn[1].jstext
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LKO8ICX\kd2z3uv[1].jpgimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
138
TCP/UDP connections
30
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2480
iexplore.exe
GET
66.254.100.195:80
http://ads.mofos.com/ads/mofos_inserts/index472.php?nats=NDAwMDg3OC4xLjIxLjc3LjUuNzE2MC4wLjAuMA
US
unknown
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/webmasters/mootools.svn.js
US
text
179 Kb
suspicious
2480
iexplore.exe
GET
172.217.22.110:80
http://www.google-analytics.com/urchin.js
US
whitelisted
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/styles/a1st-theme.css
US
text
3.62 Kb
suspicious
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/thumbs/9uxe4sh.jpg
US
image
4.84 Kb
suspicious
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/thumbs/21i7p6g.jpg
US
image
12.3 Kb
suspicious
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/floater.js
US
html
5.30 Kb
suspicious
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/thumbs/cr647rz.jpg
US
image
3.96 Kb
suspicious
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/thumbs/xe8pll5.jpg
US
image
13.2 Kb
suspicious
2480
iexplore.exe
GET
200
107.191.33.74:80
http://www.ass1st.com/thumbs/kd2z3uv.jpg
US
image
3.46 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2480
iexplore.exe
66.254.100.195:80
ads.mofos.com
Reflected Networks, Inc.
US
unknown
2480
iexplore.exe
107.191.33.74:80
www.ass1st.com
Choopa, LLC
US
suspicious
1360
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2480
iexplore.exe
205.185.208.78:443
hw-cdn.contentabc.com
Highwinds Network Group, Inc.
US
suspicious
2480
iexplore.exe
54.208.99.166:80
adcode.adengage.com
Amazon.com, Inc.
US
unknown
2480
iexplore.exe
192.229.221.214:443
vz-cdn.contentabc.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2480
iexplore.exe
64.210.135.24:80
cdn1.ads.brazzers.com
Swiftwill, Inc.
US
unknown
2480
iexplore.exe
2.18.235.69:443
fpdownload.macromedia.com
Akamai International B.V.
whitelisted
2480
iexplore.exe
172.217.22.110:80
www.google-analytics.com
Google Inc.
US
whitelisted
2480
iexplore.exe
94.199.253.32:80
ads2.contentabc.com
Viking Host B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
www.ass1st.com
  • 107.191.33.74
suspicious
coinhive.com
  • 104.20.208.59
  • 104.20.209.59
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ads.mofos.com
  • 66.254.100.195
unknown
www.statcounter.com
  • 104.20.2.47
  • 104.20.3.47
whitelisted
www.google-analytics.com
  • 172.217.22.110
whitelisted
ads2.contentabc.com
  • 94.199.253.32
whitelisted
c.statcounter.com
  • 104.20.2.47
  • 104.20.3.47
whitelisted
vz-cdn.contentabc.com
  • 192.229.221.214
unknown
cdn1.ads.brazzers.com
  • 64.210.135.24
  • 64.210.135.26
  • 64.210.135.28
  • 64.210.135.16
  • 64.210.135.18
  • 64.210.135.20
  • 64.210.135.22
suspicious

Threats

PID
Process
Class
Message
2480
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY Outdated Flash Version M1
No debug info