URL:

http://www.mcvo-motoclub.org/user1/alibaba/alibaba.com/alibaba.com/alibaba.com/

Full analysis: https://app.any.run/tasks/dc6e1308-11f7-4610-b3e2-e04e3e0cd473
Verdict: Malicious activity
Analysis date: December 27, 2019, 20:15:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
phishing
Indicators:
MD5:

4AAEEBAF1310397BBFA822B8347C4FCA

SHA1:

F529051AD821E2C24AD82D4F297278142D66795F

SHA256:

8712D87C72431190F8AF05FC3BB706C497CB2C1805D12A4972A7E95E0949A43E

SSDEEP:

3:N1KJS4XtdJQrK5mTEOK1LKmLKmLKK:Cc4CrK5mIOmL7L7LR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1748)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2480)
    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1748)
      • iexplore.exe (PID: 2968)
    • Application launched itself

      • iexplore.exe (PID: 2480)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2968)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2968)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1748C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2480"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2968"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
489
Read events
394
Write events
93
Delete events
2

Modification events

(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{A759898D-28E5-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2480) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070C0005001B0014000F002A008300
Executable files
0
Suspicious files
2
Text files
58
Unknown types
13

Dropped files

PID
Process
Filename
Type
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XU28G70E\login[1].php
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XU28G70E\alibaba_com[1].txt
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019122720191228\index.datdat
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019122720191228\index.datdat
MD5:
SHA256:
2968iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XU28G70E\alibaba_com[1].htmhtml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
45
TCP/UDP connections
63
DNS requests
16
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2968
iexplore.exe
GET
302
109.234.165.131:80
http://www.mcvo-motoclub.org/user1/alibaba/alibaba.com/alibaba.com/alibaba.com/
FR
malicious
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/@g/sc/header-footer/0.0.31/sc-header-footer/header/entrances/global-header-new/async.css
unknown
whitelisted
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/@g/sc/header-footer/0.0.31/sc-header-footer/header/entrances/global-header-new/header.js
unknown
whitelisted
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/@g/sc/header-footer/0.0.26/sc-header-footer/$node_modules/@alife/alpha-icon/src/iconfont.woff
unknown
whitelisted
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/@g/sc/header-footer/0.0.31/sc-header-footer/$node_modules/@alife/alpha-icon/src/iconfont.woff
unknown
whitelisted
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/@g/sc/aisn/0.0.30/??sc-aisn/home2019/home-defer.css
unknown
whitelisted
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/@g/sc/aisn/0.0.30/sc-aisn/$node_modules/@alife/alpha-icon/src/iconfont.woff
unknown
whitelisted
2968
iexplore.exe
GET
301
2.19.44.22:80
http://s.alicdn.com/sc-aisn/home2019/category-info/styles/layout.scss
unknown
whitelisted
2968
iexplore.exe
GET
200
23.38.51.129:80
http://i.alicdn.com/sc-affiliate/sem-remarketing/??sem-remarketing.98174a0b.js
NL
text
1.88 Kb
whitelisted
2968
iexplore.exe
GET
200
23.38.51.129:80
http://aeis.alicdn.com/AWSC/WebUMID/1.78.0/um.js?d=27
NL
binary
135 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2480
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2480
iexplore.exe
109.234.165.131:80
www.mcvo-motoclub.org
o2switch SARL
FR
malicious
2968
iexplore.exe
23.38.51.129:80
i.alicdn.com
Akamai International B.V.
NL
whitelisted
2968
iexplore.exe
23.38.51.129:443
i.alicdn.com
Akamai International B.V.
NL
whitelisted
2968
iexplore.exe
47.246.43.252:443
retcode.alicdn.com
US
suspicious
2968
iexplore.exe
2.19.44.22:443
www.alibaba.com
Akamai International B.V.
whitelisted
2968
iexplore.exe
2.19.44.22:80
www.alibaba.com
Akamai International B.V.
whitelisted
2.19.44.22:443
www.alibaba.com
Akamai International B.V.
whitelisted
2968
iexplore.exe
198.11.132.198:443
buyercentral.alibaba.com
Alibaba (China) Technology Co., Ltd.
US
unknown
2968
iexplore.exe
198.11.146.6:443
us.ynuf.aliapp.org
Alibaba (China) Technology Co., Ltd.
US
unknown

DNS requests

Domain
IP
Reputation
www.mcvo-motoclub.org
  • 109.234.165.131
malicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.alibaba.com
  • 2.19.44.22
whitelisted
i.alicdn.com
  • 23.38.51.129
whitelisted
assets.alicdn.com
  • 23.38.51.129
whitelisted
aeis.alicdn.com
  • 23.38.51.129
whitelisted
retcode.alicdn.com
  • 47.246.43.252
  • 47.246.43.251
suspicious
us.ynuf.aliapp.org
  • 198.11.146.6
whitelisted
s.alicdn.com
  • 2.19.44.22
whitelisted
buyercentral.alibaba.com
  • 198.11.132.198
malicious

Threats

PID
Process
Class
Message
2968
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Google Drive Phishing Landing
2968
iexplore.exe
A Network Trojan was detected
ET CURRENT_EVENTS Possible Successful Generic Phish Jan 14 2016
2 ETPRO signatures available at the full report
No debug info