analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://ekucn.xyz/c/ci?id=EF27DD94-5A64-51BD-AC47-4AD73AE681E5&pv=3.0.0&mvr=11.7.0&sv=16.1.16614.2.9.1.13&q=0&mvsi=0&ct=nc&ch=5515A81D-A57B-4549-BA45-3645C3475D65

Full analysis: https://app.any.run/tasks/71c50e8b-31ea-4d14-9444-a858552d5fd0
Verdict: Malicious activity
Analysis date: December 05, 2022, 20:15:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

79A4764179F9634DA0EDB2E50877395B

SHA1:

551915D6FC1184831F060BA17C328D5FBC249904

SHA256:

88068ED06D90BCD54DE76458105666848C4FD2A88A6B3AE86C1CC9A0C778C2CE

SSDEEP:

3:N1Kb/cpcldovjXSKfkTfeUi7SUxbKLShDWT5HSUAjoSlVK0aml9BwhzR59ItDq:Crcyaafe28uEKNgjtzFQh95wW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 1540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1540"C:\Program Files\Internet Explorer\iexplore.exe" "http://ekucn.xyz/c/ci?id=EF27DD94-5A64-51BD-AC47-4AD73AE681E5&pv=3.0.0&mvr=11.7.0&sv=16.1.16614.2.9.1.13&q=0&mvsi=0&ct=nc&ch=5515A81D-A57B-4549-BA45-3645C3475D65"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
1944"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1540 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
14 296
Read events
14 187
Write events
109
Delete events
0

Modification events

(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31000806
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31000806
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1540) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
14
Text files
18
Unknown types
11

Dropped files

PID
Process
Filename
Type
1540iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:503AD061073A29CEE4CB12D552F6A5B3
SHA256:D2A97423F8B71CA1DAAC39F8A037DCA022303C1ADFBD49995EFF3B36AFFF33F9
1944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\maincaf[1].jstext
MD5:3C7567521347BF95B105FFA7FDC7DA86
SHA256:0E32BCA6B67DFDEED3F9B988DDCEC1ADF0502549A130A78C4ACE64C318A7EA29
1540iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:A67BA7FBAAF715DB1069DCE02C490AEC
SHA256:28B8226633117D956B2D7885F552831EAE924F0A3CB2D853AA23B24131313C70
1944iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:EAA4DCE3EAE1609F49EBAE7323D80FEF
SHA256:DF398498CCD10951E5B64A54A0D10547E36A78D1CBCA6369EE8AABC83363AD83
1944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\ci[1].htmhtml
MD5:1D44A76BB750ACA29BCDBEDD47569773
SHA256:61694A452F2CD266E7C46F0B5E0356D8C6262E9B722826C54C880B785265492E
1540iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:CC41F922ED6BE1877523236673E69145
SHA256:0C59E7A23E816AC8DC0C703DFDAF0AC9118929887E77B6C081307D97DC809537
1944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\caf[1].jstext
MD5:DB939A550DC25B51BE452F1D53E68379
SHA256:DB21A922C25EA3759EB0B0D32A66ED9F9593467888D3BFEFE1665C5B63C66FBE
1540iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:D1CD391FC3F4CBF54ED081CFDFAAF95C
SHA256:89B26E2DB2F6A035F154254DBEB116F2C4CF408DD281D1EB6B34C25E75E8E3E6
1944iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\XS4E6PEE.txttext
MD5:7AC60CC1533943678AC3C62D21CD8C46
SHA256:F5D83105C737E8332E93449D5DB8C404C7C49D042EE0FB1771D8F1825E75187F
1944iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_B49B51C2F61192D2C0D20E671D9EF51Eder
MD5:181B661534DC3F6BBE887293452F685B
SHA256:4D7472E9A604E69E65040A318534883D14275D6EF7E19C6EB42A8A25099D8EEB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
56
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1540
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
1944
iexplore.exe
GET
200
18.66.121.135:80
http://d38psrni17bvxu.cloudfront.net/scripts/maincaf.js
US
text
6.84 Kb
suspicious
1944
iexplore.exe
GET
200
99.83.154.118:80
http://ekucn.xyz/c/ci?id=EF27DD94-5A64-51BD-AC47-4AD73AE681E5&pv=3.0.0&mvr=11.7.0&sv=16.1.16614.2.9.1.13&q=0&mvsi=0&ct=nc&ch=5515A81D-A57B-4549-BA45-3645C3475D65
US
html
5.60 Kb
malicious
1540
iexplore.exe
GET
99.83.154.118:80
http://ekucn.xyz/favicon.ico
US
malicious
1944
iexplore.exe
GET
200
216.58.212.132:80
http://www.google.com/adsense/domains/caf.js
US
text
52.2 Kb
whitelisted
1944
iexplore.exe
GET
200
13.32.23.104:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
1944
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDbyHvBeZtpOQpKuNstwnpv
US
der
472 b
whitelisted
1944
iexplore.exe
GET
200
172.217.18.99:80
http://crl.pki.goog/gtsr1/gtsr1.crl
US
der
760 b
whitelisted
1540
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1944
iexplore.exe
GET
200
13.32.23.204:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1944
iexplore.exe
99.83.154.118:80
AMAZON-02
US
malicious
1944
iexplore.exe
18.66.121.59:443
d1lxhc4jvstzrp.cloudfront.net
AMAZON-02
US
suspicious
1540
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1944
iexplore.exe
216.58.212.132:80
www.google.com
GOOGLE
US
whitelisted
1944
iexplore.exe
23.216.77.80:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
suspicious
1944
iexplore.exe
18.66.121.69:80
d38psrni17bvxu.cloudfront.net
AMAZON-02
US
suspicious
1944
iexplore.exe
172.217.18.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1944
iexplore.exe
216.58.212.132:443
www.google.com
GOOGLE
US
whitelisted
1540
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
1944
iexplore.exe
142.250.185.226:443
partner.googleadservices.com
GOOGLE
US
suspicious

DNS requests

Domain
IP
Reputation
www.google.com
  • 216.58.212.132
whitelisted
d1lxhc4jvstzrp.cloudfront.net
  • 18.66.121.59
  • 18.66.121.123
  • 18.66.121.122
  • 18.66.121.80
shared
d38psrni17bvxu.cloudfront.net
  • 18.66.121.69
  • 18.66.121.135
  • 18.66.121.138
  • 18.66.121.190
suspicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.80
  • 23.216.77.69
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
o.ss2.us
  • 13.32.23.16
  • 13.32.23.104
  • 13.32.23.96
  • 13.32.23.215
whitelisted
partner.googleadservices.com
  • 142.250.185.226
whitelisted
ocsp.pki.goog
  • 172.217.18.99
whitelisted

Threats

PID
Process
Class
Message
1944
iexplore.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1944
iexplore.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1944
iexplore.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1944
iexplore.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info