analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/8beadb66-62b7-4bce-8df7-838c57283499
Verdict: Malicious activity
Analysis date: December 06, 2019, 19:57:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
MD5:

BCA7117BF1D39BFD26AD284E55FAA2A5

SHA1:

8B435AF2C1E264F9CCD9747A1B241F19FEF26500

SHA256:

8BBD58C60F9FFA491989E07A00301F298082C89FCC92DF6BA097FF22C9CEBB42

SSDEEP:

768:z8cWUAXyJ5n+dqglN24E4bUZfbWpnbHzysTTmy/3izdiLO5+750BoMHsSgVQ3wOV:jnAXS0dqglA4SZapE+750LsSgVQ3wOIk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3460)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3460)
    • Creates files in the user directory

      • iexplore.exe (PID: 3460)
    • Changes internet zones settings

      • iexplore.exe (PID: 2368)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3460)
    • Application launched itself

      • iexplore.exe (PID: 2368)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3460)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

viewport: width=device-width
Title: The World's Best Sales Leads | Acquire Your Total Addressable Market Instantly | Seamless.AI
Generator: WordPress 5.0.7
themeColor: #f5f5f5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2368"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3460"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2368 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
379
Read events
302
Write events
76
Delete events
1

Modification events

(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{AD670839-1862-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2368) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070C00050006001300390031006202
Executable files
0
Suspicious files
0
Text files
29
Unknown types
3

Dropped files

PID
Process
Filename
Type
2368iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2368iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\css[1].txttext
MD5:CD28A302FDAC1776E1C0D1ADDF028E5F
SHA256:149E65087A52B314D24DBC2B26A671FE0D3B5B7398C4E40EBD3D6ECB78294FB5
3460iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@~~local~~[2].txttext
MD5:5E07F37D0CDAE0EA4955B12BABE0C985
SHA256:5D586D24B126BC07A30E185FFB956414E32E7C71D5B3A8FE02E51DF41DED7F5B
3460iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@~~local~~[1].txttext
MD5:1218DE614EB42A0C37782027B105E645
SHA256:911CA452AB731C6EDFC59E8FB37D83D73EF1B99AED5B0BF1AE564B1602662716
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\gtm[1].jstext
MD5:A9AE015B27F1F997F4D1679F447D2C22
SHA256:7F85496493095065D5B69B27EB14F3CE1F01E513D99435CE7EDA72D225929E11
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\fbevents[1].jstext
MD5:B80A503B40D0F0F2EFA062E39AA648D6
SHA256:71B52274B1B43661E6523B2774C9FA98A673E1861703BEA5F32D75A32A850394
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\S6uyw4BMUTPHjxAwWg[1].eoteot
MD5:4F3C1D7C13CA26BCEB5392EDFBBA5CEA
SHA256:4CCD4DF96AE40BB4C3066564D217EA37A0C1F51FE82C3DA290794EF7B21A996B
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\ieVl2ZhZI2eCN5jzbjEETS9weq8-19K7CQ[1].eoteot
MD5:4230F241836BCFEEBAD3DB578E0C944E
SHA256:17AD03A3B43E250D8F7AD7EB82F8343966D26CD2FA2F0FBDE6C19F38C1596ABE
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\jquery.bxslider.min[1].jstext
MD5:9069C36E9A5887C056CC2CE20AF7E3C7
SHA256:6C0A53A059AE26965D9EC991B34CD620471A1E863125A67FFAE50050AEAD65DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
412
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2368
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3460
iexplore.exe
216.58.206.10:443
ajax.googleapis.com
Google Inc.
US
whitelisted
3460
iexplore.exe
104.20.220.120:443
static.edgeme.sh
Cloudflare Inc
US
shared
3460
iexplore.exe
192.186.196.68:443
www.seamless.ai
GoDaddy.com, LLC
US
unknown
3460
iexplore.exe
172.217.23.138:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3460
iexplore.exe
104.17.64.4:443
cdnjs.cloudflare.com
Cloudflare Inc
US
unknown
2368
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3460
iexplore.exe
209.197.3.15:443
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
3460
iexplore.exe
172.217.22.99:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3460
iexplore.exe
104.20.219.120:443
static.edgeme.sh
Cloudflare Inc
US
shared
3460
iexplore.exe
130.211.5.208:443
cdn4.mxpnl.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
fonts.googleapis.com
  • 172.217.23.138
whitelisted
maxcdn.bootstrapcdn.com
  • 209.197.3.15
whitelisted
www.seamless.ai
  • 192.186.196.68
shared
cdnjs.cloudflare.com
  • 104.17.64.4
  • 104.17.65.4
whitelisted
ajax.googleapis.com
  • 216.58.206.10
whitelisted
static.edgeme.sh
  • 104.20.220.120
  • 104.20.219.120
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
fonts.gstatic.com
  • 172.217.22.99
whitelisted
cdn4.mxpnl.com
  • 130.211.5.208
  • 35.186.235.23
whitelisted
www.googletagmanager.com
  • 216.58.208.40
whitelisted

Threats

No threats detected
No debug info