analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://ipodtotal.com/files/En/Invoice-Number-00726

Full analysis: https://app.any.run/tasks/aaa32405-377b-4965-9b55-2bfd249ba757
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: December 06, 2018, 07:38:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MD5:

43E082761F87E90A1FC247D2B2765218

SHA1:

626E9241BA60979F7B318237045E842B2B1B4461

SHA256:

8EDC155BC47BDEE9D6986CAE251F6D2E8D6BF7DB4F10F2C861979E3FE7D14675

SSDEEP:

3:N1KXERv0KsGMGAYO:C0R2GAf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3776)
      • iexplore.exe (PID: 3084)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3084)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3084)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3084)
    • Application launched itself

      • iexplore.exe (PID: 2808)
    • Changes internet zones settings

      • iexplore.exe (PID: 2808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2808"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3084"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2808 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3776C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Total events
579
Read events
483
Write events
93
Delete events
3

Modification events

(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000069000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{033EB8EB-F92A-11E8-BAD8-5254004A04AF}
Value:
0
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2808) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070C00040006000700270008008003
Executable files
0
Suspicious files
0
Text files
89
Unknown types
11

Dropped files

PID
Process
Filename
Type
2808iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2808iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\css_dbTskHdlej9rkx0AkIkYRfLBl5H-G_xnxzxllnssfcA[1].csstext
MD5:CE56F4FF08E7456DB4586467D9C3A688
SHA256:B3BF6483F700A1C04ABF3368B1F3F00E09954820D613008B41E8B56CD6019FC8
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\js_zcbw9Lj5nCxcbZerXcqHAkc2h209RDiD9bIJELyKI80[1].jstext
MD5:FCCAC8BBDEE754BBA345BC4BA7A7B60F
SHA256:DD34FA2308051BB367D63DA0FCD5A5D163FCDE8AAFBB5C976DF2BC57D8D93C82
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\js_xvYJgU6LChHqbcSh4y1AvdXfD5QBIwT3GVGVUeuksbM[1].jstext
MD5:6E1AE098E5F4C8AE87451E3DDFEBCBCB
SHA256:51040452BD369EA828D48AE612C06503C87DAC333B793ADC446B73FBC165B16E
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\ipodtotal-logo-55_0[1].pngimage
MD5:ED43E7AF36EE730BA7F2EDEC27CFFF22
SHA256:343AF5E9AAD3E8A0E71743C35C7043C2401438522574CFACEADC9DFCFA9341C6
3084iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@ipodtotal[2].txt
MD5:
SHA256:
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\js_BLxotNs2yt7YGlf9QRI9L9AMfdnkQfnN-_ADBTW3SiE[1].jstext
MD5:50DE54838F294ECECA99D2C6FD3D8BB5
SHA256:E6463064FF8EA94CB19BC40EA72BE2B861FBA6223146B8E7B266E0B9B818651B
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\js_8jesztKLu9rCDCmAh4TUgGDO0PLl9BKmil9c2nLMnOc[1].jstext
MD5:0D37684B737A9C33201337F5BEBF5BA0
SHA256:DA06B71C004DDA6CD4F62A0EDE72350BDBCBE73492CA5B1A11535EB19B15F96C
3084iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\css_sKoDsxG_ifqSFqXcCJy7e_0OSQvUlwKY_plqx4PGKxY[1].csstext
MD5:819CEC6D4A10A75D5CFA1D3EE7678A3E
SHA256:4846DED3A6F0BB6C13DA7319D96559C4C0FE19F9E277B1B8ED8BED4F28AD8274
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
63
TCP/UDP connections
47
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/css/css_sKoDsxG_ifqSFqXcCJy7e_0OSQvUlwKY_plqx4PGKxY.css
US
text
28.4 Kb
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/css/css_dbTskHdlej9rkx0AkIkYRfLBl5H-G_xnxzxllnssfcA.css
US
text
362 b
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/js/js_xvYJgU6LChHqbcSh4y1AvdXfD5QBIwT3GVGVUeuksbM.js
US
text
34.2 Kb
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/js/js_NCo1smRcPitE2DKaTjlo-I3Gr4YvQ-3SDOJCWe6Og6c.js
US
text
10.5 Kb
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/js/js_8jesztKLu9rCDCmAh4TUgGDO0PLl9BKmil9c2nLMnOc.js
US
text
1.68 Kb
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/css/css_hvCRUOksby3CrDkL77WqPffOsSttyeQgc8E0-OL3WCs.css
US
text
1.35 Kb
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/ipodtotal-logo-55_0.png
US
image
4.40 Kb
malicious
2808
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/js/js_BLxotNs2yt7YGlf9QRI9L9AMfdnkQfnN-_ADBTW3SiE.js
US
text
6.80 Kb
malicious
3084
iexplore.exe
GET
200
207.246.86.251:80
http://ipodtotal.com/archivos/css/css_lQaZfjVpwP_oGNqdtWCSpJT1EMqXdMiU84ekLLxQnc4.css
US
text
1.12 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3084
iexplore.exe
209.197.3.15:80
maxcdn.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
2808
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3084
iexplore.exe
108.177.126.154:443
stats.g.doubleclick.net
Google Inc.
US
whitelisted
3084
iexplore.exe
172.217.168.14:80
www.google-analytics.com
Google Inc.
US
whitelisted
3084
iexplore.exe
23.111.8.154:443
oss.maxcdn.com
netDNA
US
unknown
3084
iexplore.exe
108.177.127.82:80
html5shiv.googlecode.com
Google Inc.
US
whitelisted
3084
iexplore.exe
207.246.86.251:80
ipodtotal.com
US
suspicious
3084
iexplore.exe
216.58.215.226:80
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
3084
iexplore.exe
172.217.168.2:443
adservice.google.it
Google Inc.
US
whitelisted
3084
iexplore.exe
216.58.215.226:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ipodtotal.com
  • 207.246.86.251
malicious
maxcdn.bootstrapcdn.com
  • 209.197.3.15
whitelisted
html5shiv.googlecode.com
  • 108.177.127.82
whitelisted
oss.maxcdn.com
  • 23.111.8.154
whitelisted
www.google-analytics.com
  • 172.217.168.14
whitelisted
stats.g.doubleclick.net
  • 108.177.126.154
  • 108.177.126.155
  • 108.177.126.157
  • 108.177.126.156
whitelisted
www.ipodtotal.com
  • 207.246.86.251
malicious
pagead2.googlesyndication.com
  • 216.58.215.226
whitelisted
adservice.google.it
  • 172.217.168.2
whitelisted

Threats

PID
Process
Class
Message
3084
iexplore.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious request with 'invoice' in http uri
3084
iexplore.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious request with 'invoice' in http uri
3084
iexplore.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious request with 'invoice' in http uri
No debug info