analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Dont do it.bat

Full analysis: https://app.any.run/tasks/f7912b20-88b5-4c6f-b711-3139ece692b7
Verdict: Malicious activity
Analysis date: September 30, 2020, 01:02:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text, with CRLF line terminators
MD5:

81C4BF69ABF545DCBC5C4BF32126AAF1

SHA1:

DE7E0455A2546D3D45D1684A10C605F8C299F856

SHA256:

9222FB5EDFFE66306208F03F1BC5A0581145C6E55D01C3C08930FCACC62E9FAA

SSDEEP:

24:v2qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqW:vu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • cmd.exe (PID: 2312)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2884)
      • iexplore.exe (PID: 3532)
      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1436)
      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 976)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 2844)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 3508)
      • iexplore.exe (PID: 560)
      • iexplore.exe (PID: 3036)
      • iexplore.exe (PID: 2796)
      • iexplore.exe (PID: 3104)
      • iexplore.exe (PID: 2900)
      • iexplore.exe (PID: 2792)
      • iexplore.exe (PID: 700)
      • iexplore.exe (PID: 2572)
      • iexplore.exe (PID: 2492)
      • iexplore.exe (PID: 2560)
      • iexplore.exe (PID: 2728)
      • iexplore.exe (PID: 2096)
      • iexplore.exe (PID: 2520)
      • iexplore.exe (PID: 2596)
      • iexplore.exe (PID: 3108)
      • iexplore.exe (PID: 3020)
      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 2712)
      • iexplore.exe (PID: 3488)
      • iexplore.exe (PID: 3248)
      • iexplore.exe (PID: 5072)
      • iexplore.exe (PID: 4604)
      • iexplore.exe (PID: 5320)
      • iexplore.exe (PID: 4620)
      • iexplore.exe (PID: 5936)
      • iexplore.exe (PID: 5720)
      • iexplore.exe (PID: 6000)
      • iexplore.exe (PID: 4744)
      • iexplore.exe (PID: 4668)
    • Changes internet zones settings

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 2884)
      • iexplore.exe (PID: 3532)
      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 2844)
      • iexplore.exe (PID: 976)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 560)
    • Application launched itself

      • iexplore.exe (PID: 2884)
      • iexplore.exe (PID: 3532)
      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 976)
      • iexplore.exe (PID: 2844)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 560)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1436)
      • iexplore.exe (PID: 3508)
      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 3532)
      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 2492)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 2844)
      • iexplore.exe (PID: 976)
    • Creates files in the user directory

      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2900)
      • iexplore.exe (PID: 3508)
      • iexplore.exe (PID: 3036)
      • iexplore.exe (PID: 2792)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1920)
      • iexplore.exe (PID: 2900)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 3508)
      • iexplore.exe (PID: 3036)
      • iexplore.exe (PID: 2792)
      • iexplore.exe (PID: 2492)
      • iexplore.exe (PID: 2728)
      • iexplore.exe (PID: 5072)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 2792)
      • iexplore.exe (PID: 3508)
      • iexplore.exe (PID: 2900)
      • iexplore.exe (PID: 2492)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3532)
      • iexplore.exe (PID: 2844)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 976)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3532)
      • iexplore.exe (PID: 2220)
      • iexplore.exe (PID: 2844)
      • iexplore.exe (PID: 2000)
      • iexplore.exe (PID: 976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
42
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2312cmd /c ""C:\Users\admin\AppData\Local\Temp\Dont do it.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2408"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2884"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3532"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2220"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2844"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
976"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2000"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
560"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1436"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2408 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\rpcrt4.dll
Total events
6 231
Read events
4 106
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
53
Text files
202
Unknown types
30

Dropped files

PID
Process
Filename
Type
3532iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].ico
MD5:
SHA256:
3532iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[2].ico
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\favicon[1].ico
MD5:
SHA256:
2884iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1920iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE1F6.tmp
MD5:
SHA256:
3508iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE224.tmp
MD5:
SHA256:
1436iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE233.tmp
MD5:
SHA256:
1436iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:2E906248F0B9390373A7EBF0690DF247
SHA256:1214240DF9655639A5AD02C19284B3D244F7AA397E0A1E85B5B9D623B658C0BB
3508iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:2E906248F0B9390373A7EBF0690DF247
SHA256:1214240DF9655639A5AD02C19284B3D244F7AA397E0A1E85B5B9D623B658C0BB
1920iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:CC2E4D6CF7E74F9D7F4A5CC5E2DF114A
SHA256:AADCCEFE775036D629E117E949E102CDB52022173C39FB5FA8BFE04776D9FDFE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
38
TCP/UDP connections
127
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3532
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2408
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1436
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
1516
iexplore.exe
GET
304
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
whitelisted
1436
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAx6iHYQ0JilgBc9YW1vcMQ%3D
US
der
471 b
whitelisted
1920
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAx6iHYQ0JilgBc9YW1vcMQ%3D
US
der
471 b
whitelisted
3508
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3508
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAx6iHYQ0JilgBc9YW1vcMQ%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1436
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
1920
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
3508
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
3104
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
1516
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
2796
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
2900
iexplore.exe
66.254.114.41:443
www.pornhub.com
Reflected Networks, Inc.
US
malicious
3508
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1516
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1436
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
www.pornhub.com
  • 66.254.114.41
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
ci.phncdn.com
  • 152.195.34.118
whitelisted
static.trafficjunky.com
  • 205.185.208.79
whitelisted
di.phncdn.com
  • 205.185.208.142
whitelisted
www.google.com
  • 172.217.22.100
whitelisted
ocsp.pki.goog
  • 172.217.18.3
whitelisted
hubt.pornhub.com
  • 66.254.114.32
whitelisted

Threats

No threats detected
No debug info