URL:

https://www.iptvsmarters.com/download/?download=windows_app

Full analysis: https://app.any.run/tasks/624c30d4-209c-416c-8b9e-abd1d936cd97
Verdict: Malicious activity
Analysis date: June 25, 2024, 21:29:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

60D12BFEC5EECE1EC2C8B3446938A9A7

SHA1:

E1E16B2A767834D06C1362FADFC45E457F9C4239

SHA256:

92C706A1CD68A308078A33EE2BE30D0F967E94BADACA47FC41FB2CBFDC307DC9

SSDEEP:

3:N8DSLuHMGGBKLa0FSP:2OLSNubP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Drops 7-zip archiver for unpacking

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Executable content was dropped or overwritten

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • The process creates files with name similar to system file names

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Process drops legitimate windows executable

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Node.exe was dropped

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Creates a software uninstall entry

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Application launched itself

      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the Internet Settings

      • IPTVSmartersPro.exe (PID: 2196)
    • Reads settings of System Certificates

      • IPTVSmartersPro.exe (PID: 2196)
  • INFO

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3432)
    • Application launched itself

      • iexplore.exe (PID: 3344)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3432)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3344)
    • Checks supported languages

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
      • IPTVSmartersPro.exe (PID: 2276)
    • Reads the computer name

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
      • IPTVSmartersPro.exe (PID: 2276)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3344)
      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Creates files or folders in the user directory

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
    • Create files in a temporary directory

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the machine GUID from the registry

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
    • Manual execution by a user

      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the software policy settings

      • IPTVSmartersPro.exe (PID: 2196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iptvsmarterspro-setup-1.1.1.exe iptvsmarterspro.exe iptvsmarterspro.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1808"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\IPTVSmartersPro-Setup-1.1.1.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\IPTVSmartersPro-Setup-1.1.1.exe
iexplore.exe
User:
admin
Company:
WHMCS Smarters
Integrity Level:
MEDIUM
Description:
IPTV Smarters Pro is a Live IPTV player for end-users that provides the facility to watch Live TV, VOD, Series.
Exit code:
0
Version:
1.1.1
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\iptvsmarterspro-setup-1.1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2196"C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exe" C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exe
explorer.exe
User:
admin
Company:
WHMCS Smarters
Integrity Level:
MEDIUM
Description:
IPTVSmartersPro
Version:
1.1.1
Modules
Images
c:\users\admin\appdata\local\programs\iptvsmarterspro\iptvsmarterspro.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\iptvsmarterspro\node.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\psapi.dll
2276"C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exe" --type=renderer --no-sandbox --primordial-pipe-token=9A11AA70F0392C55618E8FE941B98503 --lang=en-US --node-integration=true --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=DD103CF4EF8093C55371A62648A647D9 --mojo-application-channel-token=9A11AA70F0392C55618E8FE941B98503 --channel="2196.0.692127903\1293488761" --mojo-platform-channel-handle=1220 /prefetch:1C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exeIPTVSmartersPro.exe
User:
admin
Company:
WHMCS Smarters
Integrity Level:
MEDIUM
Description:
IPTVSmartersPro
Version:
1.1.1
Modules
Images
c:\users\admin\appdata\local\programs\iptvsmarterspro\iptvsmarterspro.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\iptvsmarterspro\node.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\psapi.dll
3344"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.iptvsmarters.com/download/?download=windows_app"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3432"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3344 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
29 265
Read events
29 100
Write events
135
Delete events
30

Modification events

(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31115078
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31115078
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
305
Suspicious files
137
Text files
67
Unknown types
12

Dropped files

PID
Process
Filename
Type
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D40A06CFC98CA50E3DB925CEC40742AA
SHA256:09CE22BA4409624A982A0A9F8B7FCE7F40FBBE0A18AB61CA03E25AC4B8582AE0
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\style.min[1].csstext
MD5:38A980E0DACAA1D82B883AA75EA6EB77
SHA256:962EDDC3189144DC1B872CDFE82D4DBF337E0E686D86F18DBBB8604A2700D5FA
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\download[1].htmbinary
MD5:6B52D3AE821B099AA2876D979AEC803A
SHA256:6F0EB3EEB053CCE618B61B5CC3C4117080A53C29FF974F6207AF6E1544E7C081
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8der
MD5:1BFE0A81DB078EA084FF82FE545176FE
SHA256:5BA8817F13EEE00E75158BAD93076AB474A068C6B52686579E0F728FDA68499F
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\logo-white-300x111[1].pngimage
MD5:BDBA752BB65CED8665F64F2BEEE3E599
SHA256:C4A411EE47CDABB0A6D66AD121DA7AC4750B1C936052916F42253FDF0438F236
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:607D9628289D09D3F85C8E37FB0B7852
SHA256:4F1CEF921E2550CABE1CCC70259D65BFEAE50609DC3743CE715616E225D7FE6F
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\light-box-styles[1].csstext
MD5:E38FE315F4B525E15C61CA5E9DCB839E
SHA256:C629444A1FD6F94E1E747DCE6FC67382E33B134E93A876B699CF2937DCAACCC8
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style.min[1].csstext
MD5:51A8390B47AA0582CF2D9C96C5ADDEE2
SHA256:98CECF88A23542FA047CE46EEDB650B5C5128761ED4386C0977B847094DDFA20
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\swiper.min[1].csstext
MD5:61F38C0476F40331B3B05798FA1EE59E
SHA256:14641486871FC6955F0FA3938125C4562E808719E2D40F6632BCD438F6B02760
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jquery-migrate.min[1].jsbinary
MD5:9FFEB32E2D9EFBF8F70CAABDED242267
SHA256:5274F11E6FB32AE0CF2DFB9F8043272865C397A7C4223B4CFA7D50EA52FBDE89
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
67
DNS requests
32
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3432
iexplore.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e11ed310cb05c77e
unknown
unknown
3432
iexplore.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e7395a10ad170b70
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/gsr1.crl
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/r4.crl
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/r1.crl
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQCehKugGJdgWBAhc1EB8hIz
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQD5h8yP4fv97BLq9sYqcTVS
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEAIE94ivqY0gCWDtim5%2Ffhw%3D
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDGCgF2SaJtvwmu6gM4lJDO
unknown
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEHoluFg8c2p6CT569vmSvZE%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1060
svchost.exe
224.0.0.252:5355
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3432
iexplore.exe
104.26.5.2:443
CLOUDFLARENET
US
unknown
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3432
iexplore.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3432
iexplore.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3432
iexplore.exe
142.250.185.67:80
c.pki.goog
GOOGLE
US
whitelisted
3432
iexplore.exe
142.250.185.202:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
c.pki.goog
  • 142.250.185.67
unknown
fonts.googleapis.com
  • 142.250.185.202
whitelisted
cdn.ampproject.org
  • 142.250.184.193
whitelisted
www.googletagmanager.com
  • 142.250.186.104
whitelisted
pagead2.googlesyndication.com
  • 142.250.185.130
whitelisted
o.pki.goog
  • 142.250.185.67
unknown
fonts.gstatic.com
  • 142.250.186.35
whitelisted
region1.analytics.google.com
  • 216.239.34.36
  • 216.239.32.36
whitelisted
stats.g.doubleclick.net
  • 66.102.1.155
  • 66.102.1.157
  • 66.102.1.154
  • 66.102.1.156
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Adware
No debug info