URL:

https://www.iptvsmarters.com/download/?download=windows_app

Full analysis: https://app.any.run/tasks/624c30d4-209c-416c-8b9e-abd1d936cd97
Verdict: Malicious activity
Analysis date: June 25, 2024, 21:29:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

60D12BFEC5EECE1EC2C8B3446938A9A7

SHA1:

E1E16B2A767834D06C1362FADFC45E457F9C4239

SHA256:

92C706A1CD68A308078A33EE2BE30D0F967E94BADACA47FC41FB2CBFDC307DC9

SSDEEP:

3:N8DSLuHMGGBKLa0FSP:2OLSNubP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Executable content was dropped or overwritten

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • The process creates files with name similar to system file names

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Drops 7-zip archiver for unpacking

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Process drops legitimate windows executable

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Node.exe was dropped

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Creates a software uninstall entry

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Application launched itself

      • IPTVSmartersPro.exe (PID: 2196)
    • Reads settings of System Certificates

      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the Internet Settings

      • IPTVSmartersPro.exe (PID: 2196)
  • INFO

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3432)
    • Application launched itself

      • iexplore.exe (PID: 3344)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3344)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3432)
    • Checks supported languages

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2276)
      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the computer name

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2276)
      • IPTVSmartersPro.exe (PID: 2196)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3344)
      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
    • Creates files or folders in the user directory

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
    • Create files in a temporary directory

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the machine GUID from the registry

      • IPTVSmartersPro-Setup-1.1.1.exe (PID: 1808)
      • IPTVSmartersPro.exe (PID: 2196)
    • Manual execution by a user

      • IPTVSmartersPro.exe (PID: 2196)
    • Reads the software policy settings

      • IPTVSmartersPro.exe (PID: 2196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iptvsmarterspro-setup-1.1.1.exe iptvsmarterspro.exe iptvsmarterspro.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1808"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\IPTVSmartersPro-Setup-1.1.1.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\IPTVSmartersPro-Setup-1.1.1.exe
iexplore.exe
User:
admin
Company:
WHMCS Smarters
Integrity Level:
MEDIUM
Description:
IPTV Smarters Pro is a Live IPTV player for end-users that provides the facility to watch Live TV, VOD, Series.
Exit code:
0
Version:
1.1.1
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\iptvsmarterspro-setup-1.1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2196"C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exe" C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exe
explorer.exe
User:
admin
Company:
WHMCS Smarters
Integrity Level:
MEDIUM
Description:
IPTVSmartersPro
Version:
1.1.1
Modules
Images
c:\users\admin\appdata\local\programs\iptvsmarterspro\iptvsmarterspro.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\iptvsmarterspro\node.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\psapi.dll
2276"C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exe" --type=renderer --no-sandbox --primordial-pipe-token=9A11AA70F0392C55618E8FE941B98503 --lang=en-US --node-integration=true --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=DD103CF4EF8093C55371A62648A647D9 --mojo-application-channel-token=9A11AA70F0392C55618E8FE941B98503 --channel="2196.0.692127903\1293488761" --mojo-platform-channel-handle=1220 /prefetch:1C:\Users\admin\AppData\Local\Programs\IPTVSmartersPro\IPTVSmartersPro.exeIPTVSmartersPro.exe
User:
admin
Company:
WHMCS Smarters
Integrity Level:
MEDIUM
Description:
IPTVSmartersPro
Version:
1.1.1
Modules
Images
c:\users\admin\appdata\local\programs\iptvsmarterspro\iptvsmarterspro.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\iptvsmarterspro\node.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\psapi.dll
3344"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.iptvsmarters.com/download/?download=windows_app"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3432"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3344 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
29 265
Read events
29 100
Write events
135
Delete events
30

Modification events

(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31115078
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31115078
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3344) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
305
Suspicious files
137
Text files
67
Unknown types
12

Dropped files

PID
Process
Filename
Type
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D40A06CFC98CA50E3DB925CEC40742AA
SHA256:09CE22BA4409624A982A0A9F8B7FCE7F40FBBE0A18AB61CA03E25AC4B8582AE0
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\download[1].htmbinary
MD5:6B52D3AE821B099AA2876D979AEC803A
SHA256:6F0EB3EEB053CCE618B61B5CC3C4117080A53C29FF974F6207AF6E1544E7C081
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\light-box-styles[1].csstext
MD5:E38FE315F4B525E15C61CA5E9DCB839E
SHA256:C629444A1FD6F94E1E747DCE6FC67382E33B134E93A876B699CF2937DCAACCC8
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:7D0515C176B222BDE58E1E285EEE791B
SHA256:6A14A924929DC568C94F8CEA4A13BC0BF6D751F31E5586CC80685900EEEF78FA
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:259C738D60E36A31F6368F22C257C76D
SHA256:EDE66C9BF6D2CE2C44F07AD61D63D1DA7DD6B313F003D9790C22C7931B958D25
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\swiper.min[1].csstext
MD5:61F38C0476F40331B3B05798FA1EE59E
SHA256:14641486871FC6955F0FA3938125C4562E808719E2D40F6632BCD438F6B02760
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\style.min[1].csstext
MD5:38A980E0DACAA1D82B883AA75EA6EB77
SHA256:962EDDC3189144DC1B872CDFE82D4DBF337E0E686D86F18DBBB8604A2700D5FA
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\style[1].csstext
MD5:A756B9B55027C29395B1FFC293B71CF5
SHA256:87197949D3D768B89839B2C013D5CCCD68DF0CC8F433402E08077BEC3472C1E6
3432iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\pum-site-styles[1].csstext
MD5:A02739222C307D2A1E72B1BC03B23F7B
SHA256:01BE912D997E052C244977442E64F7506A8CE6E8A0E67A3E24CADFD82DAF1C69
3432iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:2365869258DF7A66A2121B802CA4AFD9
SHA256:D6B1932822BBD72A8E78C771717D992142348F67D625A42393719FEFBE59B0ED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
67
DNS requests
32
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3432
iexplore.exe
GET
304
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e7395a10ad170b70
US
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQCDR9vuwevMnRDMxC1byWoK
US
binary
472 b
unknown
1372
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
1.01 Kb
unknown
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
NL
binary
973 b
unknown
3344
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
unknown
3344
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
US
binary
471 b
unknown
3344
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
US
binary
471 b
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/gsr1.crl
US
binary
1.70 Kb
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/r1.crl
US
binary
854 b
unknown
3432
iexplore.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/r4.crl
US
binary
436 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1060
svchost.exe
224.0.0.252:5355
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3432
iexplore.exe
104.26.5.2:443
CLOUDFLARENET
US
unknown
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3432
iexplore.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3432
iexplore.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
3432
iexplore.exe
142.250.185.67:80
c.pki.goog
GOOGLE
US
whitelisted
3432
iexplore.exe
142.250.185.202:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
c.pki.goog
  • 142.250.185.67
unknown
fonts.googleapis.com
  • 142.250.185.202
whitelisted
cdn.ampproject.org
  • 142.250.184.193
whitelisted
www.googletagmanager.com
  • 142.250.186.104
whitelisted
pagead2.googlesyndication.com
  • 142.250.185.130
whitelisted
o.pki.goog
  • 142.250.185.67
unknown
fonts.gstatic.com
  • 142.250.186.35
whitelisted
region1.analytics.google.com
  • 216.239.34.36
  • 216.239.32.36
whitelisted
stats.g.doubleclick.net
  • 66.102.1.155
  • 66.102.1.157
  • 66.102.1.154
  • 66.102.1.156
whitelisted

Threats

PID
Process
Class
Message
2196
IPTVSmartersPro.exe
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Adware
No debug info