analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/e0ac3b46-8fd2-4b93-a960-7e87211913ac
Verdict: Malicious activity
Analysis date: March 21, 2019, 07:50:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode text, with very long lines
MD5:

F3078FF86DE940EAA0B4CA074C8B717F

SHA1:

B8EECDAA5530A0D0C6B88D3255D1D959B03C58EB

SHA256:

948757CD4EA56B50060CAC00E9028C64474A113F0C615E747F83FFE729407A86

SSDEEP:

192:eoD+u3rg6QULWiML7CHCaQqUytjm1KjQjKjW0oeWkJr+4he4AE+ymubcDd/om9mT:e4s6QULWQiYzicU+i0ukXrwnUuH3Rnu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for external IP

      • iexplore.exe (PID: 1592)
      • iexplore.exe (PID: 2952)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 2800)
      • iexplore.exe (PID: 1592)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2680)
      • iexplore.exe (PID: 2952)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2800)
      • iexplore.exe (PID: 2952)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2800)
      • iexplore.exe (PID: 1592)
      • iexplore.exe (PID: 2952)
    • Changes internet zones settings

      • iexplore.exe (PID: 1592)
    • Application launched itself

      • iexplore.exe (PID: 1592)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2800)
      • iexplore.exe (PID: 1592)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1592)
      • iexplore.exe (PID: 2800)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1592)
      • iexplore.exe (PID: 2800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

EXIF

HTML

Description: We're the trusted source for IP address data, handling 12 billion IP geolocation API requests per month for over 1,000 businesses and 100,000+ developers
viewport: width=device-width, initial-scale=1, shrink-to-fit=no, user-scalable=no
appleItunesApp: app-id=917634022
Title: IP Address API and Data Solutions - geolocation, company, carrier info, type and more - IPinfo IP Address Geolocation API
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1592"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1073807364
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2800"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1592 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2952"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1592 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2680C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
1073807364
Version:
26,0,0,131
Total events
838
Read events
638
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
106
Unknown types
19

Dropped files

PID
Process
Filename
Type
1592iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
1592iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1592iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFCCDFBF4A1644D33E.TMP
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RIHHNFGB\ipinfo_io[1].txt
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RIHHNFGB\ipinfo_io[1].htmhtml
MD5:7921EFC22010462DA9EBB86B7FEC94FB
SHA256:7773C9AE03424B262ADE4A8FD63A706D464B9EBA53D6471734628ADD96E4FF69
1592iexplore.exeC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:3BFBA7A88403533DC73D188481FDE4E2
SHA256:B3FBF0B3A8163856803AB66AF903A1E87DC84B57C15B3C4B964EB47CB922038F
2800iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\HI_SiYsKILxRpg3hIP6sJ7fM7PqlPevS[1].eoteot
MD5:83216153207EA4265E027083DBEDDE4E
SHA256:92952D277342C1F4DEADC9F01B2F9EBC2C518AAAE6B8ED5514CA8D3FB204C04D
2800iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\stackdriver-errors-concat.min[1].jstext
MD5:1D41B64A277E3E14CE7811D5F8F125AF
SHA256:0AC3CC512F8B87F111619CDDF668AB2710776E6B34F5D7587E8E55AB91A13E7A
1592iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{0B45CDB0-4BAE-11E9-A302-5254004A04AF}.datbinary
MD5:270FEB51BA73B438DA82913A2BB1CB4B
SHA256:45088D256DE3DF7AC4BD0E63022CDDEFFECEADAF44AA9FC61A482234ED535DBD
2800iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019032120190322\index.datdat
MD5:8BCAAA4B19DA4532EF34FD47D8988FCE
SHA256:86F150245FB4B25B17E26437C601426828CA7871B32F15AF95E202B8ACDB0C21
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
40
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2952
iexplore.exe
GET
301
104.25.38.26:80
http://whoer.net/
US
shared
2952
iexplore.exe
GET
302
216.239.38.21:80
http://ipinfo.io/
US
text
40 b
shared
2952
iexplore.exe
GET
200
216.146.43.71:80
http://checkip.dyndns.org/
US
html
103 b
shared
1592
iexplore.exe
GET
200
216.146.43.71:80
http://checkip.dyndns.org/favicon.ico
US
html
103 b
shared
1592
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2800
iexplore.exe
216.58.205.234:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2800
iexplore.exe
104.16.87.20:443
cdn.jsdelivr.net
Cloudflare Inc
US
shared
2952
iexplore.exe
216.58.207.35:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2952
iexplore.exe
216.58.205.234:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2952
iexplore.exe
216.58.210.14:443
www.google-analytics.com
Google Inc.
US
whitelisted
2800
iexplore.exe
104.19.198.151:443
cdnjs.cloudflare.com
Cloudflare Inc
US
shared
2952
iexplore.exe
216.239.38.21:80
ipinfo.io
Google Inc.
US
whitelisted
2952
iexplore.exe
104.19.198.151:443
cdnjs.cloudflare.com
Cloudflare Inc
US
shared
2800
iexplore.exe
216.58.210.14:443
www.google-analytics.com
Google Inc.
US
whitelisted
1592
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
cdnjs.cloudflare.com
  • 104.19.198.151
  • 104.19.196.151
  • 104.19.195.151
  • 104.19.197.151
  • 104.19.199.151
whitelisted
cdn.jsdelivr.net
  • 104.16.87.20
  • 104.16.89.20
  • 104.16.86.20
  • 104.16.88.20
  • 104.16.85.20
whitelisted
fonts.googleapis.com
  • 216.58.205.234
whitelisted
www.google-analytics.com
  • 216.58.210.14
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
fonts.gstatic.com
  • 216.58.207.35
whitelisted
app.bentonow.com
  • 34.232.181.106
  • 3.92.108.98
  • 35.173.6.94
  • 35.173.3.255
  • 35.172.177.65
  • 34.232.40.183
  • 34.196.237.103
  • 52.204.188.97
shared
ipinfo.io
  • 216.239.38.21
  • 216.239.34.21
  • 216.239.36.21
  • 216.239.32.21
shared
stats.g.doubleclick.net
  • 66.102.1.157
  • 66.102.1.154
  • 66.102.1.155
  • 66.102.1.156
whitelisted
checkip.dyndns.org
  • 216.146.43.71
  • 131.186.113.70
  • 216.146.43.70
shared

Threats

PID
Process
Class
Message
2952
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup ipinfo.io
2952
iexplore.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2952
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
2952
iexplore.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2952
iexplore.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2952
iexplore.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2952
iexplore.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2952
iexplore.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2952
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
2952
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
No debug info