analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://urldefense.com/v3/__https://cdn.exponea.com/slido-admin/e/.eJwTUli99LevWeu6z6el2--n-s69Kvj6uvok00kJa_qMJrj1JLRKaWeUlBQUW-nrJ6bkZubpFedk6qXk66eWpeaVFNsnJpdk5ufZFidnpKaU5qQapjzjUFrDedPRipuLqbRYiBWoOiXfShDISRbiNjNw0c3LL8ssziwBy-cKsabmJmbmRJXq6yflp1Tqp2SWRRvF6pckJuWk6peAhUqK9EtSCIpEG8ciCSIrKIo2icVuQmKSf5K5oUmaoaWZcXJyWrJhinlNUWp6ZnFJalFqilVxRmJeXn6eXkFiUXaxQ05mUmpRSWVpSWZOZklmarFecn5ujaWBaVKaRZpxkoW5QXKSoWEWTxSzSkUzi8nmPy0s1wCOFX3N.52h8YlyHagiMYQ/click__;!!LKENFgF4IMmSVg!r-jAF17nNdTmK0-uABIWlvN7WbWSY7v1_tmvGndHXPrqviJH-6GauqLgSdNVjvrf_-_eVThXbi_f6CLU4k_LsgQmzXM$

Full analysis: https://app.any.run/tasks/d7674973-1f41-4024-b6cd-d9bc2bc159da
Verdict: Malicious activity
Analysis date: March 31, 2023, 20:51:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

EE58AD614B3783FD10C10BAA4E2F48CE

SHA1:

A2C00537DF342CCFE5C98DE5FA80649776CCEF0B

SHA256:

94C3D3CDE1C1EA80DAAD875E2FD88F417FDE223FB811F708BA458F2E5B1A7469

SSDEEP:

12:2U0olHVeiQO6CuU+/qdZ5AgpE6bW72l1RgoAQSOY:2hoqO6nU26jAgpE6bLl1RzNY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Create files in a temporary directory

      • iexplore.exe (PID: 2744)
    • Application launched itself

      • iexplore.exe (PID: 2744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2744"C:\Program Files\Internet Explorer\iexplore.exe" "https://urldefense.com/v3/__https://cdn.exponea.com/slido-admin/e/.eJwTUli99LevWeu6z6el2--n-s69Kvj6uvok00kJa_qMJrj1JLRKaWeUlBQUW-nrJ6bkZubpFedk6qXk66eWpeaVFNsnJpdk5ufZFidnpKaU5qQapjzjUFrDedPRipuLqbRYiBWoOiXfShDISRbiNjNw0c3LL8ssziwBy-cKsabmJmbmRJXq6yflp1Tqp2SWRRvF6pckJuWk6peAhUqK9EtSCIpEG8ciCSIrKIo2icVuQmKSf5K5oUmaoaWZcXJyWrJhinlNUWp6ZnFJalFqilVxRmJeXn6eXkFiUXaxQ05mUmpRSWVpSWZOZklmarFecn5ujaWBaVKaRZpxkoW5QXKSoWEWTxSzSkUzi8nmPy0s1wCOFX3N.52h8YlyHagiMYQ/click__;!!LKENFgF4IMmSVg!r-jAF17nNdTmK0-uABIWlvN7WbWSY7v1_tmvGndHXPrqviJH-6GauqLgSdNVjvrf_-_eVThXbi_f6CLU4k_LsgQmzXMf7f81a39-5f63-5b42-9efd-1f13b5431005quot;C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3052"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2744 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
25 128
Read events
24 930
Write events
198
Delete events
0

Modification events

(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
26
Text files
10
Unknown types
20

Dropped files

PID
Process
Filename
Type
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:7703F0A72426A98CC70E68DD49784DB7
SHA256:B44F1EF6FC20F013C2CD62F1AFB40DB9004947B046EA05CE64E50B13B0177B4D
2744iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:5EDC34CE69C155556885722C4A4F482B
SHA256:5FD4AAB306CB53B64E9B4998EF6A4C7DA6A0EA21FC2995EA7E6FB11C56F76254
2744iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:8461A037B38246996C5F98A64B5FD918
SHA256:C85675B72791F932EBE52B51BC13DCB761A469B1FBDE881C6C4EF6BA93A1B36F
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\72BA427A91F50409B9EAC87F2B59B951_F0B960C3B1E522BB9772662759982F90der
MD5:B245BC933FE32357339C381C54C64ADE
SHA256:FF2E40F5F55F1C61BE4926C3032D321998CCB0FE55A433C5A57905BEA177309A
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\72BA427A91F50409B9EAC87F2B59B951_F0B960C3B1E522BB9772662759982F90binary
MD5:5D616299065869276346D0CEC96EA925
SHA256:642AF00D3619DA2E21CD8E8F4F2C8B51F642EC1344B1CAAB74126420A4F8C85D
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\572BF21E454637C9F000BE1AF9B1E1A9der
MD5:843779F15884E551B5F5BBB26C0A9E60
SHA256:39BC9036D3ABC68ED8581B7A26B59952018DB094B8DAA6BC5462DB251A6932B1
2744iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13binary
MD5:6B853FF3BE3C40E1F0AAC46A080DB648
SHA256:18A6B5175347D3D17FB2F990A2554CA44364A4BD4489C209ED75FFD67BE9ED0A
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9binary
MD5:49240CA22A775778EEE9E12F38370B66
SHA256:6C5C80D940FE0D87B128B18A4609CE99F248D267A738203314780D7E468C3B55
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BD7CC3C00880A5151939296E23401F01_B940FE52C219CA1C7402D76C2BAC2B34der
MD5:62225E0E6BD8045D8CB3F08020280AEA
SHA256:A65D676ADA24C7B7209F2F7392E569237E5DF2E3358426E30A006606FACB6A81
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
29
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2744
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3052
iexplore.exe
GET
200
172.64.155.188:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEBN9U5yqfDGppDNwGWiEeo0%3D
US
der
2.18 Kb
whitelisted
3052
iexplore.exe
GET
200
172.64.155.188:80
http://crl.comodoca.com/AAACertificateServices.crl
US
der
506 b
whitelisted
3052
iexplore.exe
GET
200
172.64.155.188:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
1.42 Kb
whitelisted
3052
iexplore.exe
GET
200
172.64.155.188:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQh80WaEMqmyEvaHjlisSfVM4p8SAQUF9nWJSdn%2BTHCSUPZMDZEjGypT%2BsCEA2KFitLH9n0LY9WTWFSpcE%3D
US
der
471 b
whitelisted
3052
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/s/gts1d4/ABJz5GQVYbU/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEGohpcbJvz%2B0ENSd3zuAt2I%3D
US
der
471 b
whitelisted
3052
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3052
iexplore.exe
GET
200
172.64.155.188:80
http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl
US
der
929 b
whitelisted
3052
iexplore.exe
GET
200
178.79.242.11:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?94000ae1bd6474a5
DE
compressed
4.70 Kb
whitelisted
3052
iexplore.exe
GET
200
178.79.242.11:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?76ce3b6368335e5d
DE
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2744
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2744
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3052
iexplore.exe
104.18.32.68:80
ocsp.comodoca.com
CLOUDFLARENET
suspicious
3052
iexplore.exe
52.6.56.188:443
AMAZON-AES
US
suspicious
3052
iexplore.exe
178.79.242.11:80
ctldl.windowsupdate.com
LLNW
DE
suspicious
172.64.155.188:80
ocsp.comodoca.com
CLOUDFLARENET
US
suspicious
104.18.32.68:80
ocsp.comodoca.com
CLOUDFLARENET
suspicious
3052
iexplore.exe
172.64.155.188:80
ocsp.comodoca.com
CLOUDFLARENET
US
suspicious
3052
iexplore.exe
34.95.115.244:443
cdn.exponea.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3052
iexplore.exe
142.250.185.195:80
ocsp.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 178.79.242.11
whitelisted
ocsp.comodoca.com
  • 104.18.32.68
  • 172.64.155.188
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.comodoca.com
  • 172.64.155.188
  • 104.18.32.68
whitelisted
ocsp.usertrust.com
  • 104.18.32.68
  • 172.64.155.188
whitelisted
crl.usertrust.com
  • 104.18.32.68
  • 172.64.155.188
whitelisted
ocsp.sectigo.com
  • 172.64.155.188
  • 104.18.32.68
whitelisted
cdn.exponea.com
  • 34.95.115.244
unknown

Threats

No threats detected
No debug info