URL:

http://cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro

Full analysis: https://app.any.run/tasks/e3a39f55-2f78-4ae5-a5a8-7278d8676e36
Verdict: Malicious activity
Analysis date: August 24, 2023, 09:59:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

C62C867F7BFB3C75748EB54163269DF3

SHA1:

24F1F21D3198C913C68F4746D890F867A5C43582

SHA256:

9C9065B892EB8D3BD9C2CA6F08CFFE8ADEEBF8A2D223808F57589133D78E971B

SSDEEP:

3:N1KdPcKTXRXAt6QOCMHmKEWXKn:CvXAt6bTHmK/XK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • The DLL Hijacking

      • pwsh.exe (PID: 4068)
  • SUSPICIOUS

    • Powershell version downgrade attack

      • powershell.exe (PID: 616)
    • Uses NSLOOKUP.EXE to check DNS info

      • powershell.exe (PID: 616)
  • INFO

    • Manual execution by a user

      • pwsh.exe (PID: 4068)
      • powershell.exe (PID: 616)
    • Checks supported languages

      • pwsh.exe (PID: 4068)
    • Application launched itself

      • iexplore.exe (PID: 124)
    • Reads the machine GUID from the registry

      • pwsh.exe (PID: 4068)
    • Create files in a temporary directory

      • pwsh.exe (PID: 4068)
    • Reads Environment values

      • pwsh.exe (PID: 4068)
    • Reads the computer name

      • pwsh.exe (PID: 4068)
    • Reads product name

      • pwsh.exe (PID: 4068)
    • Reads security settings of Internet Explorer

      • pwsh.exe (PID: 4068)
    • Creates files or folders in the user directory

      • pwsh.exe (PID: 4068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe pwsh.exe powershell.exe no specs nslookup.exe

Process information

PID
CMD
Path
Indicators
Parent process
124"C:\Program Files\Internet Explorer\iexplore.exe" "http://cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
616"C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\atl.dll
620"C:\Windows\system32\nslookup.exe"C:\Windows\System32\nslookup.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
nslookup
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\nslookup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\wsock32.dll
2372"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:124 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
4068"C:\Program Files\PowerShell\7\pwsh.exe" -WorkingDirectory ~C:\Program Files\PowerShell\7\pwsh.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
pwsh
Exit code:
0
Version:
7.2.11.500
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\powershell\7\pwsh.exe
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
13 550
Read events
13 355
Write events
195
Delete events
0

Modification events

(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(124) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
19
Text files
24
Unknown types
0

Dropped files

PID
Process
Filename
Type
124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\favicon[1].htmhtml
MD5:9BB47F504C34063DBE6486AD643BB734
SHA256:0DE426C0DC14D3CDF83C6EF871B7192DDA6E2927A960A6632F74DD8520014A5D
124iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].htmhtml
MD5:9BB47F504C34063DBE6486AD643BB734
SHA256:0DE426C0DC14D3CDF83C6EF871B7192DDA6E2927A960A6632F74DD8520014A5D
2372iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\JETQTPG6.htmhtml
MD5:9BB47F504C34063DBE6486AD643BB734
SHA256:0DE426C0DC14D3CDF83C6EF871B7192DDA6E2927A960A6632F74DD8520014A5D
2372iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\71MS87S6.htmhtml
MD5:9BB47F504C34063DBE6486AD643BB734
SHA256:0DE426C0DC14D3CDF83C6EF871B7192DDA6E2927A960A6632F74DD8520014A5D
124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:CDE0B750D16BCF65956DFE1A042F7628
SHA256:A6EB37B5288ED682CB3E4ABA6B8AF520F668104AE81B17E0C7B941B2A87A36B1
4068pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\e1a648060a327b80.customDestinations-ms~RFff12d.TMPbinary
MD5:41DA1AA68014288451738698840E5603
SHA256:9CF9C1DC3F77734DD297ECA9BD2BA5324259DD5DB22F4D8ABEC1E72A21F89A0D
4068pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2SQM6E411ZY2WW9WVFCH.tempbinary
MD5:A20A86C096ADCB3F2B94729E95AC8359
SHA256:9B6C50119EFA806C4BD1CD2C2B0A8524F261AA19EC2B882AD52677A2A0ADC273
124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:B2C81DC385D8027DFE5316AF20681390
SHA256:B487445E858A87D2A91424E02A843CE6A56E859760674C5C7666418130C63406
124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:753780AF70C08B0772F51E140EC02A30
SHA256:1D3402915BF8CB0460ED3451221A55FC4454C4920FA9EAD2C5CED1924D4E984B
124iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
23
DNS requests
18
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2372
iexplore.exe
GET
178.128.212.209:80
http://7uugcymb4dhjggkbs25lfbpbs2t2vo9jc.oast.pro/
GR
unknown
124
iexplore.exe
GET
200
178.128.212.209:80
http://cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro/favicon.ico
GR
html
72 b
unknown
124
iexplore.exe
GET
200
178.128.212.209:80
http://cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro/favicon.ico
GR
html
72 b
unknown
2372
iexplore.exe
GET
200
178.128.212.209:80
http://cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro/
GR
html
72 b
unknown
2372
iexplore.exe
GET
200
178.128.212.209:80
http://cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro/
GR
html
72 b
unknown
124
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0793fa8ddfdb5d3d
US
compressed
4.70 Kb
whitelisted
124
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
124
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
124
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?01b8db33a7e68146
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3284
svchost.exe
239.255.255.250:1900
whitelisted
124
iexplore.exe
178.128.212.209:80
cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro
DIGITALOCEAN-ASN
SG
unknown
2372
iexplore.exe
178.128.212.209:80
cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro
DIGITALOCEAN-ASN
SG
unknown
2372
iexplore.exe
13.107.5.80:443
api.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
124
iexplore.exe
2.23.209.179:443
www.bing.com
Akamai International B.V.
GB
suspicious
124
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
124
iexplore.exe
2.23.209.185:443
www.bing.com
Akamai International B.V.
GB
whitelisted
124
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
124
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
cj9ov2t2sbpbfl52sbkggjhd4bmycguu7.oast.pro
  • 178.128.212.209
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 2.23.209.179
  • 2.23.209.185
  • 2.23.209.130
  • 2.23.209.150
  • 2.23.209.177
  • 2.23.209.193
  • 2.23.209.158
  • 2.23.209.182
  • 2.23.209.133
  • 2.23.209.176
  • 2.23.209.135
  • 2.23.209.140
  • 2.23.209.181
whitelisted
7uugcymb4dhjggkbs25lfbpbs2t2vo9jc.oast.pro
  • 178.128.212.209
unknown
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
aka.ms
  • 104.83.112.120
whitelisted
pscoretestdata.blob.core.windows.net
  • 52.239.160.36
unknown

Threats

PID
Process
Class
Message
1088
svchost.exe
Potentially Bad Traffic
ET INFO Out-of-Band Interaction Domain in DNS Lookup (oast .pro)
1088
svchost.exe
Potentially Bad Traffic
ET INFO Out-of-Band Interaction Domain in DNS Lookup (oast .pro)
1088
svchost.exe
Potentially Bad Traffic
ET INFO Out-of-Band Interaction Domain in DNS Lookup (oast .pro)
Process
Message
pwsh.exe
Profiler was prevented from loading notification profiler due to app settings. Process ID (decimal): 4068. Message ID: [0x2509].