URL:

https://fg.com

Full analysis: https://app.any.run/tasks/b6add66e-fac6-43c3-9b37-c68c5911e9f0
Verdict: Malicious activity
Analysis date: December 05, 2022, 22:38:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

3AFAAB730D84D980691B5CD69DA5907A

SHA1:

9146D66F9CC7ECBCA81E6A16BA087F428B05CD78

SHA256:

9D0F3A80E03E846C74ED6FA5E3CD83DC6B5909AF3350E59C82DAF366E30E8A7F

SSDEEP:

3:N8UI:2R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2056"C:\Program Files\Internet Explorer\iexplore.exe" "https://fg.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
568"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2056 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
17 119
Read events
17 010
Write events
109
Delete events
0

Modification events

(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31000826
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31000826
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2056) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
16
Text files
22
Unknown types
12

Dropped files

PID
Process
Filename
Type
2056iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F61E57ECDF69619F5A0AF300F2187010der
MD5:B2F848B3103A46120627DA60416E1713
SHA256:04D2E0656F4871916935B8A98546A665866C0051FF791ABF78710FCF5AE0F1A2
568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:20D49CE8E3FCB99AFF3C036307F3B3E8
SHA256:9CD210819C698BF200C4079478A4605DF0F19CE04417F7426D2FEBF02145C455
568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAder
MD5:9A9CAAE560D35645D6DCEB2C70F69B05
SHA256:E3F213C038C6C5DCCDE4178D007DCBA0A946C6368B19F102AD01051D74237D6C
568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:DEC08091BA578CCBBC0077718B2747B9
SHA256:C65C10E81D66C702246FEA1A669B8EA2D4E269DAA76E5688D13E2AC2E80067A2
568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\G0NRZL3X.htmhtml
MD5:DC17FFE1DF3665A57411E751E388FA4C
SHA256:1CC29FF84810B76559B7C4A9262D077931A0262260125B7424FC642E8B64F633
568iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar41FC.tmpcat
MD5:73B4B714B42FC9A6AAEFD0AE59ADB009
SHA256:C0CF8CC04C34B5B80A2D86AD0EAFB2DD71436F070C86B0321FBA0201879625FD
568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
568iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab41FB.tmpcompressed
MD5:FC4666CBCA561E864E7FDF883A9E6661
SHA256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B
568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:EC8FF3B1DED0246437B1472C69DD1811
SHA256:E634C2D1ED20E0638C95597ADF4C9D392EBAB932D3353F18AF1E4421F4BB9CAB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
48
DNS requests
65
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2056
iexplore.exe
GET
200
72.21.91.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
568
iexplore.exe
GET
200
104.94.77.31:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
568
iexplore.exe
GET
200
72.21.81.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0f4cf35339f1c3b7
US
compressed
4.70 Kb
whitelisted
568
iexplore.exe
GET
216.58.193.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDUF49VMilPuBJwnl%2BfiT%2F2
US
whitelisted
568
iexplore.exe
GET
200
172.64.155.188:80
http://crl.comodoca.com/AAACertificateServices.crl
US
der
506 b
whitelisted
568
iexplore.exe
GET
301
67.227.241.203:80
http://telepathy.com/
US
html
230 b
suspicious
568
iexplore.exe
GET
301
67.227.241.203:80
http://www.telepathy.com/
US
html
234 b
suspicious
568
iexplore.exe
GET
200
104.18.32.68:80
http://ocsp.comodoca.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCEQDwHUvue3yjezwFZqwFlyRY
US
der
2.18 Kb
whitelisted
568
iexplore.exe
GET
200
216.58.193.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDreCS75DAIaRKqvCi%2FvL9c
US
der
472 b
whitelisted
568
iexplore.exe
GET
200
72.21.81.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5de9ac3307f10c54
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
568
iexplore.exe
54.67.42.145:443
fg.com
AMAZON-02
US
malicious
568
iexplore.exe
72.21.81.240:80
ctldl.windowsupdate.com
EDGECAST
US
whitelisted
568
iexplore.exe
104.18.32.68:80
ocsp.comodoca.com
CLOUDFLARENET
suspicious
2056
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2056
iexplore.exe
72.21.91.29:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2056
iexplore.exe
72.21.81.200:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted
568
iexplore.exe
67.227.241.203:80
www.telepathy.com
LIQUIDWEB
US
suspicious
568
iexplore.exe
172.64.155.188:80
crl.comodoca.com
CLOUDFLARENET
US
suspicious
104.18.32.68:80
ocsp.comodoca.com
CLOUDFLARENET
suspicious
568
iexplore.exe
67.227.241.203:443
www.telepathy.com
LIQUIDWEB
US
suspicious

DNS requests

Domain
IP
Reputation
fg.com
  • 54.67.42.145
malicious
api.bing.com
whitelisted
www.bing.com
  • 204.79.197.200
whitelisted
ctldl.windowsupdate.com
  • 72.21.81.240
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
x1.c.lencr.org
  • 104.94.77.31
whitelisted
ocsp.digicert.com
  • 72.21.91.29
whitelisted
r3.o.lencr.org
  • 23.38.189.192
shared
www.telepathy.com
  • 67.227.241.203
unknown
ocsp.comodoca.com
  • 104.18.32.68
whitelisted

Threats

No threats detected
No debug info