analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.natgeotv.com/za/brain-games-5

Full analysis: https://app.any.run/tasks/4b3c2c2e-80ad-41cc-9e61-78e2d878603d
Verdict: No threats detected
Analysis date: March 06, 2019, 22:29:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

8814F0F930CB69CE2D00EAA835AEE1C8

SHA1:

5CE334F8EA26216D9022FC82298EB1C3C00E7C38

SHA256:

A0F1EA6268ABC07782DC5491F65C1CD7824F86A4595B48EAE184F5915A2901CC

SSDEEP:

3:N8DSLw4TZI43lNtn:2OLw4TZ5b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 3460)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3048)
    • Creates files in the user directory

      • iexplore.exe (PID: 3688)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1980)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3048)
    • Application launched itself

      • iexplore.exe (PID: 3460)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3460"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3688"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3460 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1980C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
3048"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3460 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
668
Read events
593
Write events
75
Delete events
0

Modification events

(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{53138FD7-405F-11E9-BEEC-5254004A04AF}
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E30703000300060016001D0026008C02
Executable files
0
Suspicious files
7
Text files
115
Unknown types
34

Dropped files

PID
Process
Filename
Type
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
MD5:
SHA256:
3460iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE214.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE215.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE226.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE227.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE2C4.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE2C5.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\brain-games-5[1].txt
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\brain-games-5[1].htmhtml
MD5:1A6944AF6D98180E047450DBDC0FC04C
SHA256:81FDBBB3D94DE7D0CAD5B3C453260EA16E606343934B49AFD1E47AC10D64B83F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
88
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3688
iexplore.exe
GET
200
23.45.101.128:80
http://sire-assets-natgeo.fichub.com/assets//images/close.png?1464190502
NL
image
15.7 Kb
whitelisted
3688
iexplore.exe
GET
200
2.16.106.112:80
http://assets.natgeotv.com/ShowBackground/6952-1.jpg
unknown
image
159 Kb
whitelisted
3688
iexplore.exe
GET
178.32.88.200:80
http://protos.fichub.com/sire/fox/images/overlay.png
FR
unknown
3688
iexplore.exe
GET
404
23.37.59.76:80
http://cloud.typography.com/7177874/730288/css/fonts.css
NL
text
16 b
whitelisted
3688
iexplore.exe
GET
404
23.37.59.76:80
http://cloud.typography.com/7177874/730288/css/fonts.css
NL
text
16 b
whitelisted
3688
iexplore.exe
GET
302
178.32.88.216:80
http://www.natgeotv.com/App_Resources2/Themes/2012/fonts/natgeo18/GeographWeb-Light.otf)%20format(%22opentype%22
FR
html
248 b
unknown
3688
iexplore.exe
GET
302
178.32.88.216:80
http://www.natgeotv.com/App_Resources2/Themes/2012/fonts/natgeo18/GeographWeb-Bold.otf)%20format(%22opentype%22
FR
html
248 b
unknown
3688
iexplore.exe
GET
178.32.88.216:80
http://www.natgeotv.com/
FR
unknown
3688
iexplore.exe
GET
178.32.88.216:80
http://natgeotv.com/App_Resources2/Themes/2012/Images/FlashAlert/flashLogo.jpg
FR
unknown
3688
iexplore.exe
GET
178.32.88.216:80
http://www.natgeotv.com/
FR
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3688
iexplore.exe
172.217.18.10:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3460
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3688
iexplore.exe
172.217.22.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3688
iexplore.exe
93.184.221.240:80
www.download.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3688
iexplore.exe
157.240.1.23:443
connect.facebook.net
Facebook, Inc.
US
whitelisted
3688
iexplore.exe
172.217.16.138:443
ajax.googleapis.com
Google Inc.
US
whitelisted
3688
iexplore.exe
178.32.88.216:443
www.natgeotv.com
OVH SAS
FR
unknown
3688
iexplore.exe
23.45.101.128:443
sire-assets-natgeo.fichub.com
Akamai International B.V.
NL
whitelisted
3688
iexplore.exe
23.37.59.76:443
cloud.typography.com
Akamai Technologies, Inc.
NL
whitelisted
3688
iexplore.exe
23.37.59.76:80
cloud.typography.com
Akamai Technologies, Inc.
NL
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.natgeotv.com
  • 178.32.88.216
unknown
www.download.windowsupdate.com
  • 93.184.221.240
whitelisted
cloud.typography.com
  • 23.37.59.76
whitelisted
fonts.googleapis.com
  • 172.217.18.10
whitelisted
sire-assets-natgeo.fichub.com
  • 23.45.101.128
unknown
ajax.googleapis.com
  • 172.217.16.138
  • 172.217.22.74
  • 172.217.22.106
  • 216.58.210.10
  • 172.217.16.202
  • 172.217.18.106
  • 172.217.23.170
  • 172.217.21.202
  • 216.58.205.234
  • 172.217.21.234
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.18.170
  • 172.217.23.138
  • 216.58.206.10
  • 216.58.207.42
whitelisted
code.jquery.com
  • 205.185.208.52
whitelisted
connect.facebook.net
  • 157.240.1.23
whitelisted
fonts.gstatic.com
  • 172.217.22.3
whitelisted

Threats

No threats detected
No debug info