analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.natgeotv.com/za/brain-games-5

Full analysis: https://app.any.run/tasks/4b3c2c2e-80ad-41cc-9e61-78e2d878603d
Verdict: No threats detected
Analysis date: March 06, 2019, 22:29:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

8814F0F930CB69CE2D00EAA835AEE1C8

SHA1:

5CE334F8EA26216D9022FC82298EB1C3C00E7C38

SHA256:

A0F1EA6268ABC07782DC5491F65C1CD7824F86A4595B48EAE184F5915A2901CC

SSDEEP:

3:N8DSLw4TZI43lNtn:2OLw4TZ5b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1980)
      • iexplore.exe (PID: 3688)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3688)
      • iexplore.exe (PID: 3048)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3048)
      • iexplore.exe (PID: 3688)
    • Changes internet zones settings

      • iexplore.exe (PID: 3460)
    • Application launched itself

      • iexplore.exe (PID: 3460)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3460"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3688"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3460 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1980C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3048"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3460 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
668
Read events
593
Write events
75
Delete events
0

Modification events

(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000069000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{53138FD7-405F-11E9-BEEC-5254004A04AF}
Value:
0
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(3460) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E30703000300060016001D0026008C02
Executable files
0
Suspicious files
7
Text files
115
Unknown types
34

Dropped files

PID
Process
Filename
Type
3460iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
MD5:
SHA256:
3460iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE214.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE215.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE226.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE227.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE2C4.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE2C5.tmp
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\brain-games-5[1].txt
MD5:
SHA256:
3688iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\main[1].jstext
MD5:F33DC96342180A52822F3355C936D647
SHA256:AAFA64746F79DD92B7A519A4230B0CEEAB5BD382A064D5A5609E0B5A7059C43D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
88
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3688
iexplore.exe
GET
178.32.88.216:80
http://www.natgeotv.com/
FR
unknown
3688
iexplore.exe
GET
178.32.88.200:80
http://protos.fichub.com/sire/fox/images/overlay.png
FR
unknown
3688
iexplore.exe
GET
178.32.88.216:80
http://natgeotv.com/App_Resources2/Themes/2012/Images/FlashAlert/flashLogo.jpg
FR
unknown
3688
iexplore.exe
GET
178.32.88.216:80
http://www.natgeotv.com/
FR
unknown
3688
iexplore.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.2 Kb
whitelisted
3688
iexplore.exe
GET
200
2.16.106.112:80
http://assets.natgeotv.com/ShowBackground/6952-1.jpg
unknown
image
159 Kb
whitelisted
3688
iexplore.exe
GET
302
178.32.88.216:80
http://www.natgeotv.com/App_Resources2/Themes/2012/fonts/natgeo18/GeographWeb-Light.otf)%20format(%22opentype%22
FR
html
248 b
unknown
3688
iexplore.exe
GET
404
23.37.59.76:80
http://cloud.typography.com/7177874/730288/css/fonts.css
NL
text
16 b
whitelisted
3688
iexplore.exe
GET
302
178.32.88.216:80
http://www.natgeotv.com/App_Resources2/Themes/2012/fonts/natgeo18/GeographWeb-Bold.otf)%20format(%22opentype%22
FR
html
248 b
unknown
3688
iexplore.exe
GET
200
178.32.88.216:80
http://natgeotv.com/App_Resources2/Themes/2012/Images/FlashAlert/flashLogo.jpg
FR
image
1.93 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3460
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3688
iexplore.exe
172.217.16.138:443
ajax.googleapis.com
Google Inc.
US
whitelisted
3688
iexplore.exe
157.240.1.23:443
connect.facebook.net
Facebook, Inc.
US
whitelisted
3688
iexplore.exe
172.217.18.10:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3688
iexplore.exe
172.217.22.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3688
iexplore.exe
23.45.101.128:443
sire-assets-natgeo.fichub.com
Akamai International B.V.
NL
whitelisted
3688
iexplore.exe
178.32.88.216:443
www.natgeotv.com
OVH SAS
FR
unknown
3688
iexplore.exe
205.185.208.52:443
code.jquery.com
Highwinds Network Group, Inc.
US
unknown
3688
iexplore.exe
23.37.59.76:443
cloud.typography.com
Akamai Technologies, Inc.
NL
whitelisted
3688
iexplore.exe
23.37.59.76:80
cloud.typography.com
Akamai Technologies, Inc.
NL
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.natgeotv.com
  • 178.32.88.216
unknown
www.download.windowsupdate.com
  • 93.184.221.240
whitelisted
cloud.typography.com
  • 23.37.59.76
whitelisted
fonts.googleapis.com
  • 172.217.18.10
whitelisted
sire-assets-natgeo.fichub.com
  • 23.45.101.128
unknown
ajax.googleapis.com
  • 172.217.16.138
  • 172.217.22.74
  • 172.217.22.106
  • 216.58.210.10
  • 172.217.16.202
  • 172.217.18.106
  • 172.217.23.170
  • 172.217.21.202
  • 216.58.205.234
  • 172.217.21.234
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.18.170
  • 172.217.23.138
  • 216.58.206.10
  • 216.58.207.42
whitelisted
code.jquery.com
  • 205.185.208.52
whitelisted
connect.facebook.net
  • 157.240.1.23
whitelisted
fonts.gstatic.com
  • 172.217.22.3
whitelisted

Threats

No threats detected
No debug info