download:

/iperius-backup-download/

Full analysis: https://app.any.run/tasks/3d1d90fd-48ea-4746-99bd-d63b1fec1292
Verdict: Malicious activity
Analysis date: May 15, 2024, 13:26:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, Unicode text, UTF-8 text, with very long lines (15592)
MD5:

8CD52571128148B29010FA72976A50FF

SHA1:

7AA973539496A6CB2683E1E220542CD8CF9F980A

SHA256:

A2A674A6D78CD4FF1E7A5D416F5CFE989D4D4190F6CF3E4659C48218238544D2

SSDEEP:

3072:tsdI9swHWDvDgHuDgxJwowpIdZ2t/XaxXn7pbFVoXBeAV2NYmR0CZWc:tzWfgHuc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 1060)
    • Checks supported languages

      • wmpnscfg.exe (PID: 1060)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1060)
    • Application launched itself

      • iexplore.exe (PID: 3964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xml/atom | Atom web feed (69.6)
.htm/html | HyperText Markup Language with DOCTYPE (24.5)
.html | HyperText Markup Language (5.8)

EXIF

HTML

ContentType: text/html; charset=UTF-8
Viewport: width=device-width, initial-scale=1, maximum-scale=1, user-scalable=0
Robots: index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Title: Iperius Backup - Download | Iperius Backup
Description: A instalação do Iperius Backup inclui apenas o aplicativo e adiciona um grupo no Menu de Inicialização do Windows, para iniciar o aplicativo ou removê-lo.
TwitterCard: summary_large_image
TwitterLabel1: Est. reading time
TwitterData1: 2 minutos
BmiVersion: 1.4.1
Generator: Powered by Slider Revolution 6.1.8 - responsive, Mobile-Friendly Slider Plugin for WordPress with comfortable drag and drop interface.
FacebookDomainVerification: jjbf95fmi22wm1ygjqidw8bsh4ym6s
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1060"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3964"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\iperius-backup-download.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
4028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3964 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
22 559
Read events
22 357
Write events
136
Delete events
66

Modification events

(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31106763
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31106763
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
20
Text files
32
Unknown types
6

Dropped files

PID
Process
Filename
Type
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\wc-blocks-vendors-style[1].csstext
MD5:535BC19CA40020871971F227877089AD
SHA256:B4D38EBE31A12E6C88DE4F40AF63DD23841C9879F168A8824AA475029EF59DD1
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\A.responsive.css,qver=8cf6b0bc0b54233d0644c82933c2c40c.pagespeed.cf.rSMZ9fSTNO[1].csstext
MD5:AD2319F5F49334ED099290872A45CA46
SHA256:4F25C527993450F489FDFDB79392EE5C5C46CA7E296BAC254B8A4A2B04740AE9
4028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:822467B728B7A66B081C91795373789A
SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\A.style.css,qver=8cf6b0bc0b54233d0644c82933c2c40c.pagespeed.cf.SK1EVpC7xU[1].csstext
MD5:48AD445690BBC549F4474C851D024BAE
SHA256:39096569D04CA652157DF00CECC08FCFA7DCA49B44703ACBFCE465F119F78123
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\A.styles.css,qver=5.7.4.pagespeed.cf.BWVnRDAE9I[1].csstext
MD5:056567443004F4858344867C3B2A592C
SHA256:B679EE4D604EF5715F8413ACFBBA5F3BC19D49276C6D44103EE28C2B30AECBBA
4028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:95F96B78F5A15EFBDCBD93CDE49E568F
SHA256:C5D374605E54F435F454FE55745B1E08A53E8875B5B239A24A27ABC31AF642FE
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\pum-site.min[1].csstext
MD5:3AB705EC477E79810EE37DA1A88D028E
SHA256:00C79F73596B16EC7CA8129B4764E00B28A6D63C2750998ADACD4570B176A232
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\A.rs6.css,qver=6.1.8.pagespeed.cf.rP9mK0C3LW[1].csstext
MD5:ACFF662B40B72D6AF2AB75F8C6A2E3D3
SHA256:2AC0B259012893854BFAE7095E9108D024C2C9F3B216FC246B01E534DF132550
4028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D43CE56BA173CC3B88D9AC0DDF535857
SHA256:6DB982B9C6E1BC1E5B3CA66E29D671605349851DD8627889ECE5DA31C5A2EE6A
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\wc-blocks-style[1].csstext
MD5:06417281D6068C8AF99086DDFD89866B
SHA256:19D39FF5DC5CE5A1A86862DB60EAE3B00770724177C1B123F28003B38F7FC8BB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
50
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?3efec3cabca71489
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7acc6901fe503b8b
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?053d5d434c52ec86
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?aa721279159f54af
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9d16a895bffb80f6
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?676c775d9495a0b8
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?99c2089564e3688a
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f6a65c2ce893e404
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7fd852176eb3d16a
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7c2b4634e10302c7
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
216.58.212.138:445
fonts.googleapis.com
GOOGLE
US
whitelisted
4028
iexplore.exe
170.82.173.30:443
backupiperius.com.br
3L CLOUD INTERNET SERVICES LTDA - EPP
BR
unknown
4
System
216.58.212.138:139
fonts.googleapis.com
GOOGLE
US
whitelisted
4028
iexplore.exe
23.50.131.200:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
4028
iexplore.exe
23.50.131.216:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
4028
iexplore.exe
2.19.217.103:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown
4028
iexplore.exe
95.100.146.66:80
r3.o.lencr.org
Akamai International B.V.
CZ
unknown
3964
iexplore.exe
95.100.146.33:443
www.bing.com
Akamai International B.V.
CZ
unknown
4
System
192.168.100.255:138
whitelisted
3964
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
backupiperius.com.br
  • 170.82.173.30
  • 170.82.174.30
unknown
fonts.googleapis.com
  • 216.58.212.138
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.200
  • 23.50.131.216
  • 87.248.204.0
whitelisted
x1.c.lencr.org
  • 2.19.217.103
whitelisted
r3.o.lencr.org
  • 95.100.146.66
  • 95.100.146.41
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 95.100.146.10
  • 95.100.146.35
  • 95.100.146.34
  • 95.100.146.25
  • 95.100.146.32
  • 95.100.146.16
  • 95.100.146.33
  • 95.100.146.11
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
use.fontawesome.com
  • 104.21.27.152
  • 172.67.142.245
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info