download:

/iperius-backup-download/

Full analysis: https://app.any.run/tasks/3d1d90fd-48ea-4746-99bd-d63b1fec1292
Verdict: Malicious activity
Analysis date: May 15, 2024, 13:26:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, Unicode text, UTF-8 text, with very long lines (15592)
MD5:

8CD52571128148B29010FA72976A50FF

SHA1:

7AA973539496A6CB2683E1E220542CD8CF9F980A

SHA256:

A2A674A6D78CD4FF1E7A5D416F5CFE989D4D4190F6CF3E4659C48218238544D2

SSDEEP:

3072:tsdI9swHWDvDgHuDgxJwowpIdZ2t/XaxXn7pbFVoXBeAV2NYmR0CZWc:tzWfgHuc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • wmpnscfg.exe (PID: 1060)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1060)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1060)
    • Application launched itself

      • iexplore.exe (PID: 3964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xml/atom | Atom web feed (69.6)
.htm/html | HyperText Markup Language with DOCTYPE (24.5)
.html | HyperText Markup Language (5.8)

EXIF

HTML

ContentType: text/html; charset=UTF-8
Viewport: width=device-width, initial-scale=1, maximum-scale=1, user-scalable=0
Robots: index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Title: Iperius Backup - Download | Iperius Backup
Description: A instalação do Iperius Backup inclui apenas o aplicativo e adiciona um grupo no Menu de Inicialização do Windows, para iniciar o aplicativo ou removê-lo.
TwitterCard: summary_large_image
TwitterLabel1: Est. reading time
TwitterData1: 2 minutos
BmiVersion: 1.4.1
Generator: Powered by Slider Revolution 6.1.8 - responsive, Mobile-Friendly Slider Plugin for WordPress with comfortable drag and drop interface.
FacebookDomainVerification: jjbf95fmi22wm1ygjqidw8bsh4ym6s
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1060"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3964"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\iperius-backup-download.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
4028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3964 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
22 559
Read events
22 357
Write events
136
Delete events
66

Modification events

(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31106763
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31106763
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3964) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
20
Text files
32
Unknown types
6

Dropped files

PID
Process
Filename
Type
4028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B337E2A2A61F482784C517098B837E29der
MD5:76EB023C6878D3C4EEA842BA135C4C60
SHA256:9C46A53DD2D9DA99F9E269A1167D85BA329CB2D6922F93D63E3F89CEE58798AE
4028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:822467B728B7A66B081C91795373789A
SHA256:AF2343382B88335EEA72251AD84949E244FF54B6995063E24459A7216E9576B9
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\A.frontend.css,qver=4.14.3.220919.pagespeed.cf.eSPcIdMFB9[1].csstext
MD5:7923DC21D30507D54EBE320032450FD8
SHA256:516CE2AC46C082F1EC55CE73D663624C48C91EB6294189B1B7FAF9FED019ED8B
4028iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B337E2A2A61F482784C517098B837E29binary
MD5:7D17D31821BBF1BA5AF94A173FF57219
SHA256:E9AFF5B8A9DACDE38DBF33165D399ED498EB6374A408BBF6510870F5E0F66F6C
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\A.styles.css,qver=5.7.4.pagespeed.cf.BWVnRDAE9I[1].csstext
MD5:056567443004F4858344867C3B2A592C
SHA256:B679EE4D604EF5715F8413ACFBBA5F3BC19D49276C6D44103EE28C2B30AECBBA
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\A.rs6.css,qver=6.1.8.pagespeed.cf.rP9mK0C3LW[1].csstext
MD5:ACFF662B40B72D6AF2AB75F8C6A2E3D3
SHA256:2AC0B259012893854BFAE7095E9108D024C2C9F3B216FC246B01E534DF132550
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\A.responsive.css,qver=8cf6b0bc0b54233d0644c82933c2c40c.pagespeed.cf.rSMZ9fSTNO[1].csstext
MD5:AD2319F5F49334ED099290872A45CA46
SHA256:4F25C527993450F489FDFDB79392EE5C5C46CA7E296BAC254B8A4A2B04740AE9
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\A.shortcodes.css,qver=8cf6b0bc0b54233d0644c82933c2c40c.pagespeed.cf.PHSWHgiFR8[1].csstext
MD5:3C74961E088547C19802829F72293658
SHA256:DA1C8945D6A52B200CE4038D6F77788AEF17EA8211C44481A17C9A2B0554EE72
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\A.style.min.css,qver=8cf6b0bc0b54233d0644c82933c2c40c.pagespeed.cf.Qbv5seeGl8[1].csstext
MD5:41BBF9B1E78697C2058FBBACB66882BC
SHA256:0984BF5512A5AA2C1AB633754D36F780D4632C203D51191D47EDD4B43BBFFE4C
4028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\wc-blocks-style[1].csstext
MD5:06417281D6068C8AF99086DDFD89866B
SHA256:19D39FF5DC5CE5A1A86862DB60EAE3B00770724177C1B123F28003B38F7FC8BB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
50
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7acc6901fe503b8b
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?053d5d434c52ec86
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?9d16a895bffb80f6
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?3efec3cabca71489
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?aa721279159f54af
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?99c2089564e3688a
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?676c775d9495a0b8
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7fd852176eb3d16a
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7c2b4634e10302c7
unknown
unknown
4028
iexplore.exe
GET
304
23.50.131.216:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f6a65c2ce893e404
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
216.58.212.138:445
fonts.googleapis.com
GOOGLE
US
whitelisted
4028
iexplore.exe
170.82.173.30:443
backupiperius.com.br
3L CLOUD INTERNET SERVICES LTDA - EPP
BR
unknown
4
System
216.58.212.138:139
fonts.googleapis.com
GOOGLE
US
whitelisted
4028
iexplore.exe
23.50.131.200:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
4028
iexplore.exe
23.50.131.216:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
4028
iexplore.exe
2.19.217.103:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown
4028
iexplore.exe
95.100.146.66:80
r3.o.lencr.org
Akamai International B.V.
CZ
unknown
3964
iexplore.exe
95.100.146.33:443
www.bing.com
Akamai International B.V.
CZ
unknown
4
System
192.168.100.255:138
whitelisted
3964
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
backupiperius.com.br
  • 170.82.173.30
  • 170.82.174.30
unknown
fonts.googleapis.com
  • 216.58.212.138
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.200
  • 23.50.131.216
  • 87.248.204.0
whitelisted
x1.c.lencr.org
  • 2.19.217.103
whitelisted
r3.o.lencr.org
  • 95.100.146.66
  • 95.100.146.41
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 95.100.146.10
  • 95.100.146.35
  • 95.100.146.34
  • 95.100.146.25
  • 95.100.146.32
  • 95.100.146.16
  • 95.100.146.33
  • 95.100.146.11
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
use.fontawesome.com
  • 104.21.27.152
  • 172.67.142.245
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info