URL:

https://hss3uro2hsxfogfq.onion.to

Full analysis: https://app.any.run/tasks/a9d65583-5f71-47a5-8832-70afdf894b5c
Verdict: Malicious activity
Analysis date: November 13, 2018, 03:48:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

440351163F1CE39659EF0C7601700BFA

SHA1:

5BE2E17DB7BDA544587B4A92A29331A7A96C94A5

SHA256:

A348ACB746264AB8545BAA4787832D08CE174C16C2191E32DE1C8AD70F4E88BD

SSDEEP:

3:N8qWqGLMK/s:2qWqcMl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • iexplore.exe (PID: 3148)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3208)
    • Changes internet zones settings

      • iexplore.exe (PID: 3208)
    • Creates files in the user directory

      • iexplore.exe (PID: 3148)
      • iexplore.exe (PID: 3208)
    • Dropped object may contain TOR URL's

      • iexplore.exe (PID: 3148)
      • iexplore.exe (PID: 3208)
    • Dropped object may contain URL to Tor Browser

      • iexplore.exe (PID: 3148)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3148)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3148)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3148"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3208 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3208"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
418
Read events
346
Write events
69
Delete events
3

Modification events

(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{FB6CA109-E6F6-11E8-BFAB-5254004AAD11}
Value:
0
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(3208) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070B0002000D00030030001E004501
Executable files
0
Suspicious files
1
Text files
6
Unknown types
2

Dropped files

PID
Process
Filename
Type
3208iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
3208iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\tor2web[1].css
MD5:
SHA256:
3148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\tor2web-small[1].png
MD5:
SHA256:
3148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\tor2web[1].jstext
MD5:BC89FF077D744FEB6B119D94ECC9B1F2
SHA256:4706878CC664FE2C1C92C1223BB1C966687BAB795E80FBAB3D754A38F43CB01D
3208iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[3].pngimage
MD5:9FB559A691078558E77D6848202F6541
SHA256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
3148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\NSA-MEME[1].jpgimage
MD5:46110893137A92D3C30A0BD2F9BAABE7
SHA256:1ADE3323AB73AF0B7BF4119F51FAF319D4E5FED62100ED56CA8A7F1D2BE514C6
3208iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\E02357FC7708441D4B0BE5F371F4B28961870F70binary
MD5:DA6C793FB0533AF0139A6D76C9956547
SHA256:BCEC4BFFD8EE03E0FDF1C1577EF4635AC08DB1F94CF07B0C406A6B3A171E9E1D
3208iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\favicon[1].icoimage
MD5:CB859DD0574960687FB69D451C9D2045
SHA256:96428470496E7256D5352A6B16442D89221A61D20B3B8F5BE7B0207C9BEAFDAE
3148iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\notevilurl[1].pngimage
MD5:45E459A56FE6D70A160D276400123D7F
SHA256:A952177D9419474D7330256EBB5EF81921D9C15F2A0D04F8E640B59FCBB7B116
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
3
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3208
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3208
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3148
iexplore.exe
185.100.85.150:443
hss3uro2hsxfogfq.onion.to
Flokinet Ltd
RO
malicious
3208
iexplore.exe
185.100.85.150:443
hss3uro2hsxfogfq.onion.to
Flokinet Ltd
RO
malicious
3148
iexplore.exe
35.170.95.94:443
www.vpnranks.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
hss3uro2hsxfogfq.onion.to
  • 185.100.85.150
malicious
www.vpnranks.com
  • 35.170.95.94
unknown

Threats

PID
Process
Class
Message
1056
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to .onion proxy Domain (onion.to)
3148
iexplore.exe
A Network Trojan was detected
ET CNC Ransomware Tracker Reported CnC Server group 23
3148
iexplore.exe
A Network Trojan was detected
ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (2)
3148
iexplore.exe
A Network Trojan was detected
ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (2)
3148
iexplore.exe
A Network Trojan was detected
ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (2)
3208
iexplore.exe
A Network Trojan was detected
ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (2)
No debug info