analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://girlisbad.com/adx.php

Full analysis: https://app.any.run/tasks/26e2d3ce-abe5-4a24-92f8-817160d55b0f
Verdict: Malicious activity
Analysis date: January 24, 2022, 22:44:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

D0CFD795EEB9E95B093CAA6F0F8528CE

SHA1:

A867848432518D52DE4795739C670669A480B0E3

SHA256:

A84799122C1531004C7262F444550CF787412D96B79665CB934AD5141413421C

SSDEEP:

3:N1KZMXJMS:CyZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2216)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 2216)
    • Reads the computer name

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 2216)
    • Changes internet zones settings

      • iexplore.exe (PID: 3780)
    • Application launched itself

      • iexplore.exe (PID: 3780)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2216)
      • iexplore.exe (PID: 3780)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 2216)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2216)
    • Creates files in the user directory

      • iexplore.exe (PID: 2216)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3780"C:\Program Files\Internet Explorer\iexplore.exe" "http://girlisbad.com/adx.php"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2216"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3780 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
44 089
Read events
43 727
Write events
362
Delete events
0

Modification events

(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30937459
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
34134809
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30937460
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3780) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
49
Text files
338
Unknown types
50

Dropped files

PID
Process
Filename
Type
2216iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:54E9306F95F32E50CCD58AF19753D929
SHA256:45F94DCEB18A8F738A26DA09CE4558995A4FE02B971882E8116FC9B59813BB72
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:702E7D57157E6BDE405547B79F8395DA
SHA256:2B1048F6D98D5B6381CA26E85D773846B7DB56C87DFA099348A0186EAC59B465
2216iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96Cder
MD5:6F944E8F9F3812D0E52A4AEA034C4082
SHA256:C257A7D86A446A38A3497331BEBF242FBC3E550501DDC80925910026C48D2316
2216iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarDCEE.tmpcat
MD5:D99661D0893A52A0700B8AE68457351A
SHA256:BDD5111162A6FA25682E18FA74E37E676D49CAFCB5B7207E98E5256D1EF0D003
2216iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarDC6F.tmpcat
MD5:D99661D0893A52A0700B8AE68457351A
SHA256:BDD5111162A6FA25682E18FA74E37E676D49CAFCB5B7207E98E5256D1EF0D003
2216iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:F745371E246EB7BD23FD30D158B32DE7
SHA256:97C185EDFB91F2FF86C790519E7F4981621816C32F1180FE452AB6F2BA56B6D8
2216iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabDC6E.tmpcompressed
MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
SHA256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
2216iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:EE71961E21A66249B36C2A14ECC5A574
SHA256:B2768F75EDF47D1A0FE9449773AE9B12B68F3BDA9E375F2DAFCDB72AE46175EC
2216iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:CECC9B53D9232869BFAF50A2EEBCC366
SHA256:EABA09A165E64241FE0E90BC119D62664938BB21755540C7AB3E2D4A66F92070
2216iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\adx[1].htmhtml
MD5:71D250B067D29831AF8CFEDEE27E350C
SHA256:EF2DF15863DFFD460101CC34F9E68162B9F4FF0F525F5FA96564BEB56058DA9E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
90
TCP/UDP connections
293
DNS requests
88
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2216
iexplore.exe
GET
200
23.106.180.67:80
http://girlisbad.com/adx.php
US
html
4.72 Kb
malicious
2216
iexplore.exe
GET
200
2.16.106.171:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?cf4962af98ef7f8e
unknown
compressed
59.9 Kb
whitelisted
2216
iexplore.exe
GET
200
2.16.106.171:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e530edcd5f03d941
unknown
compressed
4.70 Kb
whitelisted
2216
iexplore.exe
GET
200
2.16.106.171:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?76990cf98d74bc30
unknown
compressed
4.70 Kb
whitelisted
2216
iexplore.exe
GET
200
2.16.106.171:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c7fa776957a15bcd
unknown
compressed
59.9 Kb
whitelisted
2216
iexplore.exe
GET
200
2.16.106.171:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3061782ec07c56f1
unknown
compressed
59.9 Kb
whitelisted
2216
iexplore.exe
GET
200
2.16.106.171:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ca25b5c653f810c6
unknown
compressed
4.70 Kb
whitelisted
2216
iexplore.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCCwQAAAAAAURO8EJH
US
der
1.41 Kb
whitelisted
2216
iexplore.exe
GET
200
104.117.200.9:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
2216
iexplore.exe
GET
200
2.16.186.25:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgNrVYRsmh5DlVIyy2rfq0s0Yg%3D%3D
unknown
der
503 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2216
iexplore.exe
23.106.180.67:80
girlisbad.com
Nobis Technology Group, LLC
US
malicious
2216
iexplore.exe
23.106.180.67:443
girlisbad.com
Nobis Technology Group, LLC
US
malicious
2216
iexplore.exe
172.64.140.12:443
adhitzads.com
Cloudflare Inc
US
unknown
2216
iexplore.exe
5.9.20.91:443
g.cash-ads.com
Hetzner Online GmbH
DE
unknown
2216
iexplore.exe
195.181.175.45:443
www.displayvertising.com
Datacamp Limited
DE
malicious
2216
iexplore.exe
2.16.106.171:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
3780
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2216
iexplore.exe
104.117.200.9:80
x1.c.lencr.org
TPG Telecom Limited
US
unknown
2216
iexplore.exe
218.94.207.228:443
s4.cnzz.com
No.31,Jin-rong Street
CN
unknown
2216
iexplore.exe
104.18.20.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
girlisbad.com
  • 23.106.180.67
malicious
adhitzads.com
  • 172.64.140.12
  • 172.64.141.12
whitelisted
g.cash-ads.com
  • 5.9.20.91
whitelisted
www.displayvertising.com
  • 195.181.175.45
  • 195.181.175.54
  • 195.181.175.49
  • 195.181.174.7
  • 185.59.220.18
suspicious
www.oneptp.com
  • 23.106.180.67
suspicious
s4.cnzz.com
  • 218.94.207.228
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 58.215.157.250
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 2.16.106.171
  • 2.16.106.233
whitelisted
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted

Threats

PID
Process
Class
Message
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
2216
iexplore.exe
Potentially Bad Traffic
ET INFO Observed ZeroSSL SSL/TLS Certificate
No debug info