analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://virtualbriefing.iad1.qualtrics.com/jfe/form/SV_es3ZYNrfU2aG7uC

Full analysis: https://app.any.run/tasks/d271f229-5e38-49fb-bb98-53394ad9ca2b
Verdict: Malicious activity
Analysis date: June 27, 2022, 07:31:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

6F95BB5A731A3482221A7182EDB79BDC

SHA1:

08C84177CCF971A6EADC1151F22D1F3072880C06

SHA256:

A8CA8E9CADF0DB06D64CFA601676203903E26F9853DB3693FD9274CBABD3E292

SSDEEP:

3:N8Y2CcmZ4EiGKD7HWfw7Sz:2BCFGJGQHWY7a

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1204)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 4048)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 4048)
    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 4048)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 4048)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2720)
      • iexplore.exe (PID: 1204)
    • Reads the computer name

      • iexplore.exe (PID: 2720)
      • iexplore.exe (PID: 1204)
    • Changes internet zones settings

      • iexplore.exe (PID: 2720)
    • Application launched itself

      • iexplore.exe (PID: 2720)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1204)
      • iexplore.exe (PID: 2720)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1204)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2720)
      • iexplore.exe (PID: 1204)
    • Reads CPU info

      • iexplore.exe (PID: 1204)
    • Creates files in the user directory

      • iexplore.exe (PID: 1204)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2720"C:\Program Files\Internet Explorer\iexplore.exe" "https://virtualbriefing.iad1.qualtrics.com/jfe/form/SV_es3ZYNrfU2aG7uC"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1204"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2720 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
4048C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 32.0 r0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
Total events
20 943
Read events
20 803
Write events
140
Delete events
0

Modification events

(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30968311
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
31980648
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30968312
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2720) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
18
Text files
66
Unknown types
54

Dropped files

PID
Process
Filename
Type
1204iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\SV_es3ZYNrfU2aG7uC[1].htmhtml
MD5:45806D17382B1E524984778B6041E2E5
SHA256:9E2974C038B7FE9FFF4F58F4D67AF5F82B3D43905F578361DA21E39E08C75878
1204iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\recaptchav3.5584cab788ea7da3a5a3[1].jshtml
MD5:5584CAB788EA7DA3A5A3C58443F7784F
SHA256:006C9B5462C16766CC276F2B4F3A5280C3CC92E9163F4225D87F69D2DDA06B79
2720iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:474B60CE55E0DB602D77E5A881842C29
SHA256:CA96409BEDEE607117C2586596C52E1F6F6B09F53659A5B446AF0FBFDCF32A9B
1204iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04der
MD5:5AA235614E07491B546686882C44846B
SHA256:8DE48B0F91139A9E0863256D72E7D5F19D99ADAAF206E7E04F7887377F6C797B
1204iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\stylesheet[1].csstext
MD5:B3B97D1CFDBA019E9CBE10E6999A7276
SHA256:3CBA34FAD9917C071B06694F8CDD53C83E71FB982CF67985D24AE52B09B8781E
2720iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f7ruq93\imagestore.datbinary
MD5:50B213951CADC1CCA4EA1EA244D15173
SHA256:3B8DA8E04208F6E78B84FF43441B95EAC332E6FCA66DD7C4A3A63B0D2D07538C
1204iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:FB07BFC96CEFF35F563947184EB07AAF
SHA256:5165622E82DF551A0BD4E8E685C5EDF12DA1A238D138BDFFBA03FCFD105F7613
1204iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\te.056b26f02633097fdf59[1].jstext
MD5:056B26F02633097FDF590228A062973D
SHA256:2647664AEB05D079B6458095406356166C2C134317FCE56BB800527FFDDE1785
1204iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\vendor.931813f7e996fe0f733e[1].jsbinary
MD5:931813F7E996FE0F733E2CCE3EBF381E
SHA256:5C6126FE0221AB1475BD002EB50AF0BD3A09A024D111F12BFD157D9167EC1F87
1204iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\jfe.f565c1b5fd7c68356921[1].jstext
MD5:F565C1B5FD7C683569213D9933B8B1E1
SHA256:98D5A40AF1C08D4F5808E26E4ECA367D6FDA7C347FF46A10EAF90E13C5A92AAB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
50
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1204
iexplore.exe
GET
200
18.66.242.188:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
1204
iexplore.exe
GET
200
18.66.137.97:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
1204
iexplore.exe
GET
200
18.66.242.62:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
1204
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
1204
iexplore.exe
GET
200
18.66.242.64:80
http://crl.sca1b.amazontrust.com/sca1b-1.crl
US
binary
1.15 Mb
whitelisted
2720
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
1204
iexplore.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1204
iexplore.exe
GET
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEESz3%2FmlG2yGCtBzjzp1dVc%3D
US
der
471 b
whitelisted
1204
iexplore.exe
GET
200
2.18.212.243:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fe9d7b17c2dae316
unknown
compressed
4.70 Kb
whitelisted
1204
iexplore.exe
GET
200
142.250.186.35:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2720
iexplore.exe
23.210.252.178:443
virtualbriefing.iad1.qualtrics.com
Akamai International B.V.
NL
unknown
1204
iexplore.exe
23.210.252.178:443
virtualbriefing.iad1.qualtrics.com
Akamai International B.V.
NL
unknown
13.107.22.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2720
iexplore.exe
178.79.242.128:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
DE
malicious
1204
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1204
iexplore.exe
2.18.212.211:80
ctldl.windowsupdate.com
Akamai International B.V.
unknown
1204
iexplore.exe
142.250.185.196:443
www.google.com
Google Inc.
US
whitelisted
1204
iexplore.exe
99.86.4.77:443
d3op16id4dloxg.cloudfront.net
AT&T Services, Inc.
US
suspicious
1204
iexplore.exe
18.66.137.97:80
ocsp.rootg2.amazontrust.com
Massachusetts Institute of Technology
US
whitelisted
1204
iexplore.exe
3.229.242.124:443
rvid.imperium.com
US
unknown

DNS requests

Domain
IP
Reputation
virtualbriefing.iad1.qualtrics.com
  • 23.210.252.178
suspicious
ctldl.windowsupdate.com
  • 2.18.212.211
  • 2.18.212.243
  • 178.79.242.128
  • 178.79.242.0
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.22.200
  • 131.253.33.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.google.com
  • 142.250.185.196
whitelisted
d3op16id4dloxg.cloudfront.net
  • 99.86.4.77
  • 99.86.4.66
  • 99.86.4.120
  • 99.86.4.93
whitelisted
o.ss2.us
  • 18.66.242.188
  • 18.66.242.94
  • 18.66.242.81
  • 18.66.242.228
whitelisted
ocsp.rootg2.amazontrust.com
  • 18.66.137.97
  • 18.66.137.148
  • 18.66.137.71
  • 18.66.137.10
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.66.242.62
  • 18.66.242.58
  • 18.66.242.155
  • 18.66.242.45
shared

Threats

No threats detected
No debug info