analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://talented-beige-wombat.slab.com/posts/dahlbacka-bil-ab-v2ld9kf2

Full analysis: https://app.any.run/tasks/4f268d8c-813b-4a83-99b5-c17022f3779b
Verdict: Malicious activity
Analysis date: March 30, 2022, 11:22:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

299A8DBC4EF59C60ACC386C4150D4A51

SHA1:

303D878024CBCF3F779EEB79BE8751EF582DA1E8

SHA256:

AE803C90C8F6C6BF97ECE20EEA39E03D57EE130947641E455153D5DD84F56F16

SSDEEP:

3:N8MkgMCtKEGGVKRKBENJXIbJBLXn:2Mv5KvGgRKyDIbjXn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2588)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2588)
      • iexplore.exe (PID: 3052)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3052)
      • iexplore.exe (PID: 2588)
    • Checks supported languages

      • iexplore.exe (PID: 2588)
      • iexplore.exe (PID: 3052)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3052)
      • iexplore.exe (PID: 2588)
    • Application launched itself

      • iexplore.exe (PID: 3052)
    • Changes internet zones settings

      • iexplore.exe (PID: 3052)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2588)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3052)
    • Creates files in the user directory

      • iexplore.exe (PID: 3052)
      • iexplore.exe (PID: 2588)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3052"C:\Program Files\Internet Explorer\iexplore.exe" "https://talented-beige-wombat.slab.com/posts/dahlbacka-bil-ab-v2ld9kf2"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2588"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3052 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
15 815
Read events
15 604
Write events
209
Delete events
2

Modification events

(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30950440
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30950440
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3052) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
19
Text files
45
Unknown types
17

Dropped files

PID
Process
Filename
Type
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:AC8AC5EF633098D41E41FF7F2E120379
SHA256:ADCC5FAB76335D133739D13D34B32F7ED77F913E1648A5A00DCB9525F6BB391E
3052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:036AC72E650F636B29E986FA11DC4912
SHA256:4853EFDC2B8A401C0F7275BE6523AA52F7244BDA64834B04E33EE1D01899A488
2588iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabA4FD.tmpcompressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
2588iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:569F21F6A80ECC326D98BEFA0D79E633
SHA256:C78855B7212E08FC6A9CBDF8CF5FDDF95C3D9EC7DEB53FA8467B0D981B6A5E01
2588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\sentry-44d710c8e6a61b09933445270893364b[1].jstext
MD5:1B70287C8BE04EC2D402B71E4BE746B5
SHA256:E505DA4EC1D49EF3FB16408B759A4A62AFFF8DFC68E49B277E6C234C0F46B8D1
2588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\internal-30a8f544730b914c439e1b2aaa714e78[1].csstext
MD5:30A8F544730B914C439E1B2AAA714E78
SHA256:353B9CC6EB1574F826137AA9EFDFFA2CF12EC08A8FA1BF4D6FE66C572886B9EB
2588iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:BA7DFC205C03D0E2360D58A06C038FBB
SHA256:70CC889777A69FF1C6E0EC0F9862320A5D030B01D5844431CB9830E418D3DFBB
2588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\style-cf45d49d5a21b0eb1196ad110a8ee1f2[1].csstext
MD5:CF45D49D5A21B0EB1196AD110A8EE1F2
SHA256:731D1C53C6FF5154D72C2EF9AD12A64349C1B1902449362BA093747E6E21B3A2
2588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\LogRocket.min[1].jstext
MD5:62EBBD67ED7D5DE810E232869666CA8C
SHA256:8E0CCED40AD439FE77FD42AE105117B8E1DFE7136892BE0E9D7CEE17B0D9DEE5
2588iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:5D09F606A95416BFE7ECE5CFCDCE4A17
SHA256:05F61A18F0282B07971BDDA36C428A3B276AD9E0B8638385C169BE2AEE1F7F34
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
77
DNS requests
28
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2588
iexplore.exe
GET
23.216.77.80:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?a0da6d2fd9d3b4a4
US
whitelisted
2588
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2588
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2588
iexplore.exe
GET
200
13.225.84.145:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2588
iexplore.exe
GET
200
216.58.212.163:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCruRSnMdEIAQoAAAABOwY0
US
der
472 b
whitelisted
3052
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2588
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
2588
iexplore.exe
GET
200
13.225.84.66:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2588
iexplore.exe
GET
200
13.225.84.175:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2588
iexplore.exe
GET
200
96.16.145.230:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2588
iexplore.exe
104.17.234.61:443
talented-beige-wombat.slab.com
Cloudflare Inc
US
unknown
2588
iexplore.exe
195.181.174.6:443
cdn.headwayapp.co
Datacamp Limited
DE
suspicious
3052
iexplore.exe
23.216.77.80:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
suspicious
3052
iexplore.exe
131.253.33.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3052
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2588
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2588
iexplore.exe
104.17.235.61:443
talented-beige-wombat.slab.com
Cloudflare Inc
US
unknown
2588
iexplore.exe
23.216.77.80:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
suspicious
2588
iexplore.exe
96.16.145.230:80
x1.c.lencr.org
Akamai Technologies, Inc.
US
suspicious
13.225.80.7:443
cdn.vitally.io
US
suspicious

DNS requests

Domain
IP
Reputation
talented-beige-wombat.slab.com
  • 104.17.235.61
  • 104.17.234.61
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.80
  • 23.216.77.69
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cdn.slab.com
  • 104.17.235.61
  • 104.17.234.61
whitelisted
cdn.headwayapp.co
  • 195.181.174.6
  • 185.59.220.18
  • 195.181.175.48
  • 195.181.175.54
  • 195.181.175.45
whitelisted
cdn.vitally.io
  • 13.225.80.7
  • 13.225.80.31
  • 13.225.80.19
  • 13.225.80.41
whitelisted
cdn.lr-in.com
  • 172.67.206.254
  • 104.21.50.143
unknown
cdn.segment.com
  • 13.224.192.183
shared

Threats

No threats detected
No debug info