analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://back.egybest.co/explore/

Full analysis: https://app.any.run/tasks/991dd530-3d63-49ec-93c4-e4dc585e231b
Verdict: Malicious activity
Analysis date: August 18, 2021, 13:41:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

7A3430B5EF7CB540349FEB795C98EED3

SHA1:

4B30923AD21B0DD80B6EFB3E6EC19A9A9799622F

SHA256:

B78EC70D0554E6A648DF6A6EEF263CB1CCF99EE79F63F5DE5C4C389606CC8DDA

SSDEEP:

3:N8qcHAWRL90Xv:2qcHLy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2964)
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 2964)
      • iexplore.exe (PID: 1260)
    • Checks supported languages

      • iexplore.exe (PID: 1260)
      • iexplore.exe (PID: 2964)
    • Reads the computer name

      • iexplore.exe (PID: 1260)
      • iexplore.exe (PID: 2964)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1260)
    • Creates files in the user directory

      • iexplore.exe (PID: 1260)
      • iexplore.exe (PID: 2964)
    • Changes internet zones settings

      • iexplore.exe (PID: 1260)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1260)
      • iexplore.exe (PID: 2964)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2964)
    • Application launched itself

      • iexplore.exe (PID: 1260)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1260)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1260"C:\Program Files\Internet Explorer\iexplore.exe" "https://back.egybest.co/explore/"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2964"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1260 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
18 518
Read events
18 307
Write events
207
Delete events
4

Modification events

(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30905398
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30905398
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1260) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
31
Text files
117
Unknown types
33

Dropped files

PID
Process
Filename
Type
1260iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:4AD19D960B58C4123BC75D9BC85591B4
SHA256:D845D28B440B7FE6C32E4869BA332BB57F72FAF44CFC04B47E67DFC715256018
1260iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:E6DBB61BBBB4FD55763FB3B24AC637B7
SHA256:2DA8BD7406A9EAE57BE60CBAF570563372D7D23CB88D3A0798435223519BD811
2964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\fontico[1].eoteot
MD5:529276EE08DBB7B0A9DCFC6D1ED16693
SHA256:A36000740474B2ECF4250A1FF1196EAE68CEBE2372B0DE168B4C2E3085F8357F
2964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\G78uOIvP42dDsB[1].jstext
MD5:C2CE170BDC2586A296FA611893A0C1F6
SHA256:F3CE9ED10EE63FEBD3ACAA4A574DD59DC54045DA649D0FDE634B8A65BDEC577E
2964iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:4E1FA45B1157F1B9227A1B9F19EE7686
SHA256:AE22BE0D5530C4AD565C880A64F9D8A47B5423BCA43544FED83FA434F7EDD2E0
2964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\adblock[1].jstext
MD5:785AA953470FF48BB5EED67AA56B7A15
SHA256:BBBF1A34A0C92DDE8FD424FD39459EFEC2AB5FB484C53FB9C544C1CD576562DF
2964iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\6QNMQ5BK.txttext
MD5:CAD3218B5DB40AA985F69F4B4426CEE8
SHA256:65A333F5D299277F28CCE247BD2F7A89367AFCC4D31340D27263440DCDD352F2
2964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\explore[1].htmhtml
MD5:26750BF4279DCBAF71D2AAE8DB331BDB
SHA256:4054ACC510DD9F125BBF8BF99E75059375AD12D1E8E6BB45A4C353D2832DBC13
2964iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\7O61GX4A.txttext
MD5:A4F5B25529680789CAEA8F05F5BC90A1
SHA256:8F4F9A4A6D2F356DDAFA6FC0FAFD4AFD5E663D0C4DB95CFAFFBEA601268A5877
2964iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\datE362.tmpwoff
MD5:86156C436ED80BC0FBD0B43B79355A5D
SHA256:E7E3110B75483C3A63FE324DB071DA3D3267FEE09317EB7A6BB52891AF6CF0A0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
98
DNS requests
43
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1672
svchost.exe
GET
304
8.253.204.121:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?880ee01b2c3de996
US
whitelisted
1260
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
1260
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
US
der
471 b
whitelisted
2964
iexplore.exe
GET
200
5.45.205.242:80
http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CECosiqdXosrVzE6LrmbYt3c%3D
RU
der
1.48 Kb
whitelisted
1260
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
1260
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2964
iexplore.exe
GET
200
2.16.186.41:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPgvowSOtYnYL51%2Bg9P07QXDA%3D%3D
unknown
der
503 b
shared
2964
iexplore.exe
GET
200
2.16.186.232:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I
unknown
der
1.54 Kb
whitelisted
2964
iexplore.exe
GET
200
2.16.186.41:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPKeWM2U2eqwwt8pVb4soKRbg%3D%3D
unknown
der
503 b
shared
1260
iexplore.exe
GET
200
8.253.204.249:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?161ece0b70517f48
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2964
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2964
iexplore.exe
8.253.204.121:80
ctldl.windowsupdate.com
Global Crossing
US
malicious
1260
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1260
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2964
iexplore.exe
172.67.196.29:443
back.egybest.co
US
suspicious
2964
iexplore.exe
172.67.169.189:443
secure.egexa.com
US
unknown
2964
iexplore.exe
104.21.86.28:443
rank.egybest.services
Cloudflare Inc
US
unknown
2964
iexplore.exe
172.67.201.216:443
i.egycdn.com
US
malicious
1260
iexplore.exe
8.253.204.121:80
ctldl.windowsupdate.com
Global Crossing
US
malicious
1260
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
back.egybest.co
  • 172.67.196.29
  • 104.21.76.144
suspicious
ctldl.windowsupdate.com
  • 8.253.204.121
  • 8.253.204.249
  • 8.248.99.254
  • 67.26.75.254
  • 67.27.157.126
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.47.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
rank.egybest.services
  • 104.21.86.28
  • 172.67.214.97
unknown
i.egycdn.com
  • 172.67.201.216
  • 104.21.93.4
malicious
secure.egexa.com
  • 172.67.169.189
  • 104.21.27.203
malicious
login.egybest.services
  • 104.21.86.28
  • 172.67.214.97
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .to TLD
No debug info