analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://flingpals.com/landing8?transaction_id=20c489bd12734c30bbd0b3cdee9342a9

Full analysis: https://app.any.run/tasks/91beb44e-acad-47ec-a043-39ca92cc1028
Verdict: Malicious activity
Analysis date: April 27, 2022, 14:20:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

29DBC16BA51C0FC4604A690B33329E20

SHA1:

4FE3F5F595C51F6B6DBF5F5568E7CAFD609DD319

SHA256:

B80D7EB8F11C34531EEB98FB3E4796DFE00072DC08A411FFD3ADE54494FA9E47

SSDEEP:

3:N8ILWHvE1kRMKO9Xwdchb8BnRUc:2Pc1Yy9Admbjc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3304)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Reads the computer name

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Application launched itself

      • iexplore.exe (PID: 2612)
    • Changes internet zones settings

      • iexplore.exe (PID: 2612)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3304)
      • iexplore.exe (PID: 2612)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2612)
    • Creates files in the user directory

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3304)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2612"C:\Program Files\Internet Explorer\iexplore.exe" "https://flingpals.com/landing8?transaction_id=20c489bd12734c30bbd0b3cdee9342a9"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3304"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2612 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
20 123
Read events
19 955
Write events
166
Delete events
2

Modification events

(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30956097
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
223671492
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30956098
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
15
Text files
39
Unknown types
9

Dropped files

PID
Process
Filename
Type
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab5352.tmpcompressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:8BDF10EEBAFE7D3A3870ADB80CF7A918
SHA256:E3392B0091231354B586F7B3635B4FEDD2EE568E6EE85A699A7D93FADE6D3683
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab5373.tmpcompressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar5374.tmpcat
MD5:30644DA711C99BE812B06023C163B751
SHA256:96DBA3D67364C1E75DAB241D4A023B48F4D6453F495175B210F525E930CF144B
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59CF0603EC02542053465809FE8CC4F1der
MD5:ADFF1A4022016F6CDAA5057E23504D65
SHA256:D8939D7BFDA735D49DF65425B03316F8B933777077ECB9EE5C4E2A59EF2D1C20
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61binary
MD5:989FB2AD8EE959EBA15BC9E14529AD40
SHA256:5CC28B8CF36621E0764DDF42B546B68E4F1878AC738C46504B0755E5F862BD29
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar5353.tmpcat
MD5:30644DA711C99BE812B06023C163B751
SHA256:96DBA3D67364C1E75DAB241D4A023B48F4D6453F495175B210F525E930CF144B
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:F56AE70218A62668B659C4B6B5ACABF3
SHA256:935DCA60A5E59B341694E290D769A8D817A623E53258F01CA5FE80BE461D621D
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59CF0603EC02542053465809FE8CC4F1binary
MD5:1F4DA8F646B739ADE92062077D7C00B5
SHA256:CC0FD4E851A83988EB3258B4BE8116FA4D8058DC14B4CB1965FC94F3A7F959E5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
33
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3304
iexplore.exe
GET
200
104.108.45.242:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?ecd7a65ed2fc5e81
IT
compressed
59.5 Kb
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4071b4383e21ffde
IT
compressed
59.5 Kb
whitelisted
3304
iexplore.exe
GET
200
104.108.45.242:80
http://x2.c.lencr.org/
NL
der
299 b
whitelisted
3304
iexplore.exe
GET
200
2.23.159.146:80
http://e1.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBTvkAFw3ViPKmUeIVEf3NC7b1ErqwQUWvPtK%2Fw2wjd5uVIw6lRvz1XLLqwCEgQ8eLOTdR8BH8yQHJNHrHhHlA%3D%3D
unknown
der
344 b
whitelisted
2612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?53acdcc8e58d37ad
IT
compressed
4.70 Kb
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?99f7046d211feafd
IT
compressed
4.70 Kb
whitelisted
3304
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
2612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2612
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2612
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3304
iexplore.exe
188.114.97.13:443
flingpals.com
Cloudflare Inc
US
malicious
3304
iexplore.exe
104.108.45.242:80
x1.c.lencr.org
Akamai Technologies, Inc.
NL
unknown
3304
iexplore.exe
87.248.222.128:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
IT
suspicious
3304
iexplore.exe
2.23.159.146:80
e1.o.lencr.org
Telia Company AB
unknown
3304
iexplore.exe
104.16.168.131:443
hcaptcha.com
Cloudflare Inc
US
unknown
3304
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2612
iexplore.exe
204.79.197.203:443
www.msn.com
Microsoft Corporation
US
whitelisted
2612
iexplore.exe
20.25.53.147:443
query.prod.cms.msn.com
US
unknown

DNS requests

Domain
IP
Reputation
flingpals.com
  • 188.114.97.13
unknown
ctldl.windowsupdate.com
  • 87.248.222.128
whitelisted
x1.c.lencr.org
  • 104.108.45.242
whitelisted
x2.c.lencr.org
  • 104.108.45.242
whitelisted
e1.o.lencr.org
  • 2.23.159.146
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
whitelisted
hcaptcha.com
  • 104.16.168.131
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info