analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://flingpals.com/landing8?transaction_id=20c489bd12734c30bbd0b3cdee9342a9

Full analysis: https://app.any.run/tasks/91beb44e-acad-47ec-a043-39ca92cc1028
Verdict: Malicious activity
Analysis date: April 27, 2022, 14:20:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

29DBC16BA51C0FC4604A690B33329E20

SHA1:

4FE3F5F595C51F6B6DBF5F5568E7CAFD609DD319

SHA256:

B80D7EB8F11C34531EEB98FB3E4796DFE00072DC08A411FFD3ADE54494FA9E47

SSDEEP:

3:N8ILWHvE1kRMKO9Xwdchb8BnRUc:2Pc1Yy9Admbjc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3304)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Creates files in the user directory

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Reads the computer name

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 3304)
    • Changes internet zones settings

      • iexplore.exe (PID: 2612)
    • Application launched itself

      • iexplore.exe (PID: 2612)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3304)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2612)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2612"C:\Program Files\Internet Explorer\iexplore.exe" "https://flingpals.com/landing8?transaction_id=20c489bd12734c30bbd0b3cdee9342a9"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3304"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2612 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
20 123
Read events
19 955
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
15
Text files
39
Unknown types
9

Dropped files

PID
Process
Filename
Type
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab5352.tmpcompressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar5353.tmpcat
MD5:30644DA711C99BE812B06023C163B751
SHA256:96DBA3D67364C1E75DAB241D4A023B48F4D6453F495175B210F525E930CF144B
3304iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\v1[1].jshtml
MD5:695890197D121D41B5A4B5D82DC2053E
SHA256:14AE5339E5B55CD2E0140968512FEAD87DD72C92A4AB532D7BE390508B211C0D
3304iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab5373.tmpcompressed
MD5:637481DF32351129E60560D5A5C100B5
SHA256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59CF0603EC02542053465809FE8CC4F1binary
MD5:1F4DA8F646B739ADE92062077D7C00B5
SHA256:CC0FD4E851A83988EB3258B4BE8116FA4D8058DC14B4CB1965FC94F3A7F959E5
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59CF0603EC02542053465809FE8CC4F1der
MD5:ADFF1A4022016F6CDAA5057E23504D65
SHA256:D8939D7BFDA735D49DF65425B03316F8B933777077ECB9EE5C4E2A59EF2D1C20
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:60DEC20E152256E4E99E9F96C3D1A131
SHA256:58F65050E38DA9228CAA706071667DDA0B436E1ABC4533930ACCF147EEE8B2E3
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:F56AE70218A62668B659C4B6B5ACABF3
SHA256:935DCA60A5E59B341694E290D769A8D817A623E53258F01CA5FE80BE461D621D
3304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61der
MD5:409F38C1AD293CD48512C6464B5140D6
SHA256:DA55C2761C254823E0B905D8231267FED0DB5BB8183881205DAAFA84939AAEBE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
33
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3304
iexplore.exe
GET
200
104.108.45.242:80
http://x2.c.lencr.org/
NL
der
299 b
whitelisted
3304
iexplore.exe
GET
200
2.23.159.146:80
http://e1.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBTvkAFw3ViPKmUeIVEf3NC7b1ErqwQUWvPtK%2Fw2wjd5uVIw6lRvz1XLLqwCEgQ8eLOTdR8BH8yQHJNHrHhHlA%3D%3D
unknown
der
344 b
whitelisted
2612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2612
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAqvpsXKY8RRQeo74ffHUxc%3D
US
der
471 b
whitelisted
3304
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?ecd7a65ed2fc5e81
IT
compressed
59.5 Kb
whitelisted
3304
iexplore.exe
GET
200
104.108.45.242:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?99f7046d211feafd
IT
compressed
4.70 Kb
whitelisted
3304
iexplore.exe
GET
200
87.248.222.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4071b4383e21ffde
IT
compressed
59.5 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3304
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2612
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2612
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2612
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3304
iexplore.exe
87.248.222.128:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
IT
suspicious
3304
iexplore.exe
188.114.97.13:443
flingpals.com
Cloudflare Inc
US
malicious
3304
iexplore.exe
104.108.45.242:80
x1.c.lencr.org
Akamai Technologies, Inc.
NL
unknown
3304
iexplore.exe
104.16.168.131:443
hcaptcha.com
Cloudflare Inc
US
unknown
2612
iexplore.exe
204.79.197.203:443
www.msn.com
Microsoft Corporation
US
whitelisted
2612
iexplore.exe
2.18.105.186:443
go.microsoft.com
Deutsche Telekom AG
suspicious

DNS requests

Domain
IP
Reputation
flingpals.com
  • 188.114.97.13
unknown
ctldl.windowsupdate.com
  • 87.248.222.128
whitelisted
x1.c.lencr.org
  • 104.108.45.242
whitelisted
x2.c.lencr.org
  • 104.108.45.242
whitelisted
e1.o.lencr.org
  • 2.23.159.146
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
whitelisted
hcaptcha.com
  • 104.16.168.131
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info