URL:

techsupport-corp.com

Full analysis: https://app.any.run/tasks/0603481b-ca05-464a-90ed-3810deed596f
Verdict: Malicious activity
Analysis date: June 27, 2024, 13:13:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
Indicators:
MD5:

09B4E1C46CBD6FEBFA6CED2D46BE6352

SHA1:

332B174BC66FE09DE04E1A0C837D262661A7D76F

SHA256:

BCE738FD975F53F4E620B6494DC662FEF324E24B00D49AA640F69360EC39934B

SSDEEP:

3:LWQIIDGTn:LXIJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • iexplore.exe (PID: 2248)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3568)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe #PHISHING iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2248"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3568 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3568"C:\Program Files\Internet Explorer\iexplore.exe" "techsupport-corp.com"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
10 330
Read events
10 225
Write events
86
Delete events
19

Modification events

(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31115411
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31115411
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
7
Text files
8
Unknown types
1

Dropped files

PID
Process
Filename
Type
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
2248iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\DOTBATAV\techsupport-corp[1].xmltext
MD5:C1DDEA3EF6BBEF3E7060A1A9AD89E4C5
SHA256:B71E4D17274636B97179BA2D97C742735B6510EB54F22893D3A2DAFF2CEB28DB
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:4C31628444861A2D27FA0372D2D82FCB
SHA256:3B51B1A6903FC8DE2846AA718CAEB1DBA8E75B04A7E2E958B97B058F6B678CCA
3568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:692560A298C5983AF8221BE676670A58
SHA256:BE2E9CE2F7BC28B53750632DA7E34955806192519193338C3D605787AF647410
2248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\4NEQS8VP.htmhtml
MD5:CF0AE9D292AC3C2D9C565AC15BCACC77
SHA256:C0623A98220D6586761A01BC71F85279D1893F40E75400864B0F9048BC2B0BFE
2248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\all[1].jsbinary
MD5:097F74FC8F861ECE148262A652AB806A
SHA256:39B4614F1C87CF0CFD1BC3375642E95825CB2018E0318A36AAD766DDB5A8CBE9
2248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\psat_logo[1].pngimage
MD5:C510B40B57C8DE8C431E25E89EAC656F
SHA256:313AC720267E0D852F0B17055B68087B1D1CC4CE24F075864D4AB57A7F83B199
2248iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jquery.min[1].jss
MD5:8FC25E27D42774AEAE6EDBC0A18B72AA
SHA256:B294E973896F8F874E90A8EB1A8908AC790980D034C4C4BDF0FC3D37B8ABF682
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:FA34ECB8815A2D98849888CB1CDBF38B
SHA256:5077A54924F80491A74ED78BBD73FF7BF85A27CADDB80CEAA9CCB86F8B9A11BE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
36
TCP/UDP connections
26
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/assets/ajax/libs/jquery/1.11.0/jquery.min.js
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/assets/psat_logo.png
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/assets/all.js?g=infopage
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/trace?id=infopage&msg=BrowserDetect%20-%20localStorage%20%3D%20true&correlation_id=undefined
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/trace?id=infopage&msg=BrowserDetect%20-%20sessionStorage%20%3D%20true&correlation_id=undefined
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/trace?id=infopage&msg=BrowserDetect%20-%20hasCookies%20%3D%20true&correlation_id=undefined
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/trace?id=infopage&msg=BrowserDetect%20-%20os%20%3D%20Windows&correlation_id=undefined
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/trace?id=infopage&msg=BrowserDetect%20-%20browser%20%3D%20Mozilla&correlation_id=undefined
unknown
unknown
2248
iexplore.exe
GET
200
54.175.212.227:80
http://techsupport-corp.com/trace?id=infopage&msg=BrowserDetect%20-%20browser_version%20%3D%2011&correlation_id=undefined
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2248
iexplore.exe
54.175.212.227:80
techsupport-corp.com
AMAZON-AES
US
unknown
4
System
192.168.100.255:137
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
2564
svchost.exe
239.255.255.250:3702
whitelisted
4
System
192.168.100.255:138
whitelisted
3568
iexplore.exe
54.175.212.227:80
techsupport-corp.com
AMAZON-AES
US
unknown
3568
iexplore.exe
184.86.251.29:443
www.bing.com
Akamai International B.V.
DE
unknown
3568
iexplore.exe
23.50.131.219:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3568
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
techsupport-corp.com
  • 54.175.212.227
  • 44.218.75.31
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 184.86.251.5
  • 184.86.251.28
  • 184.86.251.4
  • 184.86.251.24
  • 184.86.251.31
  • 184.86.251.6
  • 184.86.251.29
  • 184.86.251.7
  • 184.86.251.25
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.219
  • 23.50.131.203
  • 23.50.131.200
  • 23.50.131.205
  • 23.50.131.217
  • 23.50.131.209
  • 23.50.131.223
  • 23.50.131.222
  • 23.50.131.220
  • 23.50.131.198
  • 23.50.131.201
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.32.238.34
  • 2.19.198.194
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

PID
Process
Class
Message
2248
iexplore.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Proofpoint Security Awareness Training
No debug info