URL:

https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffreshdesk.com%2Flp%2Fcustomer-support-software%3Futm_source%3Demail-referral%26utm_medium%3Demail-referral%26utm_campaign%3Dsprout-portal&data=04%7C01%7C%7Caa6ebe93ad68415b9d4808d97c451f7d%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C637677458587786362%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=rhFtHecdvUIdE8DkUDVGy9YVuvo7X9%2B43BtslAaxLxI%3D&reserved=0

Full analysis: https://app.any.run/tasks/22dc8a6e-b9c3-4141-a71b-e0d7d6dcae7d
Verdict: Malicious activity
Analysis date: September 21, 2021, 06:08:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

3248E7E8AFD5CD5DAE2623D5AC68663F

SHA1:

5B385E11A20D849053BC6BA867652334C3BE618B

SHA256:

C0C29DA3F58FE40D580225424C755F1CCD6759C2D8C0AB864197C47912A5D75D

SSDEEP:

12:2WhqxprGMjEXW1SN21XW18mez3TyFtEyTNKP7RltNCd:2Whq3VAX1KXRTyFthTEP7vtNCd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2888)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2888)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2888)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 2888)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 120)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 3600)
      • iexplore.exe (PID: 120)
    • Checks supported languages

      • iexplore.exe (PID: 120)
      • iexplore.exe (PID: 3600)
    • Reads CPU info

      • iexplore.exe (PID: 120)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 120)
      • iexplore.exe (PID: 3600)
    • Reads internet explorer settings

      • iexplore.exe (PID: 120)
    • Application launched itself

      • iexplore.exe (PID: 3600)
    • Changes internet zones settings

      • iexplore.exe (PID: 3600)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3600)
      • iexplore.exe (PID: 120)
    • Creates files in the user directory

      • iexplore.exe (PID: 120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3600"C:\Program Files\Internet Explorer\iexplore.exe" "https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffreshdesk.com%2Flp%2Fcustomer-support-software%3Futm_source%3Demail-referral%26utm_medium%3Demail-referral%26utm_campaign%3Dsprout-portal&data=04%7C01%7C%7Caa6ebe93ad68415b9d4808d97c451f7d%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C637677458587786362%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=rhFtHecdvUIdE8DkUDVGy9YVuvo7X9%2B43BtslAaxLxI%3D&reserved=0"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\version.dll
c:\windows\system32\rpcrt4.dll
120"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3600 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2888C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
19 901
Read events
19 706
Write events
195
Delete events
0

Modification events

(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
457851200
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30912175
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
758009560
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30912175
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3600) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
54
Text files
195
Unknown types
75

Dropped files

PID
Process
Filename
Type
120iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2F23D0F5E4D72862517E1CB26A329742_F6FACC49395CFA949BCE851E73323C49der
MD5:D26DCEB25249E1DC284DB3E09A7D1E05
SHA256:868536173E1517A90CEAE031B2E9E9A6757F556CFA6AFF8911D78DAFFAF47EF0
120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\non-critical[1].csstext
MD5:2DEF6E4526F71F0AF8DB7271692591B1
SHA256:13B7E80C0725EFE27A544C7DC9A38ED7AE1E04376BCB5F9F6E3FCDD6DDEF4166
120iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:041A64647AF17EC05FC5BBC2398DC4ED
SHA256:E7CCE035CBADF92712AB4122C2253CAE6E517636094DBC376479ABCBE778D78F
120iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:F5E69FE311D10A8D4824C9522F5B9E35
SHA256:33F73C6C24CB2AD591DC4AB57D1F4626EE54DF071DE9AB714CD497CE586A6357
120iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2F23D0F5E4D72862517E1CB26A329742_F6FACC49395CFA949BCE851E73323C49binary
MD5:47F94ECE7FFBCC0054F5548C77371A53
SHA256:31894BB1735A7CE23B22889790F842EE20E201DCA2CE1443C18DBCB000065151
120iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_6B23D2F122421744AC1E7F766CFFDF43der
MD5:672718C9A6E65DBF523AF0ACE6EA8E0B
SHA256:30826C3B84A6EB855839A18213840FBC9E9D244FD6DB39F3E772D3A3CDA757F7
120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\customer-support-software[1].htmhtml
MD5:79F0506CA922E08ECCD09BCC81FD8FD6
SHA256:E7998C97A44CCC9B0492C5E830E0B34BFAAD325EDA8F1B7258CDF54984CDA0C2
3600iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:3E33EF61DB19BAE4684F6E69B50CE41D
SHA256:CB48C7FA82460D488D302298999ECEBDF1E1F338A25379AF99589FEA5A6A1B8B
120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\site[1].csstext
MD5:51DB319232198E2181B3A64CDCE8294F
SHA256:918139A67AFF2A28D0FD255F60950458895506C69483347B096F0125FA6DEF60
120iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\620BEF1064BD8E252C599957B3C91896der
MD5:743A25B75F830C0754C9E362C7454ACB
SHA256:606794203748F6653D098D54493F5F560CF6C69A63A2F736EBD0E0DA3F3F40BD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
57
TCP/UDP connections
202
DNS requests
83
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3600
iexplore.exe
GET
304
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0909b505f8f582c7
US
whitelisted
120
iexplore.exe
GET
200
13.225.84.68:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
3600
iexplore.exe
GET
304
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b072fe614b297e8f
US
whitelisted
3600
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
120
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAGewca9P1l7sgwzOOVR2Hc%3D
US
der
471 b
whitelisted
120
iexplore.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
120
iexplore.exe
GET
200
143.204.214.74:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAQaBpu%2FN1iCwFYwrP3oNl8%3D
US
der
471 b
whitelisted
120
iexplore.exe
GET
200
143.204.214.74:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAs2b5qCrFdsZdoGMqFy7WE%3D
US
der
471 b
whitelisted
120
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEHgDGCDPAjbzpoUYuu%2B39wE%3D
US
der
1.40 Kb
whitelisted
120
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3600
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3600
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
120
iexplore.exe
143.204.101.74:80
ocsp.rootg2.amazontrust.com
US
whitelisted
3600
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
120
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
120
iexplore.exe
104.47.6.28:443
emea01.safelinks.protection.outlook.com
Microsoft Corporation
US
whitelisted
120
iexplore.exe
143.204.101.118:80
crl.rootca1.amazontrust.com
US
whitelisted
120
iexplore.exe
54.88.29.219:443
tp.freshmarketer.com
Amazon.com, Inc.
US
unknown
120
iexplore.exe
104.18.11.239:443
geoip-js.com
Cloudflare Inc
US
unknown

DNS requests

Domain
IP
Reputation
emea01.safelinks.protection.outlook.com
  • 104.47.6.28
  • 104.47.10.28
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
freshdesk.com
  • 143.204.98.101
  • 143.204.98.45
  • 143.204.98.77
  • 143.204.98.129
shared
o.ss2.us
  • 13.225.84.68
  • 13.225.84.66
  • 13.225.84.97
  • 13.225.84.42
whitelisted
ocsp.rootg2.amazontrust.com
  • 143.204.101.74
  • 143.204.101.190
  • 143.204.101.124
  • 143.204.101.42
whitelisted
ocsp.rootca1.amazontrust.com
  • 13.32.11.60
  • 13.32.11.185
  • 13.32.11.33
  • 13.32.11.71
shared
crl.rootca1.amazontrust.com
  • 143.204.101.118
  • 143.204.101.50
  • 143.204.101.158
  • 143.204.101.120
whitelisted

Threats

No threats detected
No debug info