URL:

http://imagenimage.com/m91xiud91l9r/Fantasies_Come_True_4_s.jpg.html

Full analysis: https://app.any.run/tasks/56b79e8b-080a-40ec-9b15-6684b16b8a75
Verdict: Malicious activity
Analysis date: January 04, 2022, 12:53:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MD5:

748EEC83098F3DB2E462579448521845

SHA1:

C7D737CC599655C0861FD3E51E1512CE6BE95523

SHA256:

C28BB8F8E73D3532DC73F0A8506A1BD44921AB9F01BD79B226F3A48C8B767855

SSDEEP:

3:N1KX5CDIECAyK3IHRbHrXEeLNR0:Cpc5DyfHZrt0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3636)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3636)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3176)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3636)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 3636)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 880)
    • Checks supported languages

      • iexplore.exe (PID: 880)
      • iexplore.exe (PID: 3176)
    • Reads the computer name

      • iexplore.exe (PID: 3176)
      • iexplore.exe (PID: 880)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 880)
      • iexplore.exe (PID: 3176)
    • Reads CPU info

      • iexplore.exe (PID: 3176)
    • Changes internet zones settings

      • iexplore.exe (PID: 880)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3176)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 880)
      • iexplore.exe (PID: 3176)
    • Creates files in the user directory

      • iexplore.exe (PID: 3176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
880"C:\Program Files\Internet Explorer\iexplore.exe" "http://imagenimage.com/m91xiud91l9r/Fantasies_Come_True_4_s.jpg.html"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3176"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:880 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3636C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Exit code:
0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
34 624
Read events
34 408
Write events
216
Delete events
0

Modification events

(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
596699216
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30933354
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
896855466
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30933354
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(880) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
34
Text files
164
Unknown types
52

Dropped files

PID
Process
Filename
Type
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\style2[1].csstext
MD5:FEA3BFB5487D084B9603E211F84D57DC
SHA256:E3E81F2FA2764FA50D3E31014EF41F19D18DD9EB73C64741727B184E6DE17239
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\Fantasies_Come_True_4_s.jpg[1].htmhtml
MD5:9FD7EC62DB0452BF5DB2D102C45B5A14
SHA256:45EA890ABAB81B2A3101313979D6385B3F2B7B10A207FD68C1F504DAC25992E6
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\b9ng[1].jstext
MD5:79C58FE532DB5E0D8DD0BA4C9FF4C6CD
SHA256:3648D7314C1A12ECB373F9F81BC0D2DB2EA6BB9667842494C23F456D0B3B85C1
3176iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Eder
MD5:2520AE17F898DDC9E4F0489936657711
SHA256:46F22B98D3BAFA9653D19625ADCEA1E5A3BAD99738C626DB5B4B64DDC9533F54
3176iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:6A27969BB14F38343D116749F8B9DD73
SHA256:ECDA3C5C6B1B196EDCCA9970019A5074A0BC11A2D4328B69D1BFB7F287BD01C4
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\main[1].csstext
MD5:C4E93C9F451241C993633E0F29390045
SHA256:CED035B8C3CFB767800248597BB704D31EB209F4CA1B88B0D636F4488A8BBDE3
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\xupload[1].jstext
MD5:726E6D70EBFFCFFCB6D93335BFCC7B85
SHA256:7B042366A78C5D83D3DB1EFD2F7D1A0CF15CB5E5AF93888DC9ACC6FD1DD16C1F
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jquery-1.12.4.min[1].jstext
MD5:4F252523D4AF0B478C810C2547A63E19
SHA256:668B046D12DB350CCBA6728890476B3EFEE53B2F42DBB84743E5E9F1AE0CC404
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\jquery.easing.1.3[1].jstext
MD5:A6F75E0C043A2A087837E5C113CC6F7A
SHA256:E4273399CC0BC22E58B35F9F79FDF2705A39DDF4AD918CE852F2624E271D8248
3176iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\adblock_detector2[1].jstext
MD5:FEEAEE1382E66824B2FFAF774DBB4797
SHA256:B31E73AB7BD68C40A2CA2BDF6336E01B6259BBF967601C76A674E98C636C2021
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
63
TCP/UDP connections
121
DNS requests
41
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/m91xiud91l9r/Fantasies_Come_True_4_s.jpg.html
NL
html
9.88 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/jquery-1.12.4.min.js
NL
text
32.9 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/style2.css
NL
text
2.90 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/xupload.js
NL
text
3.69 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/jquery-1.3.2.min.js
NL
text
19.2 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/main.css
NL
text
2.47 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/jquery.easing.1.3.js
NL
text
1.96 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/imgs/programming-code-signs1.svg
NL
image
1.22 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/b9ng.js
NL
text
4.59 Kb
suspicious
3176
iexplore.exe
GET
200
95.211.246.57:80
http://imagenimage.com/jquery.cycle.all.min.js
NL
text
6.72 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3176
iexplore.exe
95.211.246.57:80
imagenimage.com
LeaseWeb Netherlands B.V.
NL
suspicious
3176
iexplore.exe
104.21.235.50:443
imagetwist.com
Cloudflare Inc
US
suspicious
3176
iexplore.exe
95.168.164.70:443
img56.imagenimage.com
DE
unknown
3176
iexplore.exe
142.250.185.234:443
ajax.googleapis.com
Google Inc.
US
whitelisted
3176
iexplore.exe
8.241.78.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
3176
iexplore.exe
104.18.31.182:80
ocsp.comodoca.com
Cloudflare Inc
US
unknown
3176
iexplore.exe
142.250.184.195:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3176
iexplore.exe
104.18.30.182:80
ocsp.comodoca.com
Cloudflare Inc
US
suspicious
3176
iexplore.exe
23.45.105.185:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown
3176
iexplore.exe
66.254.114.171:443
a.adtng.com
Reflected Networks, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
imagenimage.com
  • 95.211.246.57
suspicious
imagetwist.com
  • 104.21.235.50
  • 104.21.235.49
whitelisted
ajax.googleapis.com
  • 142.250.185.234
whitelisted
img56.imagenimage.com
  • 95.168.164.70
unknown
ctldl.windowsupdate.com
  • 8.241.78.254
  • 67.26.81.254
  • 8.253.95.121
  • 67.27.233.126
  • 67.26.139.254
whitelisted
ocsp.comodoca.com
  • 104.18.31.182
  • 104.18.30.182
whitelisted
ocsp.pki.goog
  • 142.250.184.195
whitelisted
ocsp.usertrust.com
  • 104.18.30.182
  • 104.18.31.182
whitelisted
ocsp.sectigo.com
  • 104.18.30.182
  • 104.18.31.182
whitelisted
x1.c.lencr.org
  • 23.45.105.185
whitelisted

Threats

PID
Process
Class
Message
3176
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
3176
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
1 ETPRO signatures available at the full report
No debug info