URL:

http://email-mg.glgroup.com/c/eJxNUblOxDAQ_ZpNF2TP2DNx4YKGjoaSBiU-2IjNZrUEJPh6nsMh4kQej94VT4lW1BjLfqCuLON8eto-LiWmpZ_P7_NW-mV9HefUzbFyMiVJ6Yls6R253E_Bjn3JtaaJ2TvrD848n56v69vlJq1Ld4zDpGEIUpWyOgnGac08BWcSJRkn7e5hOZ_Hbb1GnYjUaVAjnohHImHJlCVIUZEAAY9ThhqLRZeJKIFjlNADS6mZYOfGb3rCalwQ185ssQIzGyyQ-ZvN4kWh6uHifnwHscq-SoGuw26RBDg4IUNT07xzBTiCo_3HbYjW95Jar-GauvKeWsX_5sGXRBjKjOytaP_XcrHdK4fKAZuFkNuKpZbSSXsYvfZ4oDA9Z6CcRPebQE4qQFTJXFrW7hSP23Y58O2B7vBiRje49ReU9ZHXh9vuGj9ex3M6lk-MsL5hhPsAt7j8zafLkXIacvoCtU-TQQ

Full analysis: https://app.any.run/tasks/ac520702-e088-4cae-8172-e284309b64a6
Verdict: Malicious activity
Analysis date: December 05, 2022, 18:45:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

F0703EE585C7B76A78E5914C32E95A2D

SHA1:

652B02164DE3C73376184F407C5D830D0E4E1362

SHA256:

C2A939CE2CEC18F72250FDB82F53225AA20D0B1C0F62E937D7D026BBD048C745

SSDEEP:

12:PyX+kHTTDD0W9Bc16UpBxYLTh8PX21EXykfBHEMUYics0:PEBTDD0W9BcYUpwnhs5XxfBEMUgV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 1916)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1916"C:\Program Files\Internet Explorer\iexplore.exe" "http://email-mg.glgroup.com/c/eJxNUblOxDAQ_ZpNF2TP2DNx4YKGjoaSBiU-2IjNZrUEJPh6nsMh4kQej94VT4lW1BjLfqCuLON8eto-LiWmpZ_P7_NW-mV9HefUzbFyMiVJ6Yls6R253E_Bjn3JtaaJ2TvrD848n56v69vlJq1Ld4zDpGEIUpWyOgnGac08BWcSJRkn7e5hOZ_Hbb1GnYjUaVAjnohHImHJlCVIUZEAAY9ThhqLRZeJKIFjlNADS6mZYOfGb3rCalwQ185ssQIzGyyQ-ZvN4kWh6uHifnwHscq-SoGuw26RBDg4IUNT07xzBTiCo_3HbYjW95Jar-GauvKeWsX_5sGXRBjKjOytaP_XcrHdK4fKAZuFkNuKpZbSSXsYvfZ4oDA9Z6CcRPebQE4qQFTJXFrW7hSP23Y58O2B7vBiRje49ReU9ZHXh9vuGj9ex3M6lk-MsL5hhPsAt7j8zafLkXIacvoCtU-TQQ"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2972"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1916 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
13 618
Read events
13 503
Write events
115
Delete events
0

Modification events

(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31000793
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31000793
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1916) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
12
Text files
8
Unknown types
7

Dropped files

PID
Process
Filename
Type
1916iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:0798A065556B7FCD516A0C8077ADA995
SHA256:B661187B20206BAFB3D1936E67E1897A0927A4000B9E60B992F7BF66654B98EC
1916iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fder
MD5:673EBC6BD420C2311ED712DEAFC5E744
SHA256:7E2C61C3A97760BB147863EF5B32476E7AD40281C49F88F96B626987CF87DAA8
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6A2279C2CA42EBEE26F14589F0736E50binary
MD5:30C5DF8E0ACE06588DAC525BE48177F2
SHA256:5BB92F9E187BB610C0516D92938866C6440F1ECC98FFF5F53836894BDCEE2C6B
2972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\fZ3oRA[1].htmhtml
MD5:4AA7A432BB447F094408F1BD6229C605
SHA256:34CCDC351DC93DBF30A8630521968421091E3ED19C31A16E32C2EABB55C6A73A
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6A2279C2CA42EBEE26F14589F0736E50der
MD5:0EAE2996963CD33EC450FFE25ACC039C
SHA256:051E0C75150EB00CCC06F59327213E4BCC2D29D139C7C98E4CCA807F5FD6EB0E
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fbinary
MD5:6905EA8AED179AA7FDDBA7F242D7CD35
SHA256:5C7E5F2616AAF6A37743D14D16B5423DAEA5C5A1654B395ABB2E30C341B06C5D
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:54344330F1BFB79C20AC013DE68C6181
SHA256:C70421DB7E72310546093C8A8AABFFD8F43E9E6C03268C5C6A45BF734AE6F839
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:EAA4DCE3EAE1609F49EBAE7323D80FEF
SHA256:DF398498CCD10951E5B64A54A0D10547E36A78D1CBCA6369EE8AABC83363AD83
2972iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\RI8VMPAN.txttext
MD5:4AEDBC1FF1ED7AFC872CF4856E472A70
SHA256:0242677ABB6EA18DC1972587931AC87041FE21447C8BB7948B9B24904CA2FDCD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
41
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2972
iexplore.exe
GET
302
34.86.85.56:80
http://email-mg.glgroup.com/c/eJxNUblOxDAQ_ZpNF2TP2DNx4YKGjoaSBiU-2IjNZrUEJPh6nsMh4kQej94VT4lW1BjLfqCuLON8eto-LiWmpZ_P7_NW-mV9HefUzbFyMiVJ6Yls6R253E_Bjn3JtaaJ2TvrD848n56v69vlJq1Ld4zDpGEIUpWyOgnGac08BWcSJRkn7e5hOZ_Hbb1GnYjUaVAjnohHImHJlCVIUZEAAY9ThhqLRZeJKIFjlNADS6mZYOfGb3rCalwQ185ssQIzGyyQ-ZvN4kWh6uHifnwHscq-SoGuw26RBDg4IUNT07xzBTiCo_3HbYjW95Jar-GauvKeWsX_5sGXRBjKjOytaP_XcrHdK4fKAZuFkNuKpZbSSXsYvfZ4oDA9Z6CcRPebQE4qQFTJXFrW7hSP23Y58O2B7vBiRje49ReU9ZHXh9vuGj9ex3M6lk-MsL5hhPsAt7j8zafLkXIacvoCtU-TQQ
US
html
394 b
suspicious
2972
iexplore.exe
GET
301
34.202.8.34:80
http://glg.link/fZ3oRA
US
html
134 b
unknown
2972
iexplore.exe
GET
200
8.253.204.121:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8cb1050606ff4d9d
US
compressed
4.70 Kb
whitelisted
1916
iexplore.exe
GET
200
8.253.204.121:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?1bd9718473c7b0c7
US
compressed
4.70 Kb
whitelisted
1916
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2972
iexplore.exe
GET
200
143.204.214.29:80
http://s.ss2.us/r.crl
US
der
486 b
whitelisted
2972
iexplore.exe
GET
200
52.222.250.174:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2972
iexplore.exe
GET
200
99.86.1.190:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
1916
iexplore.exe
GET
200
67.26.137.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9d32309a47e19bc
US
compressed
4.70 Kb
whitelisted
1916
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2972
iexplore.exe
34.86.85.56:80
GOOGLE-CLOUD-PLATFORM
US
suspicious
2972
iexplore.exe
34.202.8.34:443
glg.link
AMAZON-AES
US
unknown
2972
iexplore.exe
8.253.204.121:80
ctldl.windowsupdate.com
LEVEL3
US
malicious
2972
iexplore.exe
34.202.8.34:80
glg.link
AMAZON-AES
US
unknown
2972
iexplore.exe
13.32.23.215:80
o.ss2.us
AMAZON-02
US
malicious
2972
iexplore.exe
143.204.214.142:80
ocsp.sca1b.amazontrust.com
AMAZON-02
US
whitelisted
1916
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2972
iexplore.exe
99.86.1.190:80
ocsp.rootg2.amazontrust.com
AMAZON-02
US
whitelisted
2972
iexplore.exe
143.204.214.29:80
s.ss2.us
AMAZON-02
US
unknown
1916
iexplore.exe
8.253.204.121:80
ctldl.windowsupdate.com
LEVEL3
US
malicious

DNS requests

Domain
IP
Reputation
glg.link
  • 34.202.8.34
  • 35.170.144.144
unknown
ctldl.windowsupdate.com
  • 8.253.204.121
  • 67.26.137.254
  • 8.248.135.254
  • 8.248.113.254
  • 8.248.119.254
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
o.ss2.us
  • 13.32.23.215
  • 13.32.23.16
  • 13.32.23.96
  • 13.32.23.104
whitelisted
s.ss2.us
  • 143.204.214.29
  • 143.204.214.59
  • 143.204.214.21
  • 143.204.214.13
whitelisted
ocsp.rootg2.amazontrust.com
  • 99.86.1.190
  • 99.86.1.61
  • 99.86.1.91
  • 99.86.1.226
whitelisted
ocsp.rootca1.amazontrust.com
  • 52.222.250.174
  • 52.222.250.42
  • 52.222.250.185
  • 52.222.250.112
shared
ocsp.sca1b.amazontrust.com
  • 143.204.214.142
  • 143.204.214.74
  • 143.204.214.169
  • 143.204.214.141
whitelisted

Threats

No threats detected
No debug info