analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://referenceicloud.egnyte.com/dl/KtnJVrLjVB

Full analysis: https://app.any.run/tasks/23446f6e-7b64-4bec-a910-fe7bf4dbd949
Verdict: Malicious activity
Analysis date: November 08, 2018, 19:08:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
phishing
Indicators:
MD5:

DB44D98056F0D9104FDE199FC8D7588B

SHA1:

AA597F24ED2F073C17D2FC1E46587661315C6EFE

SHA256:

C2D83FE0CC5A921F925E9FB395947037ECD2E12A9B8049BD54E6F0026FB7BC6D

SSDEEP:

3:N88GAM7RExJbb9Ln:28GyB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3672)
    • Creates files in the user directory

      • iexplore.exe (PID: 3664)
      • AcroRd32.exe (PID: 2144)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1496)
    • Changes internet zones settings

      • iexplore.exe (PID: 3672)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3664)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3664)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs acrord32.exe no specs acrord32.exe no specs acrord32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3672"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3664"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3672 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1496C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
1860"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /o /eo /l /b /id 3664C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeiexplore.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Exit code:
0
Version:
15.23.20070.215641
2144"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /o /eo /l /b /id 3664C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeiexplore.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
15.23.20070.215641
3792"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer /o /eo /l /b /id 3664C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
15.23.20070.215641
Total events
734
Read events
609
Write events
122
Delete events
3

Modification events

(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{C70028C5-E389-11E8-9C83-5254004AAD11}
Value:
0
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(3672) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070B0004000800130009000D00CF03
Executable files
0
Suspicious files
4
Text files
127
Unknown types
43

Dropped files

PID
Process
Filename
Type
3672iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
MD5:
SHA256:
3672iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\KtnJVrLjVB[1].txt
MD5:
SHA256:
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\fileFolderLinks[1].csstext
MD5:C7D827A913D22159BA78E54F0A550D2C
SHA256:CDC5C26838F8E3D642BF0BEF9E09DBD328C59972346D9115C521A1E3D0E22365
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\flexpaper_flat[1].csstext
MD5:4AACBA6BFC38D5E77FF98E07BA89F0E2
SHA256:E61D83E50A1515C83A1DA7DB73DDB86E0135EE38993C16DD96255AD836CD57E1
3664iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@egnyte[1].txttext
MD5:6FE1A08FDFE9C888DE1FBE01E13AD94D
SHA256:FA401018B24A59A158181DAF2E4704B6BB9F505F46830D7F9F9A9F1A07F37552
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\ba-debug.min[1].jstext
MD5:B674C1C261BE7A7BA99D7EF396FBEFCC
SHA256:37A5CB703DA02BC9E151DC6692F54F0E8A0ED201195B7A6CB224775DE509E346
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\font-awesome.min[1].csstext
MD5:9FD0D32E78F8768B93910ADD3FBBD361
SHA256:A3D2D872D33041F8C43E6ACFFE1109A57B72B610449B778630F1911D37521CE9
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\i18n[1].jstext
MD5:5979546C1840E3038A726FD1AF32CF60
SHA256:9EE0C2385478F234B565BAA014B2D90CCC8D0530EC08A8DCE3002361E8187061
3664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\KtnJVrLjVB[1].htmhtml
MD5:77DC56BD71FBB05A33F19B2E4790E4AD
SHA256:CF8E9200E5FAE78989724676B96399D7FFB0310AE685E1B5F3B7883095609D18
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
86
DNS requests
30
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3664
iexplore.exe
GET
184.168.131.241:80
http://go2l.ink/1uj4
US
shared
3664
iexplore.exe
GET
302
184.168.131.241:80
http://go2l.ink/1uj4
US
shared
3664
iexplore.exe
GET
184.168.131.241:80
http://go2l.ink/KbnmZ/1uj4
US
shared
3664
iexplore.exe
POST
200
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/index2.php
US
html
4.13 Kb
suspicious
3664
iexplore.exe
GET
200
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/images/gemail.png
US
image
1.45 Kb
suspicious
3664
iexplore.exe
GET
200
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/images/gphone.png
US
image
1.40 Kb
suspicious
3664
iexplore.exe
GET
200
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/index.php
US
html
3.52 Kb
suspicious
3664
iexplore.exe
GET
200
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/page2.php
US
html
915 b
suspicious
3664
iexplore.exe
GET
200
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/images/logo.png
US
image
8.85 Kb
suspicious
3664
iexplore.exe
POST
302
162.241.224.182:80
http://tecnocliente.com/test/wp-includes/customize/Per/data.php
US
compressed
4.13 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3672
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3664
iexplore.exe
162.247.242.20:443
bam.nr-data.net
New Relic
US
whitelisted
3664
iexplore.exe
151.101.2.110:443
js-agent.newrelic.com
Fastly
US
suspicious
3664
iexplore.exe
130.211.5.208:443
cdn.mxpnl.com
Google Inc.
US
whitelisted
3664
iexplore.exe
216.58.215.232:443
ssl.google-analytics.com
Google Inc.
US
whitelisted
3664
iexplore.exe
208.83.105.12:443
referenceicloud.egnyte.com
Bloomip Inc.
US
unknown
3672
iexplore.exe
208.83.105.12:443
referenceicloud.egnyte.com
Bloomip Inc.
US
unknown
3664
iexplore.exe
204.141.99.72:443
t.smartsheet.com
NTT America, Inc.
US
unknown
3664
iexplore.exe
204.141.99.67:443
app.smartsheet.com
NTT America, Inc.
US
unknown
3664
iexplore.exe
87.248.214.12:443
s.smartsheet.com
Limelight Networks, Inc.
IT
unknown

DNS requests

Domain
IP
Reputation
referenceicloud.egnyte.com
  • 208.83.105.12
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ssl.google-analytics.com
  • 216.58.215.232
whitelisted
cdn.mxpnl.com
  • 130.211.5.208
  • 35.186.235.23
whitelisted
js-agent.newrelic.com
  • 151.101.2.110
  • 151.101.66.110
  • 151.101.130.110
  • 151.101.194.110
whitelisted
bam.nr-data.net
  • 162.247.242.20
  • 162.247.242.18
  • 162.247.242.21
  • 162.247.242.19
whitelisted
api.mixpanel.com
  • 35.190.25.25
  • 130.211.34.183
  • 35.186.241.51
  • 107.178.240.159
whitelisted
go2l.ink
  • 184.168.131.241
shared
tecnocliente.com
  • 162.241.224.182
suspicious
app.smartsheet.com
  • 204.141.99.67
whitelisted

Threats

PID
Process
Class
Message
3664
iexplore.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Smartsheet Phishing Landing 2018-01-29
2 ETPRO signatures available at the full report
No debug info