download:

download-memu-on-pc.html

Full analysis: https://app.any.run/tasks/40acb74d-399e-40a1-827e-db63a31d50be
Verdict: Malicious activity
Analysis date: January 13, 2021, 13:34:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode text, with very long lines
MD5:

985FC71A0E3735055EB4B36B02A19322

SHA1:

F4D829FAA5D46D03324282B4B49226C43552981C

SHA256:

C31A30C0AC0325151204ACBF91EACED920A7C5E99FC433C19814989091148D13

SSDEEP:

1536:xpOdu54ZZfdLirkawDpPt7leCb99UhNMS:rOdpdpTaG9JsyG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Memu-Installer_v2.22.002.89.40.exe (PID: 2508)
      • Memu-Installer_v2.22.002.89.40.exe (PID: 864)
  • SUSPICIOUS

    • Drops a file with a compile date too recent

      • iexplore.exe (PID: 2560)
      • iexplore.exe (PID: 2260)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2260)
      • iexplore.exe (PID: 2560)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 2188)
      • iexplore.exe (PID: 2200)
    • Changes internet zones settings

      • iexplore.exe (PID: 2560)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2188)
      • iexplore.exe (PID: 2200)
      • iexplore.exe (PID: 2560)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2188)
      • iexplore.exe (PID: 2200)
      • iexplore.exe (PID: 2560)
    • Application launched itself

      • iexplore.exe (PID: 2560)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2200)
      • iexplore.exe (PID: 2260)
      • iexplore.exe (PID: 2188)
      • iexplore.exe (PID: 2560)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

viewport: width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0
Title: MEmu Download - The Best Android Emulator for PC
Keywords: memu, memuplay, memu play, memu app player, memu player, memu emulator, memu emulador, memu download, download memu, memu official, download memuplay, memuplay download, pubg pc download, free fire pc download
Description: Download MEmu Play - The Best Android Emulator for Windows 10. Join over 100 million users to play Android games on PC with MEmu Play.
YahooSeeker: Index,Follow
GoogleBot: Index,Follow
allowSearch: Yes
Robots: all, index, follow
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start iexplore.exe iexplore.exe iexplore.exe iexplore.exe memu-installer_v2.22.002.89.40.exe no specs memu-installer_v2.22.002.89.40.exe

Process information

PID
CMD
Path
Indicators
Parent process
864"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Memu-Installer_v2.22.002.89.40.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Memu-Installer_v2.22.002.89.40.exe
iexplore.exe
User:
admin
Integrity Level:
HIGH
Description:
Product Installer
Exit code:
0
Version:
1.86.2.7677
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\78rfyb7z\memu-installer_v2.22.002.89.40.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2188"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2560 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2200"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2560 CREDAT:78856 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2260"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2560 CREDAT:464129 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2508"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Memu-Installer_v2.22.002.89.40.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\Memu-Installer_v2.22.002.89.40.exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Product Installer
Exit code:
3221226540
Version:
1.86.2.7677
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\78rfyb7z\memu-installer_v2.22.002.89.40.exe
c:\systemroot\system32\ntdll.dll
2560"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\download-memu-on-pc.html.htmC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
3 721
Read events
3 538
Write events
173
Delete events
10

Modification events

(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
3853454526
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30861744
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2560) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
4
Suspicious files
30
Text files
15
Unknown types
12

Dropped files

PID
Process
Filename
Type
2188iexplore.exeC:\Users\admin\AppData\Local\Temp\Cab32F0.tmp
MD5:
SHA256:
2188iexplore.exeC:\Users\admin\AppData\Local\Temp\Tar32F1.tmp
MD5:
SHA256:
2560iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2200iexplore.exeC:\Users\admin\AppData\Local\Temp\Cab51D3.tmp
MD5:
SHA256:
2200iexplore.exeC:\Users\admin\AppData\Local\Temp\Tar51D4.tmp
MD5:
SHA256:
2188iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BBbinary
MD5:
SHA256:
2188iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:
SHA256:
2188iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BBder
MD5:
SHA256:
2188iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\com.supercell.clashofclans.icon.2020-12-08-14-20-36[1].pngimage
MD5:
SHA256:
2188iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\com.dts.freefireth.icon.2020-12-25-21-13-07[1].pngimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
60
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2188
iexplore.exe
GET
200
216.58.206.3:80
http://crl.pki.goog/gsr2/gsr2.crl
US
der
950 b
whitelisted
2188
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAeYNgOt45kIIZygDCe8imw%3D
US
der
471 b
whitelisted
2188
iexplore.exe
GET
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQD9enfDLjOiuAUAAAAAgwva
US
der
472 b
whitelisted
2188
iexplore.exe
GET
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQD9enfDLjOiuAUAAAAAgwva
US
der
472 b
whitelisted
2188
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAeYNgOt45kIIZygDCe8imw%3D
US
der
471 b
whitelisted
2188
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAeYNgOt45kIIZygDCe8imw%3D
US
der
471 b
whitelisted
2188
iexplore.exe
GET
304
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAeYNgOt45kIIZygDCe8imw%3D
US
der
471 b
whitelisted
2188
iexplore.exe
GET
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEFXE245%2FYPvoAwAAAADDJDU%3D
US
der
471 b
whitelisted
2188
iexplore.exe
GET
304
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAeYNgOt45kIIZygDCe8imw%3D
US
der
471 b
whitelisted
2188
iexplore.exe
GET
200
216.58.206.3:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
216.58.208.40:443
www.googletagmanager.com
Google Inc.
US
whitelisted
172.217.23.162:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
2188
iexplore.exe
172.217.23.162:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
2188
iexplore.exe
205.185.216.42:443
dl.memuplay.com
Highwinds Network Group, Inc.
US
whitelisted
2188
iexplore.exe
205.185.216.10:443
dl.memuplay.com
Highwinds Network Group, Inc.
US
whitelisted
2188
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2188
iexplore.exe
216.58.206.3:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2200
iexplore.exe
205.185.216.42:443
dl.memuplay.com
Highwinds Network Group, Inc.
US
whitelisted
2200
iexplore.exe
172.217.23.162:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
2200
iexplore.exe
216.58.208.40:443
www.googletagmanager.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.googletagmanager.com
  • 216.58.208.40
whitelisted
pagead2.googlesyndication.com
  • 172.217.23.162
whitelisted
dl.memuplay.com
  • 205.185.216.42
  • 205.185.216.10
suspicious
www.memuplay.com
  • 205.185.216.10
  • 205.185.216.42
malicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
ocsp.pki.goog
  • 216.58.206.3
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
d1dsppboztgfdt.cloudfront.net
  • 13.226.156.201
  • 13.226.156.133
  • 13.226.156.129
  • 13.226.156.67
whitelisted
crl.pki.goog
  • 216.58.206.3
whitelisted

Threats

No threats detected
No debug info