analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://www.uceprotect.net/rblcheck.php?ipr=192.241.217.140

Full analysis: https://app.any.run/tasks/be2509b8-10b6-417d-ae4f-a8786b99727c
Verdict: Malicious activity
Analysis date: October 04, 2022, 21:44:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E11A1BC81FF469AC9E1D5D1484063715

SHA1:

D6F56200C5E514B320607CAAD6BC4053DDF64D3E

SHA256:

C969554EE2B5196FF631DC5F77B4D21D895D43756CDD92DD6DD8D2E1E80330CC

SSDEEP:

3:N1KJS4lxRrZLlV0XD4IV:Cc4lxRrlP0p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1464)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3588)
      • iexplore.exe (PID: 1464)
    • Changes internet zones settings

      • iexplore.exe (PID: 3588)
    • Application launched itself

      • iexplore.exe (PID: 3588)
    • Reads the computer name

      • iexplore.exe (PID: 1464)
      • iexplore.exe (PID: 3588)
    • Creates files in the user directory

      • iexplore.exe (PID: 1464)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1464)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3588)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3588"C:\Program Files\Internet Explorer\iexplore.exe" "http://www.uceprotect.net/rblcheck.php?ipr=192.241.217.140"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
1464"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3588 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
6 397
Read events
6 279
Write events
118
Delete events
0

Modification events

(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30988346
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30988346
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3588) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
6
Text files
12
Unknown types
2

Dropped files

PID
Process
Filename
Type
1464iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\rblcheck[1].htmhtml
MD5:B9242C5C9C3FA4C308EBE31AE70C4486
SHA256:3522EDC9CC77EDE7F5DDAE6F8651DC7D7F17B5F9642F7BD5C93DE7200704D9C3
3588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f7ruq93\imagestore.datbinary
MD5:8E4A729E98B7F2DCC916705AA627402A
SHA256:C982E09747EF0282276BDADAD5871FBDF94CD231FA728BC1A73DD9854189A5FB
3588iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:B8BDA0B382A7D056A4241B388338B778
SHA256:7BAA967F6686CCE471826B20FFA5CB7FEB4BF3C5C0BF43F51F08E84EB5850DD2
1464iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\F1R7LUB3.txttext
MD5:A84F736A6844A842F66DDBF704E2C89E
SHA256:177CAAF656C6827EAAB460FCC8245DF8C9C1BBC1267ECD8D791D22812F0964CA
3588iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:37AA86CB7640D1DA8AB3EA8D75845664
SHA256:F3142A62D467BA34C06D715B550112AE195A96F26C7761995CCF0388631C69D8
1464iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\invisible[1].jstext
MD5:F15229D089D7E886DCCFC4C69AA838BC
SHA256:CD3F837657DEAAF6A9D33A60D105B71FA1EE8F541066B0A204DFE98CFEB0ABAB
3588iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:2401062C0E109D8A977D1D9F94645080
SHA256:B5816FC43FFB87978948967FF0A4B359293274A74E865298964977257D0E7548
1464iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\DOTBATAV\www.uceprotect[1].xmltext
MD5:C1DDEA3EF6BBEF3E7060A1A9AD89E4C5
SHA256:B71E4D17274636B97179BA2D97C742735B6510EB54F22893D3A2DAFF2CEB28DB
3588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3588iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver5905.tmpxml
MD5:CBD0581678FA40F0EDCBC7C59E0CAD10
SHA256:159BD4343F344A08F6AF3B716B6FA679859C1BD1D7030D26FF5EF0255B86E1D9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
17
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1464
iexplore.exe
GET
200
188.114.97.3:80
http://www.uceprotect.net/cdn-cgi/challenge-platform/h/b/scripts/alpha/invisible.js?ts=1664913600
US
compressed
15.1 Kb
malicious
3588
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3588
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1464
iexplore.exe
GET
200
188.114.97.3:80
http://www.uceprotect.net/rblcheck.php?ipr=192.241.217.140
US
html
1.61 Kb
malicious
1464
iexplore.exe
GET
200
188.114.97.3:80
http://www.uceprotect.net/uceprotect-warning.png
US
image
1.13 Kb
malicious
3588
iexplore.exe
GET
200
188.114.97.3:80
http://www.uceprotect.net/favicon.ico
US
image
284 b
malicious
3588
iexplore.exe
GET
200
23.216.77.69:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?95f39faff9f39b45
US
compressed
4.70 Kb
whitelisted
1464
iexplore.exe
GET
200
188.114.97.3:80
http://www.uceprotect.net/UCEPROTECT-Network.gif
US
image
5.04 Kb
malicious
1464
iexplore.exe
POST
200
188.114.97.3:80
http://www.uceprotect.net/cdn-cgi/challenge-platform/h/b/cv/result/755118f8c849904e
US
text
28 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3588
iexplore.exe
188.114.97.3:80
www.uceprotect.net
CLOUDFLARENET
NL
malicious
3588
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1464
iexplore.exe
188.114.97.3:80
www.uceprotect.net
CLOUDFLARENET
NL
malicious
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
192.168.100.2:53
whitelisted
3588
iexplore.exe
188.114.96.3:80
www.uceprotect.net
CLOUDFLARENET
NL
malicious
3588
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
3588
iexplore.exe
23.216.77.69:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
suspicious
3588
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3588
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
www.microsoft.com
whitelisted
www.uceprotect.net
  • 188.114.97.3
  • 188.114.96.3
malicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.69
  • 23.216.77.80
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info