URL:

http://usenetmodelsindex.com/278179/

Full analysis: https://app.any.run/tasks/f5cda902-af83-4dd9-af9c-896eabc8e966
Verdict: No threats detected
Analysis date: July 28, 2020, 23:03:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B131E0F332F59EC5532D7C232A4494FB

SHA1:

6CEE16BCF097F5EDF91D024F8E643AC150AB40D0

SHA256:

C9BAF69CB0281F0771F02D7C4648443083743A9976A74DACA8CBFEFD02BD75FE

SSDEEP:

3:N1KLkKAJGtX:CQVEX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 4044)
      • iexplore.exe (PID: 1488)
    • Application launched itself

      • iexplore.exe (PID: 1488)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 4044)
      • iexplore.exe (PID: 1488)
    • Changes internet zones settings

      • iexplore.exe (PID: 1488)
    • Reads internet explorer settings

      • iexplore.exe (PID: 4044)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1488)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1488"C:\Program Files\Internet Explorer\iexplore.exe" http://usenetmodelsindex.com/278179/C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
4044"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1488 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
896
Read events
818
Write events
76
Delete events
2

Modification events

(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
1698337958
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30827827
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1488) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
0
Suspicious files
14
Text files
35
Unknown types
7

Dropped files

PID
Process
Filename
Type
1488iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
4044iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabC6EA.tmp
MD5:
SHA256:
4044iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarC6EB.tmp
MD5:
SHA256:
4044iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:1C400D233070530C717A810D7F9BC99E
SHA256:58B407B0DDF17FBF78FCB2E2DAD4FABAADA9BD88641F19941480951A200AE4E0
4044iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_92C27301B80B002C2BC1DBC4706E59ACder
MD5:D5D36AA692A286C90C47E73D153B052B
SHA256:52A45017C9739934B3142062DEE7F2CBF466860A974F827F13F5CA661D55F6C2
4044iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:C0E728C3908CBC9E108D0C8DCF3BBEBC
SHA256:5E65A3AD761084AA90EEBB83DB3C620A86CC4F9ADDA7B424F3F710BC4C362384
4044iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\278179[1].htmhtml
MD5:119303ADB4AA83F7EDCFC6C140ADEF98
SHA256:561BE43424F067A5E1A9A1BDF153CFA2E5DB0037C99FB0B0454A8346F505627C
4044iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\main[1].csstext
MD5:DD949E48FF8B26145EBFB630A34B9C97
SHA256:22A07C19B47703DCB4C4DC3C169B963581135C41DB49423471E8B01702E196D5
4044iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:27D78F839843B430E7BB06E3AC3B9FEF
SHA256:8B38F930B44D89C549D8127215FD0D502EA022AE0504090E8D2FDA41FF28E0CF
4044iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\check[1].pngimage
MD5:C5311EFE4C657C0814D74EC6FC98EC92
SHA256:3369429485E8E80A27011B213A8453B020AF528716C2C94B81719B44CE3A26C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
25
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4044
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
4044
iexplore.exe
GET
200
80.76.42.193:80
http://linkrotator.gr/link/images/karcher/a29.jpg
unknown
image
32.8 Kb
malicious
4044
iexplore.exe
GET
200
80.76.42.193:80
http://linkrotator.gr/link/check.png
unknown
image
815 b
malicious
4044
iexplore.exe
GET
200
80.76.42.193:80
http://linkrotator.gr/link/images/karcher/a11.jpg
unknown
image
40.1 Kb
malicious
4044
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
4044
iexplore.exe
GET
200
95.181.178.111:80
http://usenetmodelsindex.com/278179/
RU
html
365 b
malicious
4044
iexplore.exe
GET
200
80.76.42.193:80
http://linkrotator.gr/link/css/main.css
unknown
text
837 b
malicious
4044
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCp7BRe1FSElwgAAAAAS%2FYQ
US
der
472 b
whitelisted
4044
iexplore.exe
GET
200
80.76.42.193:80
http://linkrotator.gr/link/images/karcher/a26.jpg
unknown
image
27.6 Kb
malicious
4044
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCp7BRe1FSElwgAAAAAS%2FYQ
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
216.58.212.138:443
ajax.googleapis.com
Google Inc.
US
whitelisted
4044
iexplore.exe
216.58.212.138:443
ajax.googleapis.com
Google Inc.
US
whitelisted
1488
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4044
iexplore.exe
95.181.178.111:80
usenetmodelsindex.com
Fop Iliushenko Volodymyr Olexandrovuch
RU
malicious
1488
iexplore.exe
95.181.178.111:80
usenetmodelsindex.com
Fop Iliushenko Volodymyr Olexandrovuch
RU
malicious
1488
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4044
iexplore.exe
172.217.18.99:80
ocsp.pki.goog
Google Inc.
US
whitelisted
1488
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
4044
iexplore.exe
80.76.42.193:80
linkrotator.gr
unknown
1488
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
usenetmodelsindex.com
  • 95.181.178.111
malicious
ajax.googleapis.com
  • 216.58.212.138
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.pki.goog
  • 172.217.18.99
whitelisted
linkrotator.gr
  • 80.76.42.193
malicious
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

No threats detected
No debug info