analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

index.html

Full analysis: https://app.any.run/tasks/7d33077f-734b-4bd9-893a-ab0f46019738
Verdict: Malicious activity
Analysis date: November 29, 2020, 18:16:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with CRLF line terminators
MD5:

57D7C85363D94CA39ABD91DCFB1C33DB

SHA1:

ED33048950AADAF405DC363DD435D2D6DFBC875F

SHA256:

CB0071FF4CC7429FEC595138F5C8B377DE6D36AD769A6CEF3587CB13CDAEE6C3

SSDEEP:

12:TWCN6QclfVInINPgkbPVOexJRtsvAe1TCv0vGb:y+sqINPfIAJLspO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • rundll32.exe (PID: 3164)
      • iexplore.exe (PID: 1312)
    • Changes internet zones settings

      • ie4uinit.exe (PID: 1708)
  • SUSPICIOUS

    • Application launched itself

      • ie4uinit.exe (PID: 1708)
      • rundll32.exe (PID: 3164)
      • chrmstp.exe (PID: 332)
    • Executed as Windows Service

      • taskhost.exe (PID: 2488)
    • Uses RUNDLL32.EXE to load library

      • ie4uinit.exe (PID: 1708)
      • rundll32.exe (PID: 3164)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • ie4uinit.exe (PID: 1708)
      • ie4uinit.exe (PID: 3152)
    • Creates files in the program directory

      • ie4uinit.exe (PID: 1708)
      • chrmstp.exe (PID: 332)
    • Executed via COM

      • DllHost.exe (PID: 2164)
      • DllHost.exe (PID: 2340)
  • INFO

    • Manual execution by user

      • ie4uinit.exe (PID: 1708)
      • ie4uinit.exe (PID: 2752)
      • iexplore.exe (PID: 1312)
      • chrmstp.exe (PID: 332)
    • Application launched itself

      • iexplore.exe (PID: 2204)
      • iexplore.exe (PID: 956)
      • iexplore.exe (PID: 1312)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2204)
      • iexplore.exe (PID: 636)
      • iexplore.exe (PID: 2180)
    • Changes internet zones settings

      • iexplore.exe (PID: 956)
      • iexplore.exe (PID: 1312)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 956)
      • iexplore.exe (PID: 1312)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1312)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

Title: IntergrALL - Contact Center
ContentType: text/html; charset=iso-8859-1
Pragma: no-cache
Expires: -1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
19
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe no specs iexplore.exe no specs taskhost.exe no specs ie4uinit.exe no specs ie4uinit.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs rundll32.exe no specs ie4uinit.exe no specs chrmstp.exe no specs chrmstp.exe no specs iexplore.exe ie4uinit.exe no specs WinInetBrokerServer no specs iexplore.exe WinInetBrokerServer no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
956"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\Desktop\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2204"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:956 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2520"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:956 CREDAT:333057 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2488"taskhost.exe"C:\Windows\system32\taskhost.exeservices.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Host Process for Windows Tasks
Exit code:
1073807364
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1708"C:\Windows\System32\ie4uinit.exe" -UserConfigC:\Windows\System32\ie4uinit.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IE Per-User Initialization Utility
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3524C:\Windows\System32\ie4uinit.exe -ClearIconCacheC:\Windows\System32\ie4uinit.exeie4uinit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IE Per-User Initialization Utility
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2144C:\Windows\System32\rundll32 advpack.dll,LaunchINFSectionEx C:\Windows\system32\ieuinit.inf,Install,,36C:\Windows\System32\rundll32.exeie4uinit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3164C:\Windows\System32\rundll32 C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /mC:\Windows\System32\rundll32.exeie4uinit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2860C:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /0C:\Windows\system32\RunDll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2852C:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /0C:\Windows\system32\RunDll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 993
Read events
2 370
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
34
Text files
83
Unknown types
4

Dropped files

PID
Process
Filename
Type
956iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFBC6CFEC9F48E892A.TMP
MD5:
SHA256:
956iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF58BCCA8217F808A8.TMP
MD5:
SHA256:
956iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF5ACFFEF23E76D5BC.TMP
MD5:
SHA256:
956iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF162EDDBA5F2D42D7.TMP
MD5:
SHA256:
1708ie4uinit.exeC:\Users\Administrator\AppData\Local\Temp\RGI9DEF.tmp
MD5:
SHA256:
1708ie4uinit.exeC:\Users\Administrator\AppData\Local\Temp\RGI9E0F.tmp
MD5:
SHA256:
1708ie4uinit.exeC:\Users\Administrator\AppData\Local\Temp\RGI9E20.tmp
MD5:
SHA256:
1708ie4uinit.exeC:\Users\Administrator\AppData\Local\Temp\RGI9ECD.tmp
MD5:
SHA256:
1708ie4uinit.exeC:\Users\Administrator\AppData\Local\Temp\RGI9EED.tmp
MD5:
SHA256:
956iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\RecoveryStore.{42A7EDC2-DE02-11E9-92C0-5254004A04AF}.datbinary
MD5:8EB040E418E19DD64D9BBACC4CF1F29C
SHA256:3E74BC20D130B2BA23A6467D99BC4B50A8E8E33C3CC28D68F7B4EEA38A64CB81
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
23
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
636
iexplore.exe
GET
404
23.43.214.226:80
http://go.microsoft.com/fwlink/?LinkId=299201
US
xml
341 b
whitelisted
1312
iexplore.exe
GET
404
8.248.119.254:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
xml
341 b
whitelisted
1312
iexplore.exe
GET
404
8.253.204.121:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
xml
341 b
whitelisted
2180
iexplore.exe
GET
404
23.43.214.226:80
http://go.microsoft.com/fwlink/?LinkId=69157
US
xml
341 b
whitelisted
1312
iexplore.exe
GET
404
8.248.119.254:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
xml
341 b
whitelisted
956
iexplore.exe
GET
404
204.79.197.200:80
http://www.bing.com/favicon.ico
US
xml
341 b
whitelisted
1312
iexplore.exe
GET
404
8.248.119.254:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
xml
341 b
whitelisted
1312
iexplore.exe
GET
404
13.107.21.200:80
http://www.bing.com/favicon.ico
US
xml
341 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
956
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1312
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2180
iexplore.exe
23.43.214.226:80
go.microsoft.com
Akamai International B.V.
US
malicious
956
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
636
iexplore.exe
23.43.214.226:80
go.microsoft.com
Akamai International B.V.
US
malicious
1312
iexplore.exe
23.43.214.226:443
go.microsoft.com
Akamai International B.V.
US
malicious
1312
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1312
iexplore.exe
8.248.119.254:80
www.download.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
1312
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
go.microsoft.com
  • 23.43.214.226
whitelisted
www.download.windowsupdate.com
  • 8.253.204.121
  • 67.26.83.254
  • 67.27.233.126
  • 8.248.119.254
  • 67.26.139.254
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

No threats detected
No debug info