analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

logan%27s-lobster

Full analysis: https://app.any.run/tasks/1c8170f8-767a-471b-9ec1-2c2b74e3dbe3
Verdict: Malicious activity
Analysis date: November 30, 2020, 05:43:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode text, with very long lines
MD5:

7DB30CE61BB6D2D301C46B1B2AED9F37

SHA1:

456EF299C4649D09D0D0266D11C1CDF8817812E8

SHA256:

CC673A44E9F8E3FB5533C8C1A93CFBC4B7AB3D49FB9241B5E64C08FB14DEA8DA

SSDEEP:

384:ZrIb1rJHL3v6OF6LEevYZkwTIBbTjSTpS:1SF6ggiTDT0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 2500)
      • iexplore.exe (PID: 2516)
      • iexplore.exe (PID: 1012)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2516)
      • iexplore.exe (PID: 1012)
      • iexplore.exe (PID: 2500)
    • Creates files in the user directory

      • iexplore.exe (PID: 1012)
      • iexplore.exe (PID: 2516)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2516)
      • iexplore.exe (PID: 1012)
    • Application launched itself

      • iexplore.exe (PID: 2516)
      • iexplore.exe (PID: 2500)
    • Changes internet zones settings

      • iexplore.exe (PID: 2500)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1012)
      • iexplore.exe (PID: 2516)
      • iexplore.exe (PID: 2500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

msapplicationConfig: https://images.rappi.com/web/rappi_favicon.png
msapplicationTileImage: https://images.rappi.com/web/rappi_favicon.png
rappiWeb: 4.3.4
appleMobileWebAppTitle: Rappi
themeColor: #f75d63
viewport: width=device-width,minimum-scale=1,initial-scale=1,maximum-scale=1,user-scalable=0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2500"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\dcd55229-5db3-49dc-a21d-3228d784f2e4.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2516"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2500 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1012"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2500 CREDAT:144390 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2820"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2500 CREDAT:398593 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
7 267
Read events
7 109
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
72
Text files
18
Unknown types
34

Dropped files

PID
Process
Filename
Type
2500iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2516iexplore.exeC:\Users\admin\AppData\Local\Temp\Cab5136.tmp
MD5:
SHA256:
2516iexplore.exeC:\Users\admin\AppData\Local\Temp\Tar5137.tmp
MD5:
SHA256:
2516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:5ADCB5C1E7A23335CBBC42212BB5285B
SHA256:306257ABE9289261045F2176F8E758EFD9BC3DB200A4F4370D3A7B2A186EF260
2516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62der
MD5:3B7DA84F0CA0E3951FBC1E4E2EB1D83F
SHA256:47617BD0BED9288149A3AE3F40620B217CC8DCF2F31984ABB72CC099D6ECB644
2516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:610614AC5D7CA40D352679BD9E03EB31
SHA256:FC4D07450822F91B4AB9515D08ED699CC0FEA46CD1960689F0D166A08A9BA214
2516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_00822B812F3071D0A5AB02FB7D4F1DF9binary
MD5:8C29A0C1105BF6828FDB180C877BBC25
SHA256:BF3EF903170B4A8797FE76890657D71FAEBD4C0315624A20F9964FD8AABD2675
2516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_00822B812F3071D0A5AB02FB7D4F1DF9der
MD5:462E54352809D1CE9744E4D927EBD72D
SHA256:8468CF4C930B5A0AC464B005C8D16788B9400D6CD06B7DD5349DC6759F997F2B
2516iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:48D7B88F7986388169C9F46BD8D48050
SHA256:679A3247B5F50991C3AEF6F491CD5A5B0C55F11693A886F6A7CFED811F108CC8
2500iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].icoimage
MD5:9FB559A691078558E77D6848202F6541
SHA256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
39
TCP/UDP connections
61
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2516
iexplore.exe
GET
200
13.225.84.42:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2516
iexplore.exe
GET
200
13.225.84.42:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2516
iexplore.exe
GET
200
13.225.84.42:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2516
iexplore.exe
GET
200
13.225.84.42:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2516
iexplore.exe
GET
200
13.225.84.42:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2516
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEFcLuT0XSrlKAgAAAACAVZE%3D
US
der
471 b
whitelisted
2516
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDa2MTpyZrzlQgAAAAAYth4
US
der
472 b
whitelisted
2516
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDliVAU%2F6ZWzwIAAAAAgFX%2B
US
der
472 b
whitelisted
2516
iexplore.exe
GET
200
13.35.253.185:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2516
iexplore.exe
GET
200
13.35.253.185:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2516
iexplore.exe
172.217.18.100:443
www.google.com
Google Inc.
US
whitelisted
2516
iexplore.exe
216.58.207.72:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2516
iexplore.exe
65.9.68.29:443
images.rappi.com
AT&T Services, Inc.
US
malicious
1012
iexplore.exe
65.9.68.29:443
images.rappi.com
AT&T Services, Inc.
US
malicious
1012
iexplore.exe
172.217.18.100:443
www.google.com
Google Inc.
US
whitelisted
65.9.68.29:443
images.rappi.com
AT&T Services, Inc.
US
malicious
142.250.64.74:443
maps.googleapis.com
Google Inc.
US
whitelisted
216.58.207.72:443
www.googletagmanager.com
Google Inc.
US
whitelisted
1012
iexplore.exe
216.58.207.72:443
www.googletagmanager.com
Google Inc.
US
whitelisted
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
maps.googleapis.com
  • 142.250.64.74
whitelisted
images.rappi.com
  • 65.9.68.29
  • 65.9.68.43
  • 65.9.68.18
  • 65.9.68.59
malicious
www.google.com
  • 172.217.18.100
whitelisted
www.googletagmanager.com
  • 216.58.207.72
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
ocsp.pki.goog
  • 172.217.18.99
whitelisted
o.ss2.us
  • 13.225.84.42
  • 13.225.84.66
  • 13.225.84.97
  • 13.225.84.68
whitelisted
ocsp.rootg2.amazontrust.com
  • 13.35.253.185
  • 13.35.253.198
  • 13.35.253.5
  • 13.35.253.148
whitelisted
www.googleadservices.com
  • 172.217.22.34
whitelisted

Threats

No threats detected
No debug info