analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/739a7155-9831-407a-bc01-c3454ffba8f3
Verdict: Malicious activity
Analysis date: October 20, 2020, 09:19:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, UTF-8 Unicode text, with very long lines
MD5:

F0CC7078E97C4284B705D149018EB491

SHA1:

4866BB903E792CEF2E974D99B5E489DF6A5CAEB7

SHA256:

CDE72BA3C4783E30C3072C70A3B6F77B773B423A24841AAA4FFCEBE6129D47A7

SSDEEP:

192:zT/4gdv/eUUFzHbIm5B0aS4VlS0UFJc6VhEDuu5:zb42/apHbLBNS4V40U46y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • dllhost.exe (PID: 1732)
    • Runs injected code in another process

      • iexplore.exe (PID: 1860)
    • Application was dropped or rewritten from another process

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 2920)
      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Loads dropped or rewritten executable

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 2920)
      • uninstall.exe (PID: 1864)
    • Changes settings of System certificates

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Actions looks like stealing of personal data

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Changes the autorun value in the registry

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
  • SUSPICIOUS

    • Creates files in the user directory

      • explorer.exe (PID: 392)
    • Starts Internet Explorer

      • explorer.exe (PID: 392)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 2176)
      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 2920)
      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
      • uninstall.exe (PID: 1864)
    • Reads Internet Cache Settings

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Reads Environment values

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Adds / modifies Windows certificates

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Application launched itself

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 2920)
    • Reads internet explorer settings

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Creates files in the program directory

      • uninstall.exe (PID: 1864)
      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Creates a software uninstall entry

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1860)
      • iexplore.exe (PID: 2132)
      • firefox.exe (PID: 2176)
    • Changes internet zones settings

      • iexplore.exe (PID: 1860)
    • Manual execution by user

      • firefox.exe (PID: 2064)
    • Application launched itself

      • iexplore.exe (PID: 1732)
      • iexplore.exe (PID: 1860)
      • firefox.exe (PID: 2064)
      • firefox.exe (PID: 2176)
    • Reads CPU info

      • firefox.exe (PID: 2176)
    • Creates files in the program directory

      • firefox.exe (PID: 2176)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1732)
    • Creates files in the user directory

      • firefox.exe (PID: 2176)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1860)
      • explorer.exe (PID: 392)
      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1860)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1860)
    • Dropped object may contain Bitcoin addresses

      • FileZilla_3.50.0_win32_sponsored-setup.exe (PID: 1748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.htm/html | HyperText Markup Language with DOCTYPE (80.6)
.html | HyperText Markup Language (19.3)

EXIF

HTML

Description: FileZilla - The free FTP solution for both client and server. Filezilla is open source software distributed free of charge.
Title: FileZilla - The free FTP solution
viewport: width=device-width, initial-scale=0.7
Keywords: FileZilla, ftp, sftp, client, server, open source
ContentType: text/html; charset=utf-8
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
16
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
inject start iexplore.exe dllhost.exe iexplore.exe no specs iexplore.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe firefox.exe firefox.exe explorer.exe filezilla_3.50.0_win32_sponsored-setup.exe filezilla_3.50.0_win32_sponsored-setup.exe uninstall.exe

Process information

PID
CMD
Path
Indicators
Parent process
1860"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\Desktop\index.html.htmC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1732dllhost.exe
svchost.exe
Integrity Level:
UNKNOWN
Exit code:
0
1732"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1860 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2132"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1860 CREDAT:333057 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2064"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\admin\Desktop\index.html.htm"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
2176"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\admin\Desktop\index.html.htmC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
3620"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.0.852972296\864051005" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1172 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
3952"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.3.1715857917\220249879" -childID 1 -isForBrowser -prefsHandle 1684 -prefMapHandle 1680 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1748 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
3144"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.13.1739669723\2120657996" -childID 2 -isForBrowser -prefsHandle 3012 -prefMapHandle 3016 -prefsLen 5996 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3004 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
3968"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.20.1189900881\799604687" -childID 3 -isForBrowser -prefsHandle 3520 -prefMapHandle 3480 -prefsLen 6718 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3516 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Total events
5 783
Read events
5 479
Write events
0
Delete events
0

Modification events

No data
Executable files
35
Suspicious files
234
Text files
824
Unknown types
99

Dropped files

PID
Process
Filename
Type
1860iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1860iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF8687A603BA029104.TMP
MD5:
SHA256:
1860iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF722C89647DC44A1B.TMP
MD5:
SHA256:
1860iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFFB2D170391191F55.TMP
MD5:
SHA256:
1860iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFE272BF059127E5B9.TMP
MD5:
SHA256:
2176firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
2176firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
2176firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
2176firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
MD5:
SHA256:
2176firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
69
DNS requests
136
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1860
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2176
firefox.exe
POST
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
2176
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt
US
text
8 b
whitelisted
1860
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2176
firefox.exe
POST
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
2176
firefox.exe
POST
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
2176
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2176
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2176
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1860
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2176
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
2176
firefox.exe
216.58.206.10:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
1860
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2176
firefox.exe
49.12.121.47:443
forum.filezilla-project.org
IN
suspicious
2176
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2176
firefox.exe
99.86.7.78:443
snippets.cdn.mozilla.net
AT&T Services, Inc.
US
unknown
2176
firefox.exe
99.86.7.101:443
firefox.settings.services.mozilla.com
AT&T Services, Inc.
US
suspicious
2176
firefox.exe
54.148.7.60:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
2176
firefox.exe
34.211.185.195:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown
1860
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
whitelisted
forum.filezilla-project.org
  • 49.12.121.47
suspicious
wiki.filezilla-project.org
  • 49.12.121.47
suspicious
sourceforge.net
  • 216.105.38.13
whitelisted
trac.filezilla-project.org
  • 49.12.121.47
suspicious
lib.filezilla-project.org
  • 49.12.121.47
suspicious
octochess.org
  • 195.66.85.181
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
No debug info