URL: | https://waaw.to |
Full analysis: | https://app.any.run/tasks/b343ef18-a565-4683-8028-3bc8d651a1f3 |
Verdict: | Malicious activity |
Analysis date: | January 24, 2022, 02:04:45 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MD5: | BE4607C00158636F3ECAD83A2975FB46 |
SHA1: | BEC8CE19A16FBD2E892D9D632302174144B0A9E3 |
SHA256: | D95666F42172762064CA0C2166B84C066041ADE2B9E2D2326007877825E55811 |
SSDEEP: | 3:N8V7Ls:2Js |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1536 | "C:\Program Files\Internet Explorer\iexplore.exe" "https://waaw.to" | C:\Program Files\Internet Explorer\iexplore.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
3096 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1536 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
712 | C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -Embedding | C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe | — | svchost.exe | |||||||||||
User: admin Company: Adobe Integrity Level: MEDIUM Description: Adobe� Flash� Player Installer/Uninstaller 32.0 r0 Version: 32,0,0,453 Modules
|
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30937286 | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30937286 | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
(PID) Process: | (1536) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231 | binary | |
MD5:17A78198119FDE8BF1AA8EF67264259A | SHA256:59FFA7220B6F0CD9D4F41F982A482426440A1D60C3542888BD3011999B7C2070 | |||
1536 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63 | binary | |
MD5:6C53ABB65AD123FA02D4F1587CA1323C | SHA256:366DF65EA14678A7739564D69FE50207BC393C59CBA8E9A992752501E5B194D7 | |||
1536 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63 | der | |
MD5:BDD8C4BA0527B1766D48E701FF5533F8 | SHA256:539C91D15904D126DA94B756C656ACA7D892B74334BE36BDF580081B5EEF90DE | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:9D2132E25B74F59CE05C8E45ED5EF04A | SHA256:FC0010FFA97CA90B004B88C7D781AA205EE5C0BDCAF2E32D6CB8A227E712582C | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | der | |
MD5:494A7483CEAF488A79CB45418E88ECCD | SHA256:9A65904F97742B3D8844EFAFCE7D9E9DA7C1B96A8FDE541E718768AE68293D50 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8F8712BCE78D28F9C5E3E950CD93EADA_94BA1EE559385DB09247581F5A08FD7C | der | |
MD5:17837A73128AE57923433C38E31F0F22 | SHA256:2A157165A8C18CB9FD8CA238D3FBC4B460FDF4AB55C07B6690090CAA4DC75FB8 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8F8712BCE78D28F9C5E3E950CD93EADA_94BA1EE559385DB09247581F5A08FD7C | binary | |
MD5:EDB8CB29D34D8DFBEE6E87144FC79BE8 | SHA256:5B7495C5DFAB491BABBDB5CD7680B59BCB89AB16C50CF5D698B55AA35177C2D3 | |||
1536 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:C32569BF847ACAC84E2F1905CD34C347 | SHA256:3A57C2892DE1D45FF411513F89D7A2E7D7E276B909639478B264D63FD13A8801 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231 | der | |
MD5:9D064BDD6AF318A87161A39CA186072F | SHA256:43675FD8D8D532EB43EDA560B864B32630BB7D2F78B0CB8960EA0D2C3FC67BFB | |||
3096 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\MV1QWARZ.htm | html | |
MD5:E3CE828A73A5AE5EB0893A50C9BF7910 | SHA256:5CF6DDEB471282ECB037B0B2BB8F44450C4B76B4E13676ADD8ACC2733CCE03F1 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3096 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA9bw6F2y3ieICDHiTyBZ7Q%3D | US | der | 1.47 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 101.33.11.29:80 | http://i0.itc.cn/20151009/34b0_dca9af64_6242_1edd_4d43_ed75804abef5_1.jpg | CN | image | 32.7 Kb | suspicious |
3096 | iexplore.exe | GET | 200 | 79.133.177.229:80 | http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSmVYFXwi%2FRq9wx3PKhB8lC%2FFYUyAQUkZ9eMRWuEJ%2BtYMH3wcyqSDQvDCYCEAxG49zVf%2FDNeB%2F3ST0m558%3D | RU | der | 471 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 101.33.11.29:80 | http://i0.itc.cn/20150731/34b0_829956b8_c32a_ae36_64bc_c75ac9fe28bd_1.jpg | CN | image | 60.0 Kb | suspicious |
3096 | iexplore.exe | GET | 200 | 79.133.177.229:80 | http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSmVYFXwi%2FRq9wx3PKhB8lC%2FFYUyAQUkZ9eMRWuEJ%2BtYMH3wcyqSDQvDCYCEAa1OdaeBCsLRxbJ177VTqk%3D | RU | der | 471 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 79.133.177.218:80 | http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAsTYrbuap0%2Blokw8W4gfTk%3D | RU | der | 471 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 79.133.177.229:80 | http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHv1Dj%2BciPJEWH5JNtwL5Y07mRqwQUxBF%2BiECGwkG%2FZfMa4bRTQKOr7H0CEAoOdIQVRTCBrPadS%2Byl%2BJw%3D | RU | der | 471 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 79.133.177.218:80 | http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTRXf%2BqAIajMnZeiQcx27p1CzET2wQUJG%2BRP4mHhw4ywkAY38VM60%2FISTICEAS%2Ba9HMQvYWOI%2Ff8xOfGl8%3D | RU | der | 471 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 79.133.177.229:80 | http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHv1Dj%2BciPJEWH5JNtwL5Y07mRqwQUxBF%2BiECGwkG%2FZfMa4bRTQKOr7H0CEATG1Kc0LXrYXSDbzkAC2zY%3D | RU | der | 471 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | US | der | 1.47 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1536 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
1536 | iexplore.exe | 13.107.21.200:443 | www.bing.com | Microsoft Corporation | US | whitelisted |
— | — | 8.247.210.254:80 | ctldl.windowsupdate.com | Level 3 Communications, Inc. | US | unknown |
3096 | iexplore.exe | 172.67.154.15:443 | waaw.to | — | US | suspicious |
3096 | iexplore.exe | 79.133.177.229:80 | ocsp.dcocsp.cn | SOT LINE Limited Company | RU | malicious |
3096 | iexplore.exe | 163.171.129.134:443 | js.tv.itc.cn | — | US | malicious |
3096 | iexplore.exe | 104.21.4.65:443 | waaw.to | Cloudflare Inc | US | suspicious |
3096 | iexplore.exe | 101.33.11.48:443 | css.tv.itc.cn | — | CN | unknown |
3096 | iexplore.exe | 52.169.16.184:443 | www.56.com | Microsoft Corporation | IE | suspicious |
3096 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
waaw.to |
| malicious |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
www.56.com |
| malicious |
ocsp.dcocsp.cn |
| whitelisted |
s2.56img.com |
| whitelisted |
css.tv.itc.cn |
| whitelisted |
js.tv.itc.cn |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query for .to TLD |
— | — | Potentially Bad Traffic | ET INFO Observed ZeroSSL SSL/TLS Certificate |
— | — | Potentially Bad Traffic | ET INFO Observed ZeroSSL SSL/TLS Certificate |