URL:

http://logmett.com/freeware/LogMeTT.php

Full analysis: https://app.any.run/tasks/23af2d4a-27d4-4428-934d-4a168a4bb945
Verdict: Malicious activity
Analysis date: April 25, 2022, 06:24:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

143A58AE37D6B77CB26E4ABD612C0350

SHA1:

B7E6A42E9532CFBBD25E6392CAC2FA6A90EC265D

SHA256:

DB40105A8D323D4276EA8942BDF2C4AD9A99CEC5235F4EBA90161480EF92351E

SSDEEP:

3:N1KSKCIoLR00QKL7n:CSZI000Q87

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 960)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2604)
    • Checks supported languages

      • iexplore.exe (PID: 2604)
      • iexplore.exe (PID: 960)
    • Reads the computer name

      • iexplore.exe (PID: 2604)
      • iexplore.exe (PID: 960)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 960)
      • iexplore.exe (PID: 2604)
    • Reads internet explorer settings

      • iexplore.exe (PID: 960)
    • Creates files in the user directory

      • iexplore.exe (PID: 960)
    • Application launched itself

      • iexplore.exe (PID: 2604)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 960)
      • iexplore.exe (PID: 2604)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
960"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2604 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2604"C:\Program Files\Internet Explorer\iexplore.exe" "http://logmett.com/freeware/LogMeTT.php"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
16 592
Read events
16 473
Write events
119
Delete events
0

Modification events

(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
661470816
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30955629
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
961632066
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30955629
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2604) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
11
Text files
29
Unknown types
7

Dropped files

PID
Process
Filename
Type
960iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\caf[1].jstext
MD5:
SHA256:
960iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\KMK3MSRQ.txttext
MD5:
SHA256:
960iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\LogMeTT[1].htmhtml
MD5:
SHA256:
960iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\A99BX7AG.txttext
MD5:
SHA256:
2604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:
SHA256:
2604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
960iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\YXC9VRRD.txttext
MD5:
SHA256:
2604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:
SHA256:
960iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\arrows[1].pngimage
MD5:6DC0BAD9AA452FF871B282DABD47131E
SHA256:3059FBD6CD3550047483DCA4071C93E5CF4CC79CE8BAFC4388166FBC5279644B
2604iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
40
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
960
iexplore.exe
GET
302
103.224.212.223:80
http://logmett.com/freeware/LogMeTT.php
AU
malicious
960
iexplore.exe
GET
200
91.195.240.34:80
http://ww16.logmett.com/freeware/LogMeTT.php?sub1=20220425-1624-48ce-b6cb-fa72e90412c4
DE
compressed
6.98 Kb
unknown
960
iexplore.exe
GET
200
91.195.240.34:80
http://ww16.logmett.com/search/tsc.php?200=MzQ2ODQ1NDM3&21=NDUuNDMuNzEuNzA=&681=MTY1MDg2Nzg4OGU4MGNkZDI0NTc2MWM1YzU3ZjRiMjNkMDZhODEyNzhh&crc=2412009e065912ffe1a52e751366ef7aa8952b26&cv=1
DE
compressed
6.98 Kb
unknown
960
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2604
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
960
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEHquXS%2BaUA73EnirQKFr398%3D
US
der
471 b
whitelisted
960
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
960
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEFBpiRkWWQcXClTQVPWVHTs%3D
US
der
471 b
whitelisted
960
iexplore.exe
GET
200
91.195.240.34:80
http://ww16.logmett.com/search/tsc.php?200=MzQ2ODQ1NDM3&21=NDUuNDMuNzEuNzA=&681=MTY1MDg2NzkxNjVmYzZmNmUwZjhjMmU5YzY4OTQ3YzA2NzE5ZGUzOTEy&crc=14e9c6d9058c3ef13f229c4cbfc294ca53666153&cv=1
DE
compressed
6.42 Kb
unknown
960
iexplore.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCdmHyZTVWPdwrUMsTDPsDC
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
960
iexplore.exe
103.224.212.223:80
logmett.com
Trellian Pty. Limited
AU
unknown
960
iexplore.exe
91.195.240.34:80
ww16.logmett.com
SEDO GmbH
DE
unknown
960
iexplore.exe
142.250.186.36:80
www.google.com
Google Inc.
US
whitelisted
960
iexplore.exe
172.217.23.98:443
partner.googleadservices.com
Google Inc.
US
whitelisted
960
iexplore.exe
142.250.186.36:443
www.google.com
Google Inc.
US
whitelisted
960
iexplore.exe
205.234.175.175:80
img.sedoparking.com
CacheNetworks, Inc.
US
suspicious
2604
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
960
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2604
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2604
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
logmett.com
  • 103.224.212.223
malicious
ww16.logmett.com
  • 91.195.240.34
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
www.google.com
  • 142.250.186.36
malicious
partner.googleadservices.com
  • 172.217.23.98
whitelisted
img.sedoparking.com
  • 205.234.175.175
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
ocsp.pki.goog
  • 142.250.186.67
whitelisted

Threats

No threats detected
No debug info