analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://stand.gg/fh5

Full analysis: https://app.any.run/tasks/1e3b1cf7-19f6-4947-9557-5b893e93e792
Verdict: Malicious activity
Analysis date: November 21, 2021, 07:46:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

BF7BF93F78D7AF3FF5A6E973EEB25DA7

SHA1:

DEC6FD165EB65194072D619E0A81EE5220D7BC7B

SHA256:

E59ED70667D0599AF2C3DA6269B93D8C3CEF3C1BCFB8725EDD576290803137E1

SSDEEP:

3:N8coCNC:2cf4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3196)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 3196)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 3196)
    • Reads the computer name

      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 3196)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1256)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3196)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3196)
      • iexplore.exe (PID: 1256)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1256)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1256)
    • Changes internet zones settings

      • iexplore.exe (PID: 1256)
    • Application launched itself

      • iexplore.exe (PID: 1256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1256"C:\Program Files\Internet Explorer\iexplore.exe" "https://stand.gg/fh5"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3196"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1256 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
17 632
Read events
17 510
Write events
120
Delete events
2

Modification events

(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30924459
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30924459
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1256) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
15
Text files
10
Unknown types
6

Dropped files

PID
Process
Filename
Type
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:07C30F9017E29550CE47A91AD8932332
SHA256:D7922538503A8D7B62955CECB2136F964A315F8BAD8EABCE90621BCABEAAC305
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:3E6F76C49648D35B9A904442F26582F0
SHA256:7692D200CBB6EE9B7C842FB2E807BE1BFF6F2CC81EE4ED9052C7C77D2921B190
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D930C97E18B1E25BB8BC656945456F01der
MD5:8576FFC04669033D3EAE6383DC0299C4
SHA256:9548F6F40BE0FD5CDB2C040691BA9B093870ED793A5BC2F12AB01DF4F6D989AB
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:E57E155795AA5707796DD39BC15C0D44
SHA256:3EDA7DA24A4B72F1BDDCC67E0DB664E7A13CB7704A98B2CFA1C2DAB92712621C
3196iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar6DE4.tmpcat
MD5:D99661D0893A52A0700B8AE68457351A
SHA256:BDD5111162A6FA25682E18FA74E37E676D49CAFCB5B7207E98E5256D1EF0D003
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:5CF39A4DD4F3BC8D74980CBFD9001B1A
SHA256:34C53F92B60DE7B4DF31E683AA5BE82FE1D372F004BD23EDC582082BB4954AF5
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:6385DCE2D0165982A1B7C0731C8F0573
SHA256:7C0B5E0B2DFF8A09EADB8E64012AA8F9FE6BA503DDA409C811B05B5DE41664F0
3196iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\fh5[1].htmhtml
MD5:FD02AE35A4A1C04F06A2E230681CF80E
SHA256:BB03A3712EDA6ACBF5D0E8F1F5CA78B9A9991075C55D2C3977D42AB01C720688
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D930C97E18B1E25BB8BC656945456F01binary
MD5:F9D13D922E98B2C62D7EFEE239F4B301
SHA256:63D6A7CC1E80CF0C4A721EF417779EB88ACC4EECBBBFB81850F1B8B0E11657A9
1256iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:3DADA37ACD124CE5ADBBF85451D842A5
SHA256:B942DC6372680EBF6B13A29FF4F2B7C3B3BB084247B6B963F014C6FE965F43DC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
29
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3196
iexplore.exe
GET
200
92.123.195.107:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgTUZ%2BUd1XQkvkMH7ci8h1O%2FqA%3D%3D
unknown
der
503 b
shared
1256
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1256
iexplore.exe
GET
200
104.89.32.83:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
3196
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
1256
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3196
iexplore.exe
GET
200
23.32.238.201:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?dcabcc5eaca73c2c
US
compressed
59.9 Kb
whitelisted
3196
iexplore.exe
GET
200
23.32.238.201:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?2fea4896c0af74ea
US
compressed
59.9 Kb
whitelisted
1256
iexplore.exe
GET
200
23.32.238.178:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?3466ca03f6fd723d
US
compressed
4.70 Kb
whitelisted
1256
iexplore.exe
GET
200
23.32.238.178:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?6d6ea96f866381f9
US
compressed
4.70 Kb
whitelisted
3196
iexplore.exe
GET
200
23.32.238.201:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c0f40b1caea2e2d4
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3196
iexplore.exe
23.32.238.178:80
ctldl.windowsupdate.com
XO Communications
US
suspicious
1256
iexplore.exe
23.32.238.178:80
ctldl.windowsupdate.com
XO Communications
US
suspicious
3196
iexplore.exe
104.89.32.83:80
x1.c.lencr.org
Akamai Technologies, Inc.
NL
suspicious
1256
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1256
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3196
iexplore.exe
104.21.75.41:443
stand.gg
Cloudflare Inc
US
malicious
3196
iexplore.exe
172.67.212.36:443
stand.gg
US
malicious
3196
iexplore.exe
92.123.195.107:80
r3.o.lencr.org
Akamai International B.V.
suspicious
1256
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3196
iexplore.exe
104.16.88.20:443
cdn.jsdelivr.net
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
stand.gg
  • 104.21.75.41
  • 172.67.212.36
malicious
ctldl.windowsupdate.com
  • 23.32.238.178
  • 23.32.238.201
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
x1.c.lencr.org
  • 104.89.32.83
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r3.o.lencr.org
  • 92.123.195.107
  • 92.123.195.35
shared
cdn.jsdelivr.net
  • 104.16.88.20
  • 104.16.86.20
  • 104.16.89.20
  • 104.16.85.20
  • 104.16.87.20
whitelisted

Threats

No threats detected
No debug info