| URL: | html-doodle-jump.glitch.me |
| Full analysis: | https://app.any.run/tasks/cd20bda3-3667-4299-8e51-03bda68ab8de |
| Verdict: | Malicious activity |
| Analysis date: | February 26, 2024, 21:03:32 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 98EE42B41FDA71896DD2B31261E2C226 |
| SHA1: | E985CE73FB8CA49F2ABAC80DE3065A8357273ECC |
| SHA256: | EAB29F3FD1EEE9426EFBB6029E569C587F64EDB136E08128BF21C03DE73B83E1 |
| SSDEEP: | 3:UGbIIoIUCgZ9:UGJVen |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3348 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3672 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 3672 | "C:\Program Files\Internet Explorer\iexplore.exe" "html-doodle-jump.glitch.me" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 31090935 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 31090935 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\style[1].css | text | |
MD5:6AF720F569155DB0778319CB46DA1C2E | SHA256:5D699FED2AD58A345B35E9E4A2D4E2F067FB98A3019649B6390A1A63CEC3EDD6 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\css[1].css | text | |
MD5:7A7FD380E4B531408E3C8D61470DF76D | SHA256:C53A317FF52FFBB06850CEBC0632B107D403A79390B4938F6AE6FF43E3E22400 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\LYjYdHv3kUk9BMV96EIswT9DIbW-MIS11zU[1].woff | woff | |
MD5:67CFD9686569AAB00477E3BD3558C883 | SHA256:CC49AA85E77D1063C22D7A8349F5F8186AB08D1CFAEFAA7D54DB1B2B70D91FBA | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\5BBsR[1].png | image | |
MD5:326AD8946B2DACAA5DBBD8FC0DFFE43F | SHA256:25F0C374BA7B58F4FB71E7D97C324E0CED34B313A17653B62A5165EFBC04C440 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D | binary | |
MD5:3D5FE85733776EBD7FE0D8C9577A91D8 | SHA256:F45F9A40E91926878AD488C2EB100F3E55B421FA68A234012DC092B5AA3E0AF2 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\Y0BMP[1].png | image | |
MD5:A1227D2ED69A750AF32363A750E04718 | SHA256:AD869D5459F37F95A8907483EC8F1371701C4C1170FA8F18273704478CA483A2 | |||
| 3672 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A | der | |
MD5:4C14FF980B61031E4673897F9D4A60EE | SHA256:B96ABA61BD9D96365B937B75A90D4DEB45447A0EDC679139DD43618BC21BB13F | |||
| 3672 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].ico | image | |
MD5:DA597791BE3B6E732F0BC8B20E38EE62 | SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 | |||
| 3672 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | image | |
MD5:DA597791BE3B6E732F0BC8B20E38EE62 | SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 | |||
| 3672 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\favicon[1].ico | image | |
MD5:DA597791BE3B6E732F0BC8B20E38EE62 | SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3348 | iexplore.exe | GET | 404 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/assets/js/prefixfree.min.js | unknown | html | 3.59 Kb | unknown |
3348 | iexplore.exe | GET | 200 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/ | unknown | html | 1.42 Kb | unknown |
3348 | iexplore.exe | GET | 301 | 146.75.116.193:80 | http://i.imgur.com/2WEhF.png | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 200 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/main.js | unknown | text | 13.7 Kb | unknown |
3348 | iexplore.exe | GET | 200 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/style.css | unknown | text | 1.83 Kb | unknown |
3348 | iexplore.exe | GET | 200 | 142.250.186.42:80 | http://fonts.googleapis.com/css?family=Gloria+Hallelujah | unknown | text | 194 b | unknown |
3348 | iexplore.exe | GET | 304 | 173.222.108.249:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?927e0d673a39dd41 | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 200 | 142.250.185.67:80 | http://fonts.gstatic.com/s/gloriahallelujah/v21/LYjYdHv3kUk9BMV96EIswT9DIbW-MIS11zU.woff | unknown | binary | 21.1 Kb | unknown |
3348 | iexplore.exe | GET | 301 | 146.75.116.193:80 | http://i.imgur.com/Y0BMP.png | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 301 | 146.75.116.193:80 | http://i.imgur.com/5BBsR.png | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3348 | iexplore.exe | 52.3.79.93:80 | html-doodle-jump.glitch.me | AMAZON-AES | US | unknown |
3348 | iexplore.exe | 146.75.116.193:80 | i.imgur.com | FASTLY | US | unknown |
3348 | iexplore.exe | 146.75.116.193:443 | i.imgur.com | FASTLY | US | unknown |
3348 | iexplore.exe | 142.250.186.42:80 | fonts.googleapis.com | GOOGLE | US | whitelisted |
3348 | iexplore.exe | 173.222.108.249:80 | ctldl.windowsupdate.com | Akamai International B.V. | CH | unknown |
3348 | iexplore.exe | 142.250.185.67:80 | fonts.gstatic.com | GOOGLE | US | whitelisted |
3348 | iexplore.exe | 104.18.38.233:80 | ocsp.comodoca.com | CLOUDFLARENET | — | shared |
Domain | IP | Reputation |
|---|---|---|
html-doodle-jump.glitch.me |
| unknown |
i.imgur.com |
| shared |
fonts.googleapis.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
ocsp.comodoca.com |
| whitelisted |
ocsp.usertrust.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Misc activity | ET INFO DNS Query to Online Application Hosting Domain (glitch .me) |
1080 | svchost.exe | Possible Social Engineering Attempted | ET HUNTING Suspicious Glitch Hosted DNS Request - Possible Phishing Landing |
3348 | iexplore.exe | Possible Social Engineering Attempted | ET HUNTING Suspicious Glitch Hosted GET Request - Possible Phishing Landing |