| URL: | html-doodle-jump.glitch.me |
| Full analysis: | https://app.any.run/tasks/cd20bda3-3667-4299-8e51-03bda68ab8de |
| Verdict: | Malicious activity |
| Analysis date: | February 26, 2024, 21:03:32 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 98EE42B41FDA71896DD2B31261E2C226 |
| SHA1: | E985CE73FB8CA49F2ABAC80DE3065A8357273ECC |
| SHA256: | EAB29F3FD1EEE9426EFBB6029E569C587F64EDB136E08128BF21C03DE73B83E1 |
| SSDEEP: | 3:UGbIIoIUCgZ9:UGJVen |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3348 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3672 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 3672 | "C:\Program Files\Internet Explorer\iexplore.exe" "html-doodle-jump.glitch.me" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 31090935 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 31090935 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3672) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\css[1].css | text | |
MD5:7A7FD380E4B531408E3C8D61470DF76D | SHA256:C53A317FF52FFBB06850CEBC0632B107D403A79390B4938F6AE6FF43E3E22400 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\4HPL13QO.htm | html | |
MD5:61044F6EEF15BF3492FB7B0D7F85D887 | SHA256:DA39F14009CAE2E859F3703C2A2AF8880262D4A7FEFF8257C9F239971791111F | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\style[1].css | text | |
MD5:6AF720F569155DB0778319CB46DA1C2E | SHA256:5D699FED2AD58A345B35E9E4A2D4E2F067FB98A3019649B6390A1A63CEC3EDD6 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:6F098EC881EE280D6FCD59E5E01EA0D0 | SHA256:B78956C918275CD2D7E7A4F24EE905C1E7B24FDBB0CDF5D272FC471B8ED87CC7 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\main[1].js | text | |
MD5:E7AA772DDC7784858BE7A0BEC205902C | SHA256:AB31494BC2986A5882D391CDD53670B7028A0D2562D9B79A84DCC363A8F6D991 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\Y0BMP[1].png | image | |
MD5:A1227D2ED69A750AF32363A750E04718 | SHA256:AD869D5459F37F95A8907483EC8F1371701C4C1170FA8F18273704478CA483A2 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\LYjYdHv3kUk9BMV96EIswT9DIbW-MIS11zU[1].woff | woff | |
MD5:67CFD9686569AAB00477E3BD3558C883 | SHA256:CC49AA85E77D1063C22D7A8349F5F8186AB08D1CFAEFAA7D54DB1B2B70D91FBA | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E | der | |
MD5:5B9DC51EB6CA5E3EB57730CCCCAC4F46 | SHA256:43DFC1607DB310F03DCF964636F54FF9DBD749B80FF34F5F2D508E0AE8B4B6C8 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D | der | |
MD5:0C4CF2674CF09D47BEF691B59DA1A2B3 | SHA256:6F8041EC74DF39D90A3586E7B5A5FCE202F0188EB372C8D428B6BDE8CEF56DA2 | |||
| 3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\5BBsR[1].png | image | |
MD5:326AD8946B2DACAA5DBBD8FC0DFFE43F | SHA256:25F0C374BA7B58F4FB71E7D97C324E0CED34B313A17653B62A5165EFBC04C440 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3348 | iexplore.exe | GET | 200 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/style.css | unknown | text | 1.83 Kb | unknown |
3348 | iexplore.exe | GET | 301 | 146.75.116.193:80 | http://i.imgur.com/2WEhF.png | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 200 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/main.js | unknown | text | 13.7 Kb | unknown |
3348 | iexplore.exe | GET | 200 | 142.250.186.42:80 | http://fonts.googleapis.com/css?family=Gloria+Hallelujah | unknown | text | 194 b | unknown |
3348 | iexplore.exe | GET | 200 | 142.250.185.67:80 | http://fonts.gstatic.com/s/gloriahallelujah/v21/LYjYdHv3kUk9BMV96EIswT9DIbW-MIS11zU.woff | unknown | binary | 21.1 Kb | unknown |
3348 | iexplore.exe | GET | 304 | 173.222.108.249:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?927e0d673a39dd41 | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 301 | 146.75.116.193:80 | http://i.imgur.com/Y0BMP.png | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 200 | 52.3.79.93:80 | http://html-doodle-jump.glitch.me/ | unknown | html | 1.42 Kb | unknown |
3348 | iexplore.exe | GET | 301 | 146.75.116.193:80 | http://i.imgur.com/5BBsR.png | unknown | — | — | unknown |
3348 | iexplore.exe | GET | 200 | 104.18.38.233:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D | unknown | binary | 1.42 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3348 | iexplore.exe | 52.3.79.93:80 | html-doodle-jump.glitch.me | AMAZON-AES | US | unknown |
3348 | iexplore.exe | 146.75.116.193:80 | i.imgur.com | FASTLY | US | unknown |
3348 | iexplore.exe | 146.75.116.193:443 | i.imgur.com | FASTLY | US | unknown |
3348 | iexplore.exe | 142.250.186.42:80 | fonts.googleapis.com | GOOGLE | US | whitelisted |
3348 | iexplore.exe | 173.222.108.249:80 | ctldl.windowsupdate.com | Akamai International B.V. | CH | unknown |
3348 | iexplore.exe | 142.250.185.67:80 | fonts.gstatic.com | GOOGLE | US | whitelisted |
3348 | iexplore.exe | 104.18.38.233:80 | ocsp.comodoca.com | CLOUDFLARENET | — | shared |
Domain | IP | Reputation |
|---|---|---|
html-doodle-jump.glitch.me |
| unknown |
i.imgur.com |
| shared |
fonts.googleapis.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
ocsp.comodoca.com |
| whitelisted |
ocsp.usertrust.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Misc activity | ET INFO DNS Query to Online Application Hosting Domain (glitch .me) |
1080 | svchost.exe | Possible Social Engineering Attempted | ET HUNTING Suspicious Glitch Hosted DNS Request - Possible Phishing Landing |
3348 | iexplore.exe | Possible Social Engineering Attempted | ET HUNTING Suspicious Glitch Hosted GET Request - Possible Phishing Landing |