analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://31.131.27.152/GfYTdq

Full analysis: https://app.any.run/tasks/88228f83-5be0-409d-a884-63663e465c0b
Verdict: Malicious activity
Analysis date: September 19, 2019, 00:28:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

AFF1FA28F5198BF2FC21985A075A67CC

SHA1:

1F3CEB04125927E90D6DEB2F898352736AE02D0D

SHA256:

ECFA95BB40D9DADFC0AAEF1E8888419992DE5E44F68E86D30727C94953D2D3BE

SSDEEP:

3:N1KGbUfxin:CG40n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3760)
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • iexplore.exe (PID: 3424)
      • EXCEL.EXE (PID: 3760)
    • Application launched itself

      • EXCEL.EXE (PID: 3760)
    • Starts Internet Explorer

      • EXCEL.EXE (PID: 3760)
    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3524)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 3424)
      • iexplore.exe (PID: 4040)
      • EXCEL.EXE (PID: 3760)
      • iexplore.exe (PID: 2960)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3524)
      • iexplore.exe (PID: 2668)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 4040)
      • iexplore.exe (PID: 3424)
      • iexplore.exe (PID: 2960)
    • Changes internet zones settings

      • iexplore.exe (PID: 3424)
      • iexplore.exe (PID: 2668)
    • Application launched itself

      • iexplore.exe (PID: 3424)
      • iexplore.exe (PID: 2668)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3760)
      • EXCEL.EXE (PID: 2720)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2960)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2668)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2668)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe excel.exe excel.exe no specs iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3424"C:\Program Files\Internet Explorer\iexplore.exe" "http://31.131.27.152/GfYTdq"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4040"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3424 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3760"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
2720"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Excel
Version:
14.0.6024.1000
2668"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
EXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2960"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2668 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3524C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
Total events
1 998
Read events
1 824
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
54
Unknown types
10

Dropped files

PID
Process
Filename
Type
4040iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFACBBC4BFEA0DFBA1.TMP
MD5:
SHA256:
3760EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRC1AF.tmp.cvr
MD5:
SHA256:
3760EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9U7X1IX2\~$form[1].xlsx
MD5:
SHA256:
3760EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_F8B218DB-F8CE-4D5D-A159-7C475CBC1085.0\E2CA517C.xlsx\:Zone.Identifier:$DATA
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF9C0F0DBC94127512.TMP
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{75A69A2B-DA74-11E9-B86F-5254004A04AF}.dat
MD5:
SHA256:
4040iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txttext
MD5:9DA6CCC78A03DD3A1F5226335F1E1E25
SHA256:A9F7FE39439A2BAEAE5C6C48CD7CBC737339C20A16D919E48103CF1DCA687201
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
25
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4040
iexplore.exe
GET
302
31.131.27.152:80
http://31.131.27.152/GfYTdq
US
unknown
2960
iexplore.exe
GET
301
104.25.33.31:80
http://bountyhive.io/
US
whitelisted
3424
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3424
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4040
iexplore.exe
13.107.42.12:443
jxaj1a.dm.files.1drv.com
Microsoft Corporation
US
suspicious
4040
iexplore.exe
31.131.27.152:80
i3D.net B.V
US
unknown
4040
iexplore.exe
168.235.93.122:443
1drv.ws
RamNode LLC
US
unknown
2960
iexplore.exe
216.58.207.36:443
www.google.com
Google Inc.
US
whitelisted
2960
iexplore.exe
104.20.208.69:443
bitcointalk.org
Cloudflare Inc
US
shared
3760
EXCEL.EXE
216.58.207.36:443
www.google.com
Google Inc.
US
whitelisted
2668
iexplore.exe
216.58.207.36:443
www.google.com
Google Inc.
US
whitelisted
2668
iexplore.exe
104.20.208.69:443
bitcointalk.org
Cloudflare Inc
US
shared
2960
iexplore.exe
104.25.33.31:443
bountyhive.io
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
1drv.ws
  • 168.235.93.122
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
jxaj1a.dm.files.1drv.com
  • 13.107.42.12
whitelisted
www.google.com
  • 216.58.207.36
whitelisted
bitcointalk.org
  • 104.20.208.69
  • 104.20.209.69
suspicious
bountyhive.io
  • 104.25.33.31
  • 104.25.32.31
whitelisted
www.googletagmanager.com
  • 172.217.22.8
whitelisted
www.google-analytics.com
  • 172.217.16.206
whitelisted
www.googleadservices.com
  • 216.58.210.2
whitelisted
fonts.googleapis.com
  • 172.217.16.170
whitelisted

Threats

No threats detected
No debug info