analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://us.shein.com

Full analysis: https://app.any.run/tasks/9ced4ccb-518e-4a6b-9783-c359c770487f
Verdict: Malicious activity
Analysis date: January 14, 2022, 20:32:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

83F4D0377662BB6D2833E8D25D7BD2A5

SHA1:

CC5B64A5056DB683FE725C3897BA19320690FC4B

SHA256:

F0C765840FA55812B0C205EA22848C955536C6581BD216D59E6AB14F7240937B

SSDEEP:

3:N8OKn:2Bn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 560)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 560)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 560)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 560)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2252)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2252)
      • iexplore.exe (PID: 3004)
    • Reads CPU info

      • iexplore.exe (PID: 2252)
    • Checks supported languages

      • iexplore.exe (PID: 3004)
      • iexplore.exe (PID: 2252)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2252)
      • iexplore.exe (PID: 3004)
    • Changes internet zones settings

      • iexplore.exe (PID: 3004)
    • Application launched itself

      • iexplore.exe (PID: 3004)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3004)
      • iexplore.exe (PID: 2252)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2252)
    • Creates files in the user directory

      • iexplore.exe (PID: 2252)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3004"C:\Program Files\Internet Explorer\iexplore.exe" "https://us.shein.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2252"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3004 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
560C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
18 263
Read events
17 901
Write events
362
Delete events
0

Modification events

(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30935429
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30935429
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3004) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
49
Text files
263
Unknown types
50

Dropped files

PID
Process
Filename
Type
3004iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8Fbinary
MD5:F5FE7F249F0339F16CAC660B2E796609
SHA256:8A4C093F2D517FD08007028C24EEE050428D7D390AABA735FF48799921B36644
3004iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:4CE3EBBC54BF47D856F19F1BDFD546BD
SHA256:03887A592E96C10969759D00F7E8E58A8323DE635FA9946B111CE1CF3ABC6D76
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\WS6888UT.txttext
MD5:70D559EF9E1DFF24150D987B88FE5E77
SHA256:A3C10712BF5D806A9717BCE79A373966B0D30B0AB2F75E8C83E7654674DAB1DA
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\02WM20KL.txttext
MD5:83AD3CF4CB8CD2D687AF9C9E02153346
SHA256:0A7D9B9535864EEFD7F91E1D567EF6F5230FFEB9F0083F4E656A0CAF4B926FCC
2252iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6binary
MD5:6518C2089A7C0ECC3CB50A380F814B3D
SHA256:498344C1EEC747DAD1D38331651D86DA32C535A36107DA9FB2AC26195F63E7DD
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\MIJJ48NI.txttext
MD5:2CB53A1330215EE7AFA92B99E3F4FDEC
SHA256:40A54F19DD509F9A33D39BB28758C43DC85BF0D70EE75B3727B51B79F7BA4DC2
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\JBRLR9CF.txttext
MD5:C80D89DE8C7D4012935FA6DF0A6D6B2E
SHA256:0AB21B076E876886E72A59511B65F7F8EE5232226C0BF454D332EA4EF6C3714D
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\UTT8Q6XI.txttext
MD5:B5F972FC92A8BA0A02A3CBC5D0FE4FA9
SHA256:C6A15FE0477E1CE5119F85600D8E51EE54F5C3E208FC83B19349432B67A618B6
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\WND13P1J.txttext
MD5:682F53E38E24D5E1DBB56FD481717A66
SHA256:976CBC50BE9F356D2EBE93016A15AD709478AD8D1DE31D52DC7A2A7AF3DD7B1D
2252iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\PJ5445VA.txttext
MD5:543674D2FC868D8D73139E3A1069C1AA
SHA256:8833672C29493860D40A6F275FE793B5764C8B8E96C808EA6BCF8780757D934C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
178
DNS requests
65
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2252
iexplore.exe
GET
52.222.250.185:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
shared
2252
iexplore.exe
GET
142.250.185.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
whitelisted
2252
iexplore.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCCwQAAAAAAURO8EJH
US
der
1.41 Kb
whitelisted
3004
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.68 Kb
whitelisted
2252
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQChZ1FxYtrdpwoAAAABJ96O
US
der
472 b
whitelisted
2252
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
2252
iexplore.exe
GET
200
192.124.249.22:80
http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
US
der
1.66 Kb
whitelisted
2252
iexplore.exe
GET
104.18.21.226:80
http://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDC7%2Ft%2BUHf3KPGGIMcA%3D%3D
US
whitelisted
2252
iexplore.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCAnDacZA1UWwoAAAABJ9nq
US
der
472 b
whitelisted
2252
iexplore.exe
GET
200
18.66.92.70:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3004
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3004
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2252
iexplore.exe
2.16.186.187:443
us.shein.com
Akamai International B.V.
whitelisted
3004
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2252
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3004
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2252
iexplore.exe
2.16.186.179:443
us.shein.com
Akamai International B.V.
whitelisted
3004
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2252
iexplore.exe
104.20.185.68:443
cdn-apac.onetrust.com
Cloudflare Inc
US
shared
104.20.184.68:443
cdn-apac.onetrust.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
us.shein.com
  • 2.16.186.187
  • 2.16.186.179
  • 2.16.186.233
  • 2.16.186.169
  • 2.16.186.161
  • 2.16.186.122
  • 2.16.186.121
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cdn-apac.onetrust.com
  • 104.20.185.68
  • 104.20.184.68
suspicious
crl3.digicert.com
  • 93.184.220.29
whitelisted
geolocation.onetrust.com
  • 104.20.184.68
  • 104.20.185.68
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info