URL: | http://ruzudu.rocks/windows-10-safe-mode-cmd-prompt |
Full analysis: | https://app.any.run/tasks/cfe61292-77a4-41d8-bb37-e302a707b384 |
Verdict: | Malicious activity |
Analysis date: | December 06, 2019, 19:39:51 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MD5: | EF9CF00935F1B92CAFAC8BC17141ADD5 |
SHA1: | 308B05128E113B675DF91F686372415D3B88A37A |
SHA256: | F557C2282051CFC4FC8D357AEF1EE287E0D3EAC9ECCF4D6361C7387E1C50C441 |
SSDEEP: | 3:N1KML8XaSBiWqtxAIfBIVfn:CMAKIifQtVfn |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2148 | "C:\Program Files\Internet Explorer\iexplore.exe" "http://ruzudu.rocks/windows-10-safe-mode-cmd-prompt" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3756 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2148 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 8.00.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\ZHCTSR4I\windows-10-safe-mode-cmd-prompt[1].txt | — | |
MD5:— | SHA256:— | |||
2148 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
2148 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat | dat | |
MD5:D4B2A7827D8DEA7DAF514B5223F2DDE3 | SHA256:996F8489DF0A08D35AAD039D959D67244EFF7853C203A9E9D7580DAA3E3D2B9B | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019120620191207\index.dat | dat | |
MD5:8A4A8608692763A80019FABEC7B3A5EA | SHA256:37A71C2FBB1FAD16A732390A075184769AE7CB8AB3E8703594C4BCA3B5B3139C | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\06E38NN5\checkprize-online1_life[1].htm | html | |
MD5:086B5305E88D11844CB64F7360727072 | SHA256:5E9DBCFC8AEDB6245DC28A3EEE96A55EE27E0E91656E5914309E1EDBB34C088E | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat | dat | |
MD5:C9DFD12892A66338294C7A4479C68AD3 | SHA256:839EECBD9B50A7F0DEC552B516FD270045D487C3B4CCDA8CCF36F2E56BFCB38C | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.dat | dat | |
MD5:39D7A13E76F731A79BBD82825F8DE0D5 | SHA256:7334D7553D5E2172B9069E22D2F73583BC6F51F35746114202FC904B3706C400 | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UK3W67L7\iframe[1].htm | html | |
MD5:CE17C782D3B48205D86AEEBE4257F3C9 | SHA256:3D61325F5BB31AA9D2D936555F96CA870FCBD350B777DF000711B2F37C873D8B | |||
3756 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\ZHCTSR4I\windows-10-safe-mode-cmd-prompt[1].htm | html | |
MD5:6B8BE27F4567A904426E9F6445C93DD4 | SHA256:BC32C3F437DAACA845A02B3001D8F1916C832EE0A8A8E77F9645DA37C5D3DB4E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3756 | iexplore.exe | GET | 200 | 104.24.107.97:80 | http://ruzudu.rocks/windows-10-safe-mode-cmd-prompt | US | html | 939 b | suspicious |
3756 | iexplore.exe | POST | 302 | 69.195.139.114:80 | http://yatds.com/in.cgi?11¶meter=windows+10+safe+mode+cmd+prompt&se=&src=oem1 | US | html | 244 b | whitelisted |
3756 | iexplore.exe | GET | 301 | 45.63.41.184:80 | http://checkprize-online1.life/?u=ydk8kwf&o=2q3alcu&t=oem1 | NL | html | 185 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2148 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3756 | iexplore.exe | 45.63.41.184:443 | checkprize-online1.life | Choopa, LLC | NL | suspicious |
3756 | iexplore.exe | 104.24.107.97:80 | ruzudu.rocks | Cloudflare Inc | US | shared |
3756 | iexplore.exe | 45.63.41.184:80 | checkprize-online1.life | Choopa, LLC | NL | suspicious |
3756 | iexplore.exe | 69.195.139.114:80 | yatds.com | Joe's Datacenter, LLC | US | suspicious |
2148 | iexplore.exe | 45.63.41.184:443 | checkprize-online1.life | Choopa, LLC | NL | suspicious |
Domain | IP | Reputation |
---|---|---|
ruzudu.rocks |
| suspicious |
www.bing.com |
| whitelisted |
yatds.com |
| whitelisted |
checkprize-online1.life |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .life TLD |
3756 | iexplore.exe | Potentially Bad Traffic | ET CURRENT_EVENTS TDS Sutra - request in.cgi |
3756 | iexplore.exe | Potentially Bad Traffic | ET INFO HTTP Request to Suspicious *.life Domain |
3756 | iexplore.exe | Potentially Bad Traffic | ET CURRENT_EVENTS TDS Sutra - redirect received |