analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/efb5a6aa-ef23-445e-8f5b-dbcadc8413e5
Verdict: Malicious activity
Analysis date: October 20, 2020, 10:09:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines
MD5:

F868F48665331231D6E759C02D213F0D

SHA1:

FBB0ED25C38334F7FB831095482AAC380CC34630

SHA256:

F91A3E408CF18C5D5A2F339A82048B0F499A97C337B3E4B2A1BD32F974997FE6

SSDEEP:

48:0Y+jkkFvWUGDS+7A1yQPgzfrv+D1iXQ7lqvdICdIud0dx:rskguUqS+SwXQ74ldJYx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2540)
      • iexplore.exe (PID: 492)
    • Application launched itself

      • iexplore.exe (PID: 2540)
      • iexplore.exe (PID: 2052)
      • chrome.exe (PID: 2940)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2540)
      • iexplore.exe (PID: 2052)
    • Manual execution by user

      • chrome.exe (PID: 2940)
    • Reads the hosts file

      • chrome.exe (PID: 832)
      • chrome.exe (PID: 2940)
    • Changes internet zones settings

      • iexplore.exe (PID: 2540)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2540)
      • iexplore.exe (PID: 2052)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2052)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2540)
      • iexplore.exe (PID: 2052)
    • Creates files in the user directory

      • iexplore.exe (PID: 2540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

viewport: width=device-width, initial-scale=1
Title: Express Ticketing
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
20
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2540"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2052"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2540 CREDAT:144385 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
492"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2540 CREDAT:333057 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2940"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2844"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6c4aa9d0,0x6c4aa9e0,0x6c4aa9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3704"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2112 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3592"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,13228284732886521480,7439442942856792037,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6939760427131089688 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
832"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,13228284732886521480,7439442942856792037,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=12251983816362361294 --mojo-platform-channel-handle=1596 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2720"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,13228284732886521480,7439442942856792037,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15300558458136349392 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2356"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,13228284732886521480,7439442942856792037,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12852422894286246624 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
Total events
1 773
Read events
1 586
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
45
Text files
84
Unknown types
7

Dropped files

PID
Process
Filename
Type
2540iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2052iexplore.exeC:\Users\admin\AppData\Local\Temp\Cab574C.tmp
MD5:
SHA256:
2052iexplore.exeC:\Users\admin\AppData\Local\Temp\Tar574D.tmp
MD5:
SHA256:
2940chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F8EB786-B7C.pma
MD5:
SHA256:
2052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_82315E7977AD1FD70B1072657822BA2Dder
MD5:00EC9043B0F111980A4AFF2B485C96A0
SHA256:20E699D3ACFB5B6694791DAABF9305C3D4870B52F6A957F2EAA50C0146894C94
2052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cder
MD5:F8BE6DC579360BF3007373D6277F59E1
SHA256:EC1BA6C123241A7C2AD472CDFBA611125255E8DA51D9840AADAA355517773005
2052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_6089BFC652512EDE7E797F0E99446ECAbinary
MD5:FFCBA36431ECB31B61BDADE9B7FDABCF
SHA256:C63ACE1F879A1F8F01C0CB2AA653D667E864074A91AC0C7BFBA2A59D600EEA15
2052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cbinary
MD5:458BF6732C96B17CFC60A27A63C866B0
SHA256:FDE3AC7971BA17D8B9A5F336FB624E22963B64A83D5D1ACAD4DB2ED91FBAAFCB
2052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:DE3062F0A1262611886F003FDED04F78
SHA256:6F139E074022CC79ECEF958C3F7EA77CA016819962F0CEC4B184ACBB13DA4461
2052iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_82315E7977AD1FD70B1072657822BA2Dbinary
MD5:C2981E4C837F045B370A3A628E215A64
SHA256:6F890DCACEE2ABAA34486CE41D8F12A8896A534F62238E29F360211177F7DC3A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
43
DNS requests
32
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2052
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D
US
der
471 b
whitelisted
2052
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
2540
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2052
iexplore.exe
GET
200
172.217.21.195:80
http://crl.pki.goog/gsr2/gsr2.crl
US
der
950 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2052
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2052
iexplore.exe
104.111.216.57:443
www.att.com
Akamai International B.V.
NL
whitelisted
216.58.208.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
206.17.25.188:443
att.inq.com
AT&T Enhanced Network Services
US
unknown
832
chrome.exe
172.217.23.109:443
accounts.google.com
Google Inc.
US
suspicious
2052
iexplore.exe
216.58.208.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2540
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2052
iexplore.exe
206.17.25.188:443
att.inq.com
AT&T Enhanced Network Services
US
unknown
2052
iexplore.exe
172.217.21.195:80
ocsp.pki.goog
Google Inc.
US
whitelisted
832
chrome.exe
172.217.18.163:443
clientservices.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
fonts.googleapis.com
  • 216.58.208.42
whitelisted
www.att.com
  • 104.111.216.57
suspicious
att.inq.com
  • 206.17.25.188
unknown
ocsp.pki.goog
  • 216.58.207.67
  • 172.217.21.195
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
status.geotrust.com
  • 93.184.220.29
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
crl.pki.goog
  • 172.217.21.195
whitelisted
clientservices.googleapis.com
  • 172.217.18.163
whitelisted

Threats

No threats detected
No debug info