analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://mywebsite.com

Full analysis: https://app.any.run/tasks/43761007-cf27-4800-8466-d5fa4fad152b
Verdict: Malicious activity
Analysis date: August 12, 2022, 19:04:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B751CFC88AC759F9319C128A3D802B51

SHA1:

37844943AF1899757A4280D0D60E5D0FFF900B25

SHA256:

FBD688D0E75721FB81963E86B5F75C0782E99545C364151506095C0E1CAD46C2

SSDEEP:

3:N8GMXT:2Gg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2824)
  • INFO

    • Reads settings of System Certificates

      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2824)
    • Reads the computer name

      • iexplore.exe (PID: 2824)
      • iexplore.exe (PID: 3428)
    • Checks supported languages

      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2824)
    • Changes internet zones settings

      • iexplore.exe (PID: 3428)
    • Application launched itself

      • iexplore.exe (PID: 3428)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2824)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3428"C:\Program Files\Internet Explorer\iexplore.exe" "https://mywebsite.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2824"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3428 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
13 569
Read events
13 462
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
16
Text files
22
Unknown types
13

Dropped files

PID
Process
Filename
Type
2824iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\54386470D9D91053620FC9E24176858Ebinary
MD5:F5ED4F823D7FF904AB2C403983807B10
SHA256:064CBFB07CF0A4956AE54E2140CBFED2F3829CDDB0CCF80D17E5E1E488CE78CF
2824iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:134167E972F9D8F7FDBAACA4D0B2C712
SHA256:D1CD5BF463709E22E0AB093E53B69E1DF9B0753642E54759B3D6101B23FD8403
2824iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\36XKPHN8.txttext
MD5:B2E70DDC2DBB484676EFFAC14071FA01
SHA256:7E39D449D6E1746DB9314D92AF8B6A4783326CC3C6B4A1E8438947D041BFDAED
3428iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:EE87BB11E233C12009CC11725035DBDC
SHA256:D82930A5B051B3C3F1639C24E83BDDF41D5AA66E467A0944D1AC3D59AE6330C5
2824iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:589C442FC7A0C70DCA927115A700D41E
SHA256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
2824iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab3355.tmpcompressed
MD5:589C442FC7A0C70DCA927115A700D41E
SHA256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
2824iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:CFDFD6A7ACFC796AB3B408834C40DEA5
SHA256:1E4AD165ADC206CD158D08E08B9CE73E7940654855ED4BE5D777A9B926BB3B06
2824iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar3356.tmpcat
MD5:7EE994C83F2744D702CBA18693ED1758
SHA256:5DB917AB6DC8A42A43617850DFBE2C7F26A7F810B229B349E9DD2A2D615671D2
3428iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:260F077E1C8702064E9B1AE58DBCDC6B
SHA256:A2A87051E43DB47B64EE8D4A32A7D33C0CB3907FEBAC447267161EC1A204D778
2824iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:9C4D7192CF4F99D721E621DE245F4D07
SHA256:854B253F3E1D4CB6386C8CEFBE2CCD13B867C0D7740203103A151108E7BBCE38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
40
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3428
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2824
iexplore.exe
GET
200
91.195.240.14:80
http://ww16.mywebsite.com/?sub1=20220813-0504-43e4-91da-05353e0b1aa6
DE
compressed
6.98 Kb
suspicious
2824
iexplore.exe
GET
200
142.250.185.132:80
http://www.google.com/adsense/domains/caf.js
US
text
52.0 Kb
whitelisted
2824
iexplore.exe
GET
200
91.195.240.14:80
http://ww16.mywebsite.com/search/tsc.php?200=NDA0NzA1MDc3&21=MTg4LjIxMi4xMzUuMTc2&681=MTY2MDMzMTA4NDFlYTEwOTY4MzMzMGNmNTljNzU2YjgyNDZlZjdlY2Nh&crc=4ffe29c384d8ccb053019cc98613240f8824be18&cv=1
DE
compressed
6.98 Kb
suspicious
3428
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2824
iexplore.exe
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2824
iexplore.exe
GET
200
184.24.77.76:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgSjBnw4COSJjNmAXFKvKvT63w%3D%3D
US
der
503 b
shared
2824
iexplore.exe
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2824
iexplore.exe
GET
200
8.238.176.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?89e6352b961ce4a1
US
compressed
60.2 Kb
whitelisted
2824
iexplore.exe
GET
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQC7KoDMFPzdvBICsqCGvR0X
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3428
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3428
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2824
iexplore.exe
142.250.185.132:80
www.google.com
Google Inc.
US
whitelisted
2824
iexplore.exe
205.234.175.175:80
img.sedoparking.com
CacheNetworks, Inc.
US
suspicious
3428
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2824
iexplore.exe
103.224.182.246:443
mywebsite.com
Trellian Pty. Limited
AU
suspicious
3428
iexplore.exe
13.107.21.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2824
iexplore.exe
184.24.77.76:80
r3.o.lencr.org
Time Warner Cable Internet LLC
US
suspicious
2824
iexplore.exe
8.238.176.254:80
ctldl.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
2824
iexplore.exe
91.195.240.14:80
ww16.mywebsite.com
SEDO GmbH
DE
suspicious

DNS requests

Domain
IP
Reputation
mywebsite.com
  • 103.224.182.246
malicious
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 8.238.176.254
  • 8.249.61.254
  • 8.249.63.254
  • 8.241.45.126
whitelisted
x1.c.lencr.org
  • 96.16.145.230
whitelisted
r3.o.lencr.org
  • 184.24.77.76
  • 184.24.77.72
shared
ww16.mywebsite.com
  • 91.195.240.14
suspicious
www.google.com
  • 142.250.185.132
whitelisted
img.sedoparking.com
  • 205.234.175.175
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

No threats detected
No debug info