analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

index.html

Full analysis: https://app.any.run/tasks/11dec7d6-fce0-4c49-b0b9-59dd306ece5f
Verdict: Malicious activity
Analysis date: September 18, 2019, 15:36:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ISO-8859 text, with CRLF, LF line terminators
MD5:

7A7118338E795780D8BA7A8C035D46E3

SHA1:

5C42E0CAE94B2A5D00AE25CA2CA446D5A1695490

SHA256:

FC11837476FB7BD5A3ECF21C341E0F97F4A04A529AA0E7020DE916CF883D82DA

SSDEEP:

192:luewDQpiD4rRrTVaXA9wW6u99BwaVzRbzLNE9pSmkowHnNetViI4/Nu6fpFI:lueYQp2lwn9bnepUoiS4I4/E6f4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3424)
    • Changes internet zones settings

      • iexplore.exe (PID: 3424)
    • Reads internet explorer settings

      • iexplore.exe (PID: 4016)
      • iexplore.exe (PID: 3452)
    • Creates files in the user directory

      • iexplore.exe (PID: 3424)
      • iexplore.exe (PID: 3452)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3452)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3452)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.html | HyperText Markup Language (100)

EXIF

HTML

Title: Qualiseg
viewport: width=device-width, initial-scale=1.0
Description: -
Author: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3424"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\index.htmlC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4016"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3424 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3452"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3424 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
524
Read events
445
Write events
79
Delete events
0

Modification events

(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{2F2B8579-DA2A-11E9-B86F-5254004A04AF}
Value:
0
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(3424) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070900030012000F0025000D00A603
Executable files
0
Suspicious files
2
Text files
62
Unknown types
11

Dropped files

PID
Process
Filename
Type
3424iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3424iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF775B381F5E886845.TMP
MD5:
SHA256:
3452iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:947BE2468A7EF3EC96DB5E79415DC8B6
SHA256:3F3323813B9B6DB4541C1A9CCDC7489418BC81B974B4E796FEA9258C99A2CD0C
3452iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M2P6YD4Z\atalhos[1].csstext
MD5:8FCF095A6E8EDBC6765286D53A2BC65B
SHA256:95537FAE66D824B6B36126F138F50F6B7A343B586B3D4FF9ED292F07003974F7
3452iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\ILTSX0K3\bannerRotator[1].jstext
MD5:643E443989B9E3697FC49517ADEEE9E0
SHA256:81A22A098E38F675D7127CCEBAD600EFA9A7D5D492A7C131945BA79F2328D189
3424iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{2F2B857A-DA2A-11E9-B86F-5254004A04AF}.datbinary
MD5:4E765BDA11493491BB2D9C450F97F1B3
SHA256:730AE03ABABF97C462D0990BA4712AD0BA4374FD8126AE7090F1ECD3EF95CF70
3452iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Z6VG0S21\crypta[1].jstext
MD5:0FF8C733FAD4C473C060FB867F19B0CF
SHA256:6012CFD61D199CDA4C24A83A3B210447E58D7FD86355A4D952ED505DEC9BAA5A
3452iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Z6VG0S21\bimports[1].csstext
MD5:7CBD03C99B74523E269DED9ADDF2F10A
SHA256:84D27379E77C0E2F62D40D97F3924DB1ED0FEE7B2CE2AFB4CE433C4043FAA270
3452iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M2P6YD4Z\universal[1].jstext
MD5:E24D1E5F245F4D20ED5AF717E40A8C02
SHA256:DD16EC9CA8C0C46E119D06E034067D0896F4EB07B40DCA28FEC9660A45CC1BBE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
34
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3452
iexplore.exe
GET
301
104.27.165.30:80
http://statdynamic.com/lib/crypta.js
US
whitelisted
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/js/script.js
BR
malicious
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/css/bootstrap.css
BR
text
124 Kb
malicious
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/
BR
html
4.33 Kb
malicious
GET
200
216.58.208.42:80
http://ajax.googleapis.com/ajax/libs/jqueryui/1.9.2/jquery-ui.min.js
US
text
61.1 Kb
whitelisted
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/css/bimports.css
BR
text
2.93 Kb
malicious
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/css/sidebar-left.css
BR
text
200 b
malicious
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/js/banner/universal.js
BR
text
257 b
malicious
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/css/atalhos.css
BR
text
23.2 Kb
malicious
3452
iexplore.exe
GET
200
177.185.194.166:80
http://www.qualiseg.com.br/js/banner/bannerRotator.js
BR
text
24.9 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
104.27.164.30:445
statdynamic.com
Cloudflare Inc
US
shared
4
System
104.27.165.30:445
statdynamic.com
Cloudflare Inc
US
shared
3452
iexplore.exe
177.185.194.166:80
www.qualiseg.com.br
IPV6 Internet Ltda
BR
malicious
3424
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
104.27.164.30:137
statdynamic.com
Cloudflare Inc
US
shared
3452
iexplore.exe
205.185.208.52:80
code.jquery.com
Highwinds Network Group, Inc.
US
unknown
104.27.165.30:80
statdynamic.com
Cloudflare Inc
US
shared
3452
iexplore.exe
104.27.165.30:443
statdynamic.com
Cloudflare Inc
US
shared
216.58.208.42:80
ajax.googleapis.com
Google Inc.
US
whitelisted
3452
iexplore.exe
216.58.205.234:80
fonts.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
statdynamic.com
  • 104.27.165.30
  • 104.27.164.30
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
www.qualiseg.com.br
  • 177.185.194.166
malicious
html5shim.googlecode.com
  • 173.194.76.82
whitelisted
code.jquery.com
  • 205.185.208.52
whitelisted
ajax.googleapis.com
  • 216.58.208.42
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.74
  • 172.217.22.106
  • 216.58.210.10
  • 172.217.18.106
  • 172.217.23.170
  • 172.217.21.202
  • 172.217.21.234
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.23.138
  • 216.58.206.10
whitelisted
fonts.googleapis.com
  • 216.58.205.234
whitelisted
fonts.gstatic.com
  • 172.217.18.99
whitelisted
www.youtube.com
  • 172.217.22.78
  • 172.217.22.46
  • 172.217.16.142
  • 172.217.16.174
  • 216.58.207.78
  • 216.58.207.46
  • 216.58.206.14
  • 172.217.23.142
  • 172.217.18.14
  • 172.217.22.14
  • 216.58.205.238
  • 172.217.21.206
  • 216.58.210.14
  • 172.217.22.110
whitelisted
connect.facebook.net
  • 185.60.216.19
whitelisted

Threats

PID
Process
Class
Message
3452
iexplore.exe
A Network Trojan was detected
MALWARE [PTsecurity] Coinhive/DeepMiner JavaScript Miner
No debug info