analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://i.imgur.com

Full analysis: https://app.any.run/tasks/d68527fa-7f76-4e97-b6a9-ce4e4a79e629
Verdict: Malicious activity
Analysis date: January 14, 2022, 20:38:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

59775467C9281EFEE326A6DEC25B1BD6

SHA1:

56B2E8BD37E7EDF79AC737802DF41B176705E00E

SHA256:

FC2109DA350819172103938234C42B9E7714976B9E6AD9BA664FED0104A82C0B

SSDEEP:

3:N8RYiT:21T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1820)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3748)
      • iexplore.exe (PID: 1820)
    • Reads the computer name

      • iexplore.exe (PID: 3748)
      • iexplore.exe (PID: 1820)
    • Application launched itself

      • iexplore.exe (PID: 3748)
    • Changes internet zones settings

      • iexplore.exe (PID: 3748)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1820)
      • iexplore.exe (PID: 3748)
    • Creates files in the user directory

      • iexplore.exe (PID: 1820)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1820)
      • iexplore.exe (PID: 3748)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1820)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3748"C:\Program Files\Internet Explorer\iexplore.exe" "https://i.imgur.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\version.dll
1820"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3748 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
18 701
Read events
18 487
Write events
214
Delete events
0

Modification events

(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30935430
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30935430
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
28
Text files
108
Unknown types
31

Dropped files

PID
Process
Filename
Type
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\i1HZxQyb[1].jpgimage
MD5:4EBCEF4F7F95AAA271C4DEBD1F76AD6D
SHA256:6BDF9E9BDED5AE26C6F7BDD7D43174DA8C23BB4A8DC14B8DCD51A8F415D27A4B
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\QLNMLD71.htmhtml
MD5:AA45739CE7340F2A610547CB442ED93A
SHA256:EFC6B6E13F9F0276591F4EAC4400AA7B8A90FD2059897A7332AEDD4D6841302A
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\FTDaYwOb[1].jpgimage
MD5:5A097848BECC7B51A0F1B197E2F0F669
SHA256:F01F603D3533046EA46F5BF08C858EAB4B8EE45CC229A042F1577FE21AC9F3B0
1820iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\B478TYJZ.txttext
MD5:596F7BD5A44325613E17BC42E37F9CEF
SHA256:936024970A2AA4F144738869E28C6F5EF3F1DFA6D57003237DFB04C6A606AEA9
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\DZXCcR6b[1].jpgimage
MD5:C9A25BB507D06B71311F28B5411AFE65
SHA256:17BAAF43BB4AFC7DC253235E624EBFE6A398896CB611622F0E902334D59BC36E
1820iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6binary
MD5:68E4E1B55AE60CCB4EE202807F2142CE
SHA256:5CF7EA72B4B12B472AA1FC1A8AA339BFDDEFAD8D0194FFB851BCC28A76506405
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\H6agTsTb[1].jpgimage
MD5:78925DCA42569A0ACB9D5F74C6F120BA
SHA256:97E7CE364F752CABA2652A0A1F57E9AB947D6E7FB08E07C581CD6EE16C4F4A17
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\s1yHYLjb[1].jpgimage
MD5:97C5AF79E2D64D86A1407E54EC7DE8DF
SHA256:46C227C6D1E4B2DB5B45AE5819DC3B0E63E7DA1808195EA6543D458F30675A67
1820iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\y1rMwHlb[1].jpgimage
MD5:4F97B5C94F8394E6D19FEE3D505888D1
SHA256:0805151E99574A23B8536463076BC26456BB21B840C562B9506FE1E3B5C21687
1820iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6der
MD5:9C129A9FB04E7107688A7BEF828A19DA
SHA256:68C8FADF7E6473C47570C6DF544249E5EC358E716B347FD269A7612512ECCD3F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
95
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1820
iexplore.exe
GET
200
142.250.185.99:80
http://crl.pki.goog/gsr1/gsr1.crl
US
der
1.61 Kb
whitelisted
1820
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3748
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
1820
iexplore.exe
GET
200
142.250.185.99:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
1820
iexplore.exe
GET
200
142.250.185.99:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEG9FXshPqpwWCgAAAAEn3MY%3D
US
der
471 b
whitelisted
1820
iexplore.exe
GET
200
13.225.84.145:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
1820
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
1820
iexplore.exe
GET
200
65.9.62.74:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
1820
iexplore.exe
GET
200
2.16.106.186:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c7e1f7930a058e5f
unknown
compressed
4.70 Kb
whitelisted
1820
iexplore.exe
GET
200
142.250.185.99:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEGmSmALa8169CgAAAAEn3NM%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1820
iexplore.exe
142.250.186.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
1820
iexplore.exe
151.101.112.193:443
i.imgur.com
Fastly
US
malicious
1820
iexplore.exe
151.101.12.193:443
s.imgur.com
Fastly
US
malicious
1820
iexplore.exe
2.16.106.171:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
1820
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1820
iexplore.exe
199.232.192.193:443
imgur.com
US
suspicious
3748
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1820
iexplore.exe
142.250.185.138:443
ajax.googleapis.com
Google Inc.
US
whitelisted
1820
iexplore.exe
142.250.185.99:80
ocsp.pki.goog
Google Inc.
US
whitelisted
1820
iexplore.exe
2.16.106.186:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
i.imgur.com
  • 151.101.112.193
shared
ctldl.windowsupdate.com
  • 2.16.106.171
  • 2.16.106.186
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
imgur.com
  • 199.232.192.193
whitelisted
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
fonts.googleapis.com
  • 142.250.186.42
whitelisted
s.imgur.com
  • 151.101.12.193
malicious
ajax.googleapis.com
  • 142.250.185.138
whitelisted
ocsp.pki.goog
  • 142.250.185.99
whitelisted

Threats

No threats detected
No debug info