Loading ...

Play interactive tourEdit tour

Analysis Report https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__http*3A*2Fgo.swoogo.com*2Fls*2Fclick*3Fupn*3D-2Ff1BVIe7QcC7c0cvmlJk4VHmkSUqIMBcG8m9K7tDgSdS43NMcLHL-2Bqly2Hc6E82J7Lp9UCyMmruEVmnHbg7eB-2FsCnjEH3UCP-2F0nWvlZP7z0fnnuuQ6ck6TEk3sLke-2FbMxTBL7hvQa2oW5al2AcFZDNOIyosLJwbACcZIpBRU3SM-3D5JwU_ouWu0yIhewflJA4s1gJnIu23F30L1x3vXzQMQkHO4Ttz8evgGZcOzaok-2BIMqe0lF3Wr0nFDmuqRluK-2FcjR0XLdCendv13gw1k2rk4zOUndxHId2wImVujpJKL-2Fy7htX9-2FGSAsajUCZUNrGEBTV1LWLLfkEurGNCAYdbt3nKW4zRQFEM0LrQidMuIU3Q5P-2FJfG4Y7KHvAVMomp7Tjlm8seWpi-2B08sCkRTjorxDJHvxAPsfHGtQa3XJaK46S2a0kBSK651n8sy6NypNTyuY9oNWhpCE1BtUY3Ui1M1C9avtLQ-3D__*3B!!JBeY3YqGwlyHVImn!8phM5yN06PsPDAuo0-J40TaFPtsxyU_CKhMk5GkVdikZ5fnCZLvWTS03SCcInWEbg6csMMM*24*26data*3D04*7C01*7C*7C639cb75c1b6344cd96f308d8c3a82515*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474474239393262*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3D5vpP54AQwVRGBh2EsmHuGg5GzwG*2FfmEnDxxk2Q*2FZs2o*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!JBeY3YqGwlyHVImn!8g2TNlawYpP05JQUtgGqp7F_-mUbEYJNAUesi5yS9SnFxQpGqubwPIF4EbUjw1iU8Ppj*24*26data*3D04*7C01*7C*7C22f77e095d634b03639008d8c3a93cbf*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474478956757336*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3DsMBnSwvdoLin6R*2BIi84ySrs1XLG*2BXLcDIbuxf0UYhFw*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSoqKioqKioqKioqKiolJSoqKioqKioqKioqJSUqKiolJSUlJSUlJSUlJSUlJSUlJSU!!JBeY3YqGwlyHVImn!6O53TaIarDtYUUpUng0IZ15TwIZlXOotdcExeextLC8LcxdGuluLP2wnROo__xDqTVSN*24

Overview

General Information

Sample URL:https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__http*3A*2Fgo.swoogo.com*2Fls*2Fclick*3Fupn*3D-2Ff1BVIe7QcC7c0cvmlJk4VHmkSUqIMBcG8m9K7tDgSdS43NMcLHL-2Bqly2Hc6E82J7Lp9UCyMmruEVmnHbg7eB-2FsCnjEH3UCP-2F0nWvlZP7z0fnnuuQ6ck6TEk3sLke-2FbMxTBL7hvQa2oW5al2AcFZDNOIyosLJwbACcZIpBRU3SM-3D5JwU_ouWu0yIhewflJA4s1gJnIu23F30L1x3vXzQMQkHO4Ttz8evgGZcOzaok-2BIMqe0lF3Wr0nFDmuqRluK-2FcjR0XLdCendv13gw1k2rk4zOUndxHId2wImVujpJKL-2Fy7htX9-2FGSAsajUCZUNrGEBTV1LWLLfkEurGNCAYdbt3nKW4zRQFEM0LrQidMuIU3Q5P-2FJfG4Y7KHvAVMomp7Tjlm8seWpi-2B08sCkRTjorxDJHvxAPsfHGtQa3XJaK46S2a0kBSK651n8sy6NypNTyuY9oNWhpCE1BtUY3Ui1M1C9avtLQ-3D__*3B!!JBeY3YqGwlyHVImn!8phM5yN06PsPDAuo0-J40TaFPtsxyU_CKhMk5GkVdikZ5fnCZLvWTS03SCcInWEbg6csMMM*24*26data*3D04*7C01*7C*7C639cb75c1b6344cd96f308d8c3a82515*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474474239393262*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3D5vpP54AQwVRGBh2EsmHuGg5GzwG*2FfmEnDxxk2Q*2FZs2o*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!JBeY3YqGwlyHVImn!8g2TNlawYpP05JQUtgGqp7F_-mUbEYJNAUesi5yS9SnFxQpGqubwPIF4EbUjw1iU8Ppj*24*26data*3D04*7C01*7C*7C22f77e095d634b03639008d8c3a93cbf*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474478956757336*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3DsMBnSwvdoLin6R*2BIi84ySrs1XLG*2BXLcDIbuxf0UYhFw*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSoqKioqKioqKioqKiolJSoqKioqKioqKioqJSUqKiolJSUlJSUlJSUlJSUlJSUlJSU!!JBeY3YqGwlyHVImn!6O53TaIarDtYUUpUng0IZ15TwIZlXOotdcExeextLC8LcxdGuluLP2wnROo__xDqTVSN*24
Analysis ID:356214

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 1528 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5160 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1528 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: classification engineClassification label: unknown0.win@3/11@0/0
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF187661408B552385.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1528 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1528 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 356214 URL: https*3A*2F*2Furldefense.co... Startdate: 22/02/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 2 61 2->5         started        process3 7 iexplore.exe 36 5->7         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__http*3A*2Fgo.swoogo.com*2Fls*2Fclick*3Fupn*3D-2Ff1BVIe7QcC7c0cvmlJk4VHmkSUqIMBcG8m9K7tDgSdS43NMcLHL-2Bqly2Hc6E82J7Lp9UCyMmruEVmnHbg7eB-2FsCnjEH3UCP-2F0nWvlZP7z0fnnuuQ6ck6TEk3sLke-2FbMxTBL7hvQa2oW5al2AcFZDNOIyosLJwbACcZIpBRU3SM-3D5JwU_ouWu0yIhewflJA4s1gJnIu23F30L1x3vXzQMQkHO4Ttz8evgGZcOzaok-2BIMqe0lF3Wr0nFDmuqRluK-2FcjR0XLdCendv13gw1k2rk4zOUndxHId2wImVujpJKL-2Fy7htX9-2FGSAsajUCZUNrGEBTV1LWLLfkEurGNCAYdbt3nKW4zRQFEM0LrQidMuIU3Q5P-2FJfG4Y7KHvAVMomp7Tjlm8seWpi-2B08sCkRTjorxDJHvxAPsfHGtQa3XJaK46S2a0kBSK651n8sy6NypNTyuY9oNWhpCE1BtUY3Ui1M1C9avtLQ-3D__*3B!!JBeY3YqGwlyHVImn!8phM5yN06PsPDAuo0-J40TaFPtsxyU_CKhMk5GkVdikZ5fnCZLvWTS03SCcInWEbg6csMMM*24*26data*3D04*7C01*7C*7C639cb75c1b6344cd96f308d8c3a82515*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474474239393262*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3D5vpP54AQwVRGBh2EsmHuGg5GzwG*2FfmEnDxxk2Q*2FZs2o*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!JBeY3YqGwlyHVImn!8g2TNlawYpP05JQUtgGqp7F_-mUbEYJNAUesi5yS9SnFxQpGqubwPIF4EbUjw1iU8Ppj*24*26data*3D04*7C01*7C*7C22f77e095d634b03639008d8c3a93cbf*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474478956757336*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3DsMBnSwvdoLin6R*2BIi84ySrs1XLG*2BXLcDIbuxf0UYhFw*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSoqKioqKioqKioqKiolJSoqKioqKioqKioqJSUqKiolJSUlJSUlJSUlJSUlJSUlJSU!!JBeY3YqGwlyHVImn!6O53TaIarDtYUUpUng0IZ15TwIZlXOotdcExeextLC8LcxdGuluLP2wnROo__xDqTVSN*240%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:356214
Start date:22.02.2021
Start time:19:17:21
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 10s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2Fnam04.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__http*3A*2Fgo.swoogo.com*2Fls*2Fclick*3Fupn*3D-2Ff1BVIe7QcC7c0cvmlJk4VHmkSUqIMBcG8m9K7tDgSdS43NMcLHL-2Bqly2Hc6E82J7Lp9UCyMmruEVmnHbg7eB-2FsCnjEH3UCP-2F0nWvlZP7z0fnnuuQ6ck6TEk3sLke-2FbMxTBL7hvQa2oW5al2AcFZDNOIyosLJwbACcZIpBRU3SM-3D5JwU_ouWu0yIhewflJA4s1gJnIu23F30L1x3vXzQMQkHO4Ttz8evgGZcOzaok-2BIMqe0lF3Wr0nFDmuqRluK-2FcjR0XLdCendv13gw1k2rk4zOUndxHId2wImVujpJKL-2Fy7htX9-2FGSAsajUCZUNrGEBTV1LWLLfkEurGNCAYdbt3nKW4zRQFEM0LrQidMuIU3Q5P-2FJfG4Y7KHvAVMomp7Tjlm8seWpi-2B08sCkRTjorxDJHvxAPsfHGtQa3XJaK46S2a0kBSK651n8sy6NypNTyuY9oNWhpCE1BtUY3Ui1M1C9avtLQ-3D__*3B!!JBeY3YqGwlyHVImn!8phM5yN06PsPDAuo0-J40TaFPtsxyU_CKhMk5GkVdikZ5fnCZLvWTS03SCcInWEbg6csMMM*24*26data*3D04*7C01*7C*7C639cb75c1b6344cd96f308d8c3a82515*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474474239393262*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3D5vpP54AQwVRGBh2EsmHuGg5GzwG*2FfmEnDxxk2Q*2FZs2o*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!JBeY3YqGwlyHVImn!8g2TNlawYpP05JQUtgGqp7F_-mUbEYJNAUesi5yS9SnFxQpGqubwPIF4EbUjw1iU8Ppj*24*26data*3D04*7C01*7C*7C22f77e095d634b03639008d8c3a93cbf*7C9d24ebae3a914331a95ece61d9c89b65*7C0*7C0*7C637474478956757336*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C2000*26sdata*3DsMBnSwvdoLin6R*2BIi84ySrs1XLG*2BXLcDIbuxf0UYhFw*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSoqKioqKioqKioqKiolJSoqKioqKioqKioqJSUqKiolJSUlJSUlJSUlJSUlJSUlJSU!!JBeY3YqGwlyHVImn!6O53TaIarDtYUUpUng0IZ15TwIZlXOotdcExeextLC8LcxdGuluLP2wnROo__xDqTVSN*24
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.win@3/11@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 40.88.32.150, 51.103.5.159, 204.79.197.200, 13.107.21.200, 51.11.168.160, 104.43.193.48, 13.88.21.125, 23.54.113.53, 104.108.39.131, 104.42.151.234
  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, arc.msn.com.nsatc.net, dual-a-0001.a-msedge.net, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, skypedataprdcolcus15.cloudapp.net, e11290.dspg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, go.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net
Errors:
  • URL not reachable

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BF4AD854-7585-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.8562342740946947
Encrypted:false
SSDEEP:48:IwJ7GcprUGwpLVG/ap8f7GIpcfssGvnZpvfsQoGoAqp9fsaGo4xpmfsXbGWOu9f2:rLZsZx2FWk1tkQMfkNxMkBkWkHRfk5MX
MD5:04D22EB33804842EDA280A77E182331A
SHA1:C904FD457811ACD8C41F9534BB903BFA65231EF9
SHA-256:DE820E22277351015AD86ED57C80B43B9645EBA361985EA65AD454C2DD61F516
SHA-512:09CC3A60ECD49DD9BE29DCBEE19DC27E855943C0E3F0A62FCC8BDFC49927C3980A8A4E239F401C94F6846127CF790B3A8DA42BCBE8A7A1DBF2EA1819E617BC9E
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BF4AD856-7585-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):27672
Entropy (8bit):2.1497071111984667
Encrypted:false
SSDEEP:192:rKZtQp63k/j529WDMrGqSSQqlCGidH2Ty2N3A27rodg:r2yE07IUAKqSST4dH2TF1A2t
MD5:CA875236BD334ACB64CAC9045F9BE13D
SHA1:158AF69FA699096D91E83B14E78B203A1EECE108
SHA-256:F63064EC09A280120CD94C43B2C96726369B8CAF78D2477EBBD531E8120BEFA1
SHA-512:E5DD183DA23C70FDB2C3BCDDCC3CB25AF740CF8D6C51EA4BF6A3FD722B2E5F653B5FAD76ADC42737C41BCFC7A6414322978EA1834A3E036BDFFBBD0829034D07
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BF4AD857-7585-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.56543517899439
Encrypted:false
SSDEEP:48:IwtEGcprLvGwpaqG4pQGGrapbSIGQpKKG7HpRC2TGIpG:rtYZLZQK6IBSwAlTTA
MD5:4E9BBA9BF8D9F723045DECAEB571BDEF
SHA1:6FF54AC69D0C2F83DEA29C5FBEAA3B865E06F191
SHA-256:802E64D92C23D51375A921E797B2DF44D473F39CD97732394537B7DF93445CC4
SHA-512:12524F9DD1422E3B894BCEADB4C1D41434805990B1E1A9CFF51BC5E737584D784AF6D422661ABFBFA994AFFEBABEC691AF69A8CDDD04E06B56E2508372CBF4B4
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\NewErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):1612
Entropy (8bit):4.869554560514657
Encrypted:false
SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
MD5:DFEABDE84792228093A5A270352395B6
SHA1:E41258C9576721025926326F76063C2305586F76
SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\dnserror[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2997
Entropy (8bit):4.4885437940628465
Encrypted:false
SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
MD5:2DC61EB461DA1436F5D22BCE51425660
SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0004
Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Temp\~DF187661408B552385.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.48079156542573126
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lof3F9lofV9lWfnshQa/RrhQa4ja4B3Qr3Qq:kBqoIWofoXLX3j
MD5:B55B4C2E9709768194D3EBA4DA1A2B31
SHA1:488D76AB7FDCBDF436F2E4A6DC5A906881633BAD
SHA-256:401C09FEDEDC04B9EB4F246E31D0AAF150565CB03418A93C6FC7BBAAD0E3BDDA
SHA-512:6A14592728FA17D0AF40B8E827C5B85C81864B9EA2661CE7A17B8BFC8A627D92EBF29923351E3E743AA2C55F0539EC30EE43A5143515818E18E4B15FE20B4136
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF1F7ADE26AB426E3F.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):25441
Entropy (8bit):0.2885364929831074
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA7:kBqoxxJhHWSVSEab
MD5:DADD96CBA5212803E79D96649026822C
SHA1:1C28F482115EBB033F748705C8866F688AE011A2
SHA-256:D59C3EAEB997FCEA09D007D5C9492DB5E4521B691A21CD597158EC7A306ECB71
SHA-512:421F48A6D3BBAB84A24464778510BA6EA8C7A22021DBE980AEACCAD0353C8388DFB45CA4DD4AE71C9C4C98A99759AFAEB37545281932F064FBDAF66CEEE4E897
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFEF884E96B66E9930.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):37865
Entropy (8bit):0.811299893817074
Encrypted:false
SSDEEP:192:kBqoxKAuqR+fBjKRPqSSQqlCGidH2Ty2N3A27rg:kBqoxKAuqR+fBjKRPqSST4dH2TF1A2Q
MD5:2AB68228D3548900C3289AE0799D2AEF
SHA1:398E509D63D7E77ABA090DA31531013E191D56A5
SHA-256:34CC0F28ADEF3F41136AD8534A9D9F7625043DA931424A8B5F3B22E69D6606E4
SHA-512:5A910367000EE4C8AC33F0A6997CE2B22CCB70752C271546716014DD450C817E918E1F9349452864CD91FDE15A3AACD724C78AAC2CF8BA7FC92A90B5DC3E74B5
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Feb 22, 2021 19:18:00.560729027 CET6098553192.168.2.38.8.8.8
Feb 22, 2021 19:18:00.609456062 CET53609858.8.8.8192.168.2.3
Feb 22, 2021 19:18:00.892019987 CET5020053192.168.2.38.8.8.8
Feb 22, 2021 19:18:00.940577984 CET53502008.8.8.8192.168.2.3
Feb 22, 2021 19:18:01.379317045 CET5128153192.168.2.38.8.8.8
Feb 22, 2021 19:18:01.447020054 CET53512818.8.8.8192.168.2.3
Feb 22, 2021 19:18:01.528855085 CET4919953192.168.2.38.8.8.8
Feb 22, 2021 19:18:01.567286968 CET5062053192.168.2.38.8.8.8
Feb 22, 2021 19:18:01.580389023 CET53491998.8.8.8192.168.2.3
Feb 22, 2021 19:18:01.618211031 CET53506208.8.8.8192.168.2.3
Feb 22, 2021 19:18:02.281908989 CET6493853192.168.2.38.8.8.8
Feb 22, 2021 19:18:02.333746910 CET53649388.8.8.8192.168.2.3
Feb 22, 2021 19:18:03.207494974 CET6015253192.168.2.38.8.8.8
Feb 22, 2021 19:18:03.261225939 CET53601528.8.8.8192.168.2.3
Feb 22, 2021 19:18:04.211873055 CET5754453192.168.2.38.8.8.8
Feb 22, 2021 19:18:04.270950079 CET53575448.8.8.8192.168.2.3
Feb 22, 2021 19:18:04.345709085 CET5598453192.168.2.38.8.8.8
Feb 22, 2021 19:18:04.397063971 CET53559848.8.8.8192.168.2.3
Feb 22, 2021 19:18:05.606673002 CET6418553192.168.2.38.8.8.8
Feb 22, 2021 19:18:05.655324936 CET53641858.8.8.8192.168.2.3
Feb 22, 2021 19:18:06.555511951 CET6511053192.168.2.38.8.8.8
Feb 22, 2021 19:18:06.606926918 CET53651108.8.8.8192.168.2.3
Feb 22, 2021 19:18:07.590234041 CET5836153192.168.2.38.8.8.8
Feb 22, 2021 19:18:07.638884068 CET53583618.8.8.8192.168.2.3
Feb 22, 2021 19:18:08.048474073 CET6349253192.168.2.38.8.8.8
Feb 22, 2021 19:18:08.108330011 CET53634928.8.8.8192.168.2.3
Feb 22, 2021 19:18:09.325664997 CET6083153192.168.2.38.8.8.8
Feb 22, 2021 19:18:09.374319077 CET53608318.8.8.8192.168.2.3
Feb 22, 2021 19:18:10.338984966 CET6010053192.168.2.38.8.8.8
Feb 22, 2021 19:18:10.388037920 CET53601008.8.8.8192.168.2.3
Feb 22, 2021 19:18:12.922800064 CET5319553192.168.2.38.8.8.8
Feb 22, 2021 19:18:12.971689939 CET53531958.8.8.8192.168.2.3
Feb 22, 2021 19:18:14.909203053 CET5014153192.168.2.38.8.8.8
Feb 22, 2021 19:18:14.960199118 CET53501418.8.8.8192.168.2.3
Feb 22, 2021 19:18:15.897100925 CET5302353192.168.2.38.8.8.8
Feb 22, 2021 19:18:15.945898056 CET53530238.8.8.8192.168.2.3
Feb 22, 2021 19:18:16.848247051 CET4956353192.168.2.38.8.8.8
Feb 22, 2021 19:18:16.904251099 CET53495638.8.8.8192.168.2.3
Feb 22, 2021 19:18:18.035521030 CET5135253192.168.2.38.8.8.8
Feb 22, 2021 19:18:18.088515997 CET53513528.8.8.8192.168.2.3
Feb 22, 2021 19:18:19.076625109 CET5934953192.168.2.38.8.8.8
Feb 22, 2021 19:18:19.125494957 CET53593498.8.8.8192.168.2.3
Feb 22, 2021 19:18:25.615896940 CET5708453192.168.2.38.8.8.8
Feb 22, 2021 19:18:25.664606094 CET53570848.8.8.8192.168.2.3
Feb 22, 2021 19:18:26.557202101 CET5882353192.168.2.38.8.8.8
Feb 22, 2021 19:18:26.606045008 CET53588238.8.8.8192.168.2.3
Feb 22, 2021 19:18:27.479237080 CET5756853192.168.2.38.8.8.8
Feb 22, 2021 19:18:27.527944088 CET53575688.8.8.8192.168.2.3

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

General

Start time:19:18:07
Start date:22/02/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff7a3e10000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:19:18:07
Start date:22/02/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1528 CREDAT:17410 /prefetch:2
Imagebase:0x1b0000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Reset < >