Loading ...

Play interactive tourEdit tour

Analysis Report http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init+0

Overview

General Information

Sample URL:http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init+0
Analysis ID:356840
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 4340 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5252 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: ~DF32196A06EAF8E73F.TMP.1.dr, {51C4153C-7641-11EB-90E6-ECF4BB82F7E0}.dat.1.drString found in binary or memory: http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init
Source: classification engineClassification label: unknown0.win@3/11@0/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{51C4153A-7641-11EB-90E6-ECF4BB82F7E0}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF4BC1FF4CD54CB25B.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 356840 URL: http://172.18.48.33/securec... Startdate: 23/02/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 1 51 2->5         started        process3 7 iexplore.exe 35 5->7         started        dnsIp4 10 172.18.48.33, 80 ATT-INTERNET4US Reserved 7->10

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init+00%VirustotalBrowse
http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init+00%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init~DF32196A06EAF8E73F.TMP.1.dr, {51C4153C-7641-11EB-90E6-ECF4BB82F7E0}.dat.1.drfalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
172.18.48.33
unknownReserved
7018ATT-INTERNET4USfalse

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:356840
Start date:23.02.2021
Start time:17:39:59
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://172.18.48.33/securecgi-bin/CSUserCGI.exe?Init+0
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.win@3/11@0/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
Show All
  • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 51.11.168.160, 104.42.151.234, 168.61.161.212, 23.211.6.115, 104.43.193.48, 52.255.188.83, 88.221.62.148, 184.30.24.56
  • Excluded domains from analysis (whitelisted): www.bing.com, arc.msn.com.nsatc.net, fs.microsoft.com, skypedataprdcolcus17.cloudapp.net, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net
Errors:
  • URL not reachable

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{51C4153A-7641-11EB-90E6-ECF4BB82F7E0}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.8555915297746206
Encrypted:false
SSDEEP:192:rqZRZf2OWw7twsIifwswE/RzM0w5ZBIwOzDIiusfIilJ/cjX:rW3Olw5ws1wswB0wlIwgIi9Iiw
MD5:C69EAF3EF546C0B7618D71F50DACA428
SHA1:CE5ABC12DC483880ACBDF33C339447404D688F8C
SHA-256:BF42C28CBEEF0F52C78B5C2496C3D5D650A55D4078F8D4F9A927803ECAB7F95B
SHA-512:0949065EAFCCD3BFE6524479C254C8B24AF8796103A252D87B1F0325E86B1F510B4F5C17873DC75623ECFA10DAF3B2A42CB3699FE83D7A9CD90D6059D05C31DE
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{51C4153C-7641-11EB-90E6-ECF4BB82F7E0}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):24220
Entropy (8bit):1.6400770345850646
Encrypted:false
SSDEEP:48:Iw0GcprhGwpahG4pQLGrapbSyhGQpB3KxGHHpc3LiTGUp83fUGzYpm3U/vGopL1V:roZ7Qz6/BSqjh2OWoMUF1K1g
MD5:8372A11EE437F3AF14C4D3E3601FC8F8
SHA1:2370EB8DFEAD7532EC8599895960B7941BF87C85
SHA-256:95F97C32EB3214507074AD9801C0E94990D6481DDB065C724985D7FB98C1AEF4
SHA-512:962FCC274DDD31C65EBEF480A5F239BCAE538A0C56C8866BD2E596251F446C7A354E7471A7DD2451BE5D1046DD791749BC1AB6054F69997ACE0DB960802CE985
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5B608E5A-7641-11EB-90E6-ECF4BB82F7E0}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.566181236134231
Encrypted:false
SSDEEP:48:IwoGcprRGwpaUG4pQ0GrapbS7GQpKoG7HpRNTGIpG:rcZLQk6CBS1AzTrA
MD5:A17E0DA213D3DF04C5D5D00F2E5AE476
SHA1:E7D90E64AEAD4300F4486834F119E4ED3CE16CF3
SHA-256:D59BCD6D4E2FDB487DB0C2B00222250481C12FE806FDBFDA467F8748157E1327
SHA-512:E59B1D71BE92FBBB57E3AC3230084426E9FB235D64C50487FFB5C3D5769AA3AC7D952204D9FB6D3C7DB4046D6B65E17BF11D94F54DF6917537AF2980052F0AFB
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\NewErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):1612
Entropy (8bit):4.869554560514657
Encrypted:false
SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
MD5:DFEABDE84792228093A5A270352395B6
SHA1:E41258C9576721025926326F76063C2305586F76
SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\dnserror[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2997
Entropy (8bit):4.4885437940628465
Encrypted:false
SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
MD5:2DC61EB461DA1436F5D22BCE51425660
SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005
Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Temp\~DF32196A06EAF8E73F.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):34413
Entropy (8bit):0.3598528319265371
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw3i9lw3y9l23E9l23ka:kBqoxKAuvScS+3l3L3p3Y3UI3Up1tUpu
MD5:AFE99178DF66BED71EE775595BD0D626
SHA1:D526C916167E621F02906DD8521EC68479976D44
SHA-256:7C4F3683582A60E6345DD8508842D88E41DBCE4DD6530E876D02D0B63960D287
SHA-512:55DE74095824EFEF5742F065C894FFCCFE3C86D5A32DC27195660EA2E274F2C2DF9E7CD9750885772793733A311090B305EEBE13BF8C19A8E21ABBFD914E029E
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF47798191E14DE165.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:modified
Size (bytes):25441
Entropy (8bit):0.4169415459645203
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
MD5:DA161415BA042A1ADA3A402CC83F3CB4
SHA1:225C66F31A109D0A4026AABEB5B242A9DABCCB39
SHA-256:480E52F4E721259EBCF11A307A97B0713D682728F7ECEFED73348D9AB6AF781D
SHA-512:BE7F6FF08F0EA998DEF271D02897E89A9D2E23F2D354C5A68ADCCCFC668337776C858B0AAA9188D4E92FA665AE508139F877581744A49775A5CB0693BDB19D56
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF4BC1FF4CD54CB25B.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.4829930737800872
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9loi9loS9lWEn/3dT1TxdTR:kBqoINLEn/NTNTR
MD5:C6970E281D4CF0EE761FC2AFD07D35CF
SHA1:5780CB2EB9C14DC8DF09E754C7F4EDBFACC7D8AF
SHA-256:7A2C44F7EED1BD5F089BCB465A309B02345BBFF9E38E591C3D6B5AFF446B3BF3
SHA-512:92103EE65730ECBE3EE485662FA6A87A0725712CC1472FD47A7EF0EC4425B185CF3B845EC2270316AC54FDA38A35ED6CC5027D3CD18D3F48389B79ADEAACB082
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Feb 23, 2021 17:40:51.029531956 CET4971380192.168.2.7172.18.48.33
Feb 23, 2021 17:40:52.050256968 CET4971380192.168.2.7172.18.48.33
Feb 23, 2021 17:40:54.050487995 CET4971380192.168.2.7172.18.48.33

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Feb 23, 2021 17:40:40.190876961 CET5856253192.168.2.78.8.8.8
Feb 23, 2021 17:40:40.228960991 CET5659053192.168.2.78.8.8.8
Feb 23, 2021 17:40:40.242304087 CET53585628.8.8.8192.168.2.7
Feb 23, 2021 17:40:40.277715921 CET53565908.8.8.8192.168.2.7
Feb 23, 2021 17:40:41.436050892 CET6050153192.168.2.78.8.8.8
Feb 23, 2021 17:40:41.484713078 CET53605018.8.8.8192.168.2.7
Feb 23, 2021 17:40:42.559184074 CET5377553192.168.2.78.8.8.8
Feb 23, 2021 17:40:42.613943100 CET53537758.8.8.8192.168.2.7
Feb 23, 2021 17:40:43.172641039 CET5183753192.168.2.78.8.8.8
Feb 23, 2021 17:40:43.231136084 CET53518378.8.8.8192.168.2.7
Feb 23, 2021 17:40:43.660368919 CET5541153192.168.2.78.8.8.8
Feb 23, 2021 17:40:43.709187984 CET53554118.8.8.8192.168.2.7
Feb 23, 2021 17:40:44.767929077 CET6366853192.168.2.78.8.8.8
Feb 23, 2021 17:40:44.830323935 CET53636688.8.8.8192.168.2.7
Feb 23, 2021 17:40:46.021275997 CET5464053192.168.2.78.8.8.8
Feb 23, 2021 17:40:46.069896936 CET53546408.8.8.8192.168.2.7
Feb 23, 2021 17:40:47.062922955 CET5873953192.168.2.78.8.8.8
Feb 23, 2021 17:40:47.111527920 CET53587398.8.8.8192.168.2.7
Feb 23, 2021 17:40:48.051738024 CET6033853192.168.2.78.8.8.8
Feb 23, 2021 17:40:48.100378036 CET53603388.8.8.8192.168.2.7
Feb 23, 2021 17:40:48.863358974 CET5871753192.168.2.78.8.8.8
Feb 23, 2021 17:40:48.912058115 CET53587178.8.8.8192.168.2.7
Feb 23, 2021 17:40:49.791820049 CET5976253192.168.2.78.8.8.8
Feb 23, 2021 17:40:49.855747938 CET53597628.8.8.8192.168.2.7
Feb 23, 2021 17:40:50.073668957 CET5432953192.168.2.78.8.8.8
Feb 23, 2021 17:40:50.122416973 CET53543298.8.8.8192.168.2.7
Feb 23, 2021 17:40:51.289300919 CET5805253192.168.2.78.8.8.8
Feb 23, 2021 17:40:51.338253021 CET53580528.8.8.8192.168.2.7
Feb 23, 2021 17:40:52.592747927 CET5400853192.168.2.78.8.8.8
Feb 23, 2021 17:40:52.641448021 CET53540088.8.8.8192.168.2.7
Feb 23, 2021 17:40:53.845624924 CET5945153192.168.2.78.8.8.8
Feb 23, 2021 17:40:53.897136927 CET53594518.8.8.8192.168.2.7
Feb 23, 2021 17:40:54.997814894 CET5291453192.168.2.78.8.8.8
Feb 23, 2021 17:40:55.054970980 CET53529148.8.8.8192.168.2.7
Feb 23, 2021 17:40:55.848404884 CET6456953192.168.2.78.8.8.8
Feb 23, 2021 17:40:55.898701906 CET53645698.8.8.8192.168.2.7
Feb 23, 2021 17:40:57.166498899 CET5281653192.168.2.78.8.8.8
Feb 23, 2021 17:40:57.218139887 CET53528168.8.8.8192.168.2.7
Feb 23, 2021 17:40:59.138797045 CET5078153192.168.2.78.8.8.8
Feb 23, 2021 17:40:59.198864937 CET53507818.8.8.8192.168.2.7
Feb 23, 2021 17:41:00.157561064 CET5423053192.168.2.78.8.8.8
Feb 23, 2021 17:41:00.209114075 CET53542308.8.8.8192.168.2.7
Feb 23, 2021 17:41:00.952637911 CET5491153192.168.2.78.8.8.8
Feb 23, 2021 17:41:01.003072023 CET53549118.8.8.8192.168.2.7
Feb 23, 2021 17:41:01.935767889 CET4995853192.168.2.78.8.8.8
Feb 23, 2021 17:41:01.984603882 CET53499588.8.8.8192.168.2.7
Feb 23, 2021 17:41:07.605449915 CET5086053192.168.2.78.8.8.8
Feb 23, 2021 17:41:07.657206059 CET53508608.8.8.8192.168.2.7
Feb 23, 2021 17:41:08.497088909 CET5045253192.168.2.78.8.8.8
Feb 23, 2021 17:41:08.545847893 CET53504528.8.8.8192.168.2.7
Feb 23, 2021 17:41:10.153551102 CET5973053192.168.2.78.8.8.8
Feb 23, 2021 17:41:10.212538004 CET53597308.8.8.8192.168.2.7

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

General

Start time:17:40:48
Start date:23/02/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff774b10000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:17:40:49
Start date:23/02/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4340 CREDAT:17410 /prefetch:2
Imagebase:0xdb0000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Reset < >