Analysis Report http://pl.yext.com/plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=posts

Overview

General Information

Sample URL: http://pl.yext.com/plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=posts
Analysis ID: 404278
Infos:

Most interesting Screenshot:

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

No high impact signatures.

Classification

There are no high impact signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: global traffic HTTP traffic detected: GET /plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=posts HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: pl.yext.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: pl.yext.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1User-Agent: AutoItHost: pl.yext.com
Source: msapplication.xml0.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x48c4717b,0x01d74167</date><accdate>0x48c4717b,0x01d74167</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x48c4717b,0x01d74167</date><accdate>0x48c4717b,0x01d74167</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x48cb98a1,0x01d74167</date><accdate>0x48cb98a1,0x01d74167</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x48cb98a1,0x01d74167</date><accdate>0x48cb98a1,0x01d74167</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x48cb98a1,0x01d74167</date><accdate>0x48cb98a1,0x01d74167</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.2.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x48cb98a1,0x01d74167</date><accdate>0x48cb98a1,0x01d74167</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: pl.yext.com
Source: global traffic HTTP traffic detected: HTTP/1.1 503 Service Unavailable Date: Tue, 04 May 2021 19:29:19 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveServer: nginxCache-Control: no-cache
Source: ~DF915A8B709283DF05.TMP.2.dr String found in binary or memory: http://pl.yext.com/plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=posts
Source: {72C0D54A-AD5A-11EB-90E4-ECF4BB862DED}.dat.2.dr String found in binary or memory: http://pl.yext.com/plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=postsRoot
Source: msapplication.xml.2.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.2.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.2.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.2.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.2.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.2.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.2.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.2.dr String found in binary or memory: http://www.youtube.com/
Source: classification engine Classification label: clean0.win@3/16@2/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF45977A94477E6E61.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5892 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5892 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 404278 URL: http://pl.yext.com/plpixel?... Startdate: 04/05/2021 Architecture: WINDOWS Score: 0 11 prod-alb-live-publisher-api-84100441.us-east-1.elb.amazonaws.com 2->11 13 pl.yext.com 2->13 6 iexplore.exe 2 84 2->6         started        process3 process4 8 iexplore.exe 2 33 6->8         started        dnsIp5 15 prod-alb-live-publisher-api-84100441.us-east-1.elb.amazonaws.com 34.199.178.67, 49715, 49716, 49725 AMAZON-AESUS United States 8->15 17 pl.yext.com 8->17
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
34.199.178.67
prod-alb-live-publisher-api-84100441.us-east-1.elb.amazonaws.com United States
14618 AMAZON-AESUS false

Contacted Domains

Name IP Active
prod-alb-live-publisher-api-84100441.us-east-1.elb.amazonaws.com 34.199.178.67 true
pl.yext.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://pl.yext.com/plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=posts false
    high
    http://pl.yext.com/plpixel?pid=jLO3skWo0D&action=impression&businessids=885914&source=posts false
      high
      http://pl.yext.com/favicon.ico false
        high