Play interactive tourEdit tour

Analysis Report http://csync.loopme.me

Overview

General Information

Sample URL:http://csync.loopme.me
Analysis ID:329311

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • iexplore.exe (PID: 3096 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4852 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3096 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: csync.loopme.meConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: csync.loopme.me
Source: ~DF3C658F349ADA4E7C.TMP.1.drString found in binary or memory: http://csync.loopme.me/
Source: {B6A5DF52-3B75-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: http://csync.loopme.me/Root
Source: classification engineClassification label: unknown0.win@3/13@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF318CC959D73D0E6D.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3096 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3096 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 329311 URL: http://csync.loopme.me Startdate: 10/12/2020 Architecture: WINDOWS Score: 0 5 iexplore.exe 2 61 2->5         started        process3 7 iexplore.exe 38 5->7         started        dnsIp4 10 generic.lb.lm5v.com 116.202.114.114, 49720, 49721, 80 HETZNER-ASDE Germany 7->10 12 csync.loopme.me 7->12

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://csync.loopme.me0%VirustotalBrowse
http://csync.loopme.me0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
generic.lb.lm5v.com0%VirustotalBrowse
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
generic.lb.lm5v.com
116.202.114.114
truefalseunknown
csync.loopme.me
unknown
unknownfalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://csync.loopme.me/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://csync.loopme.me/Root{B6A5DF52-3B75-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        116.202.114.114
        unknownGermany
        24940HETZNER-ASDEfalse

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:329311
        Start date:10.12.2020
        Start time:21:56:26
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 2m 12s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://csync.loopme.me
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:UNKNOWN
        Classification:unknown0.win@3/13@1/1
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • URL browsing timeout or error
        Warnings:
        • Exclude process from analysis (whitelisted): taskhostw.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 13.88.21.125, 104.43.193.48, 88.221.62.148, 51.104.139.180
        • Excluded domains from analysis (whitelisted): e11290.dspg.akamaiedge.net, go.microsoft.com, arc.msn.com.nsatc.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, skypedataprdcolwus15.cloudapp.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net
        Errors:
        • URL not reachable
        No simulations
        No context
        No context
        No context
        No context
        No context
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B6A5DF50-3B75-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):30296
        Entropy (8bit):1.8540322619181613
        Encrypted:false
        SSDEEP:48:IwpGcprIGwpL8G/ap86rGIpcjHGvnZpvjQGoWqp9jGGo4VpmjB+GWkE9jpGW6Evv:rvZQZ+269Wj4tjafjhVMjBcjHj8fj78X
        MD5:93DE3DC06E7B086A82853E81D1C6A08E
        SHA1:A2AF82BF9EF4AAC6E83D94457E825AE3AC26C8F8
        SHA-256:06544018B2AE36DB33F4899F11E471BCFE449D11070C86B04C861A2672E7EAED
        SHA-512:8DB4BA4AB91D4DB2CC486A44D34FB112E529BA2DBA03328E5F4A52D029C3D88FBB9DD0EB75377FA8AB965194C1ADA23A8D6235E62006ACE961C9D74E15C72682
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B6A5DF52-3B75-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):24156
        Entropy (8bit):1.6241384765796907
        Encrypted:false
        SSDEEP:48:Iw00Gcpr1GwpaZG4pQ9GrapbSkrGQpBMUGHHpcqoXsTGUp8mGzYpm15YGopq/hYM:rbZfQ76dBSkFjML2qokWKMHYgwg
        MD5:295521BFF46B5766B20C4C08267B4C99
        SHA1:93686E074CD495BA5B83C32254EA0B0BCA751337
        SHA-256:FF49225E7174027B72D142CB5D45AB83EC6959D63ABCF53DE6F4975968B77903
        SHA-512:717A49BEF90300E791927AF0C33346E3851732567E820D7D8042D51EF1B345608FBC9281E4D16BCC8B9BFCD3F2C750741B51A96DBC9794F70898E7BD26BE1929
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B6A5DF53-3B75-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):16984
        Entropy (8bit):1.5643581872727266
        Encrypted:false
        SSDEEP:48:Iw5GcprZGwpaoG4pQEGrapbS5rGQpK8G7HpREsTGIpG:rfZTQ46SBS5FAXTE4A
        MD5:B207317F5D93800420EE80FC0FA9DCB9
        SHA1:F1FC1F118C373F98C2227325923DEA0F1D632C38
        SHA-256:37CD982E24393BFF288ED7ED51CD40D42EB69E7BDD20AE21E2592779A2782C26
        SHA-512:05CE340C6563901CFF274732BA5AD95D4DFDF3503830F3B40AD4FC4EED441447D6CA62C438166A6825D99AA44DD60861B306C276E40697927F479054A23907DA
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\background_gradient[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
        Category:downloaded
        Size (bytes):453
        Entropy (8bit):5.019973044227213
        Encrypted:false
        SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
        MD5:20F0110ED5E4E0D5384A496E4880139B
        SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
        SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
        SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/background_gradient.jpg
        Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):4720
        Entropy (8bit):5.164796203267696
        Encrypted:false
        SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
        MD5:D65EC06F21C379C87040B83CC1ABAC6B
        SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
        SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
        SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/errorPageStrings.js
        Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\ErrorPageTemplate[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):2168
        Entropy (8bit):5.207912016937144
        Encrypted:false
        SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
        MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
        SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
        SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
        SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
        Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\bullet[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
        Category:downloaded
        Size (bytes):447
        Entropy (8bit):7.304718288205936
        Encrypted:false
        SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
        MD5:26F971D87CA00E23BD2D064524AEF838
        SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
        SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
        SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/bullet.png
        Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):12105
        Entropy (8bit):5.451485481468043
        Encrypted:false
        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
        MD5:9234071287E637F85D721463C488704C
        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
        Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\info_48[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
        Category:downloaded
        Size (bytes):4113
        Entropy (8bit):7.9370830126943375
        Encrypted:false
        SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
        MD5:5565250FCC163AA3A79F0B746416CE69
        SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
        SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
        SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/info_48.png
        Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\navcancl[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):2713
        Entropy (8bit):4.1712007174415895
        Encrypted:false
        SSDEEP:24:r3avxU5hzsIVmVMeLmVMyHf63lboxMCLxvriN6LOAPAnQay78eLx5Tb87nVkEhML:upU0GVeLVGBXvrp4n/1a5TI7Ve/G79KX
        MD5:4BCFE9F8DB04948CDDB5E31FE6A7F984
        SHA1:42464C70FC16F3F361C2419751ACD57D51613CDF
        SHA-256:BEE0439FCF31DE76D6E2D7FD377A24A34AC8763D5BF4114DA5E1663009E24228
        SHA-512:BB0EF3D32310644285F4062AD5F27F30649C04C5A442361A5DBE3672BD8CB585160187070872A31D9F30B70397D81449623510365A371E73BDA580E00EEF0E4E
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/navcancl.htm
        Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html>.... <head>.. <link rel="stylesheet" type="text/css" href="res://ieframe.dll/ErrorPageTemplate.css" />.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.... <title>Navigation Canceled</title>.... <script src="res://ieframe.dll/errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="res://ieframe.dll/httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:navCancelInit(); ">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="res://ieframe.dll/info_48.png" id="infoIcon" alt="Info icon">..
        C:\Users\user\AppData\Local\Temp\~DF318CC959D73D0E6D.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):13029
        Entropy (8bit):0.4807990196821939
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9loyF9loO9lWYCeATCwQwyr2w:kBqoI5PYC3TC92w
        MD5:F6DA78282DF1FD0CC0E96C6ADFA62D7B
        SHA1:3B2DE5E0A04C68A2ED66611A1539647DF6BF58E5
        SHA-256:372E9A800E878C66EA66F12EDCE6FF58FB12254996986C57281533A5A5AC1847
        SHA-512:61BC1FEB399E50FC6D585E65A94CE5ABFB445AC5C2160FBD70666B43FDEA9B2CCAFC8B2D9B1FBDF1AD93A2BD0BEEAD991EB097A9B989FE7AFFE541F163FD0B3C
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\~DF3C658F349ADA4E7C.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):34349
        Entropy (8bit):0.3468655968646334
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw79lwEk9l2N9l2N9l/D:kBqoxKAuvScS+EiIZ1I1U/h5
        MD5:652F492F7D87E8C7F53AEFC5BE2FAD63
        SHA1:9778877A0B403B95EE321A0D39C2AF4203900BE5
        SHA-256:7C35E9078297CD1EFD509C9D47CF465BAC0D120895F1D46EC6D3B0CF4FADDFDC
        SHA-512:7032F4A0E871FE44F02C648334CA29FC9FDAC43ED8514C715D00A663DC2D30B0EFACB3E1AE779259E009DC94102288CA3ACA51843F1FC0F95AE8976C64D74174
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\~DFBA6BCE1E3C27B51D.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):25441
        Entropy (8bit):0.3238696332961443
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAwXg:kBqoxxJhHWSVSEab
        MD5:44406CF3D657BB0D6B5C5FF4EE04FF73
        SHA1:A75910E6F4B28D21315D55CDE530BC02D8F3AFB3
        SHA-256:54559846C66D77DB0C76A1D4D4D5D52A9F436131C427C028F748C332D5EB7FE2
        SHA-512:4E8DFC7B65060E9683E43B484002A7DE37C8421A8FF3719294260D95527FF3E816173DA80A51522CEBDEE972CD0C8132543541F03DE07F8143E0675EBAA70AD3
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        No static file info

        Network Behavior

        Download Network PCAP: filteredfull

        Network Port Distribution

        • Total Packets: 20
        • 80 (HTTP)
        • 53 (DNS)
        TimestampSource PortDest PortSource IPDest IP
        Dec 10, 2020 21:57:15.605088949 CET4972080192.168.2.3116.202.114.114
        Dec 10, 2020 21:57:15.605736971 CET4972180192.168.2.3116.202.114.114
        Dec 10, 2020 21:57:15.627469063 CET8049720116.202.114.114192.168.2.3
        Dec 10, 2020 21:57:15.627626896 CET4972080192.168.2.3116.202.114.114
        Dec 10, 2020 21:57:15.628029108 CET8049721116.202.114.114192.168.2.3
        Dec 10, 2020 21:57:15.628142118 CET4972180192.168.2.3116.202.114.114
        Dec 10, 2020 21:57:15.628855944 CET4972080192.168.2.3116.202.114.114
        Dec 10, 2020 21:57:15.650984049 CET8049720116.202.114.114192.168.2.3
        Dec 10, 2020 21:57:15.654418945 CET8049720116.202.114.114192.168.2.3
        Dec 10, 2020 21:57:15.654500961 CET4972080192.168.2.3116.202.114.114
        TimestampSource PortDest PortSource IPDest IP
        Dec 10, 2020 21:57:09.418765068 CET6010053192.168.2.38.8.8.8
        Dec 10, 2020 21:57:09.451730013 CET53601008.8.8.8192.168.2.3
        Dec 10, 2020 21:57:10.409866095 CET5319553192.168.2.38.8.8.8
        Dec 10, 2020 21:57:10.434272051 CET53531958.8.8.8192.168.2.3
        Dec 10, 2020 21:57:11.572293997 CET5014153192.168.2.38.8.8.8
        Dec 10, 2020 21:57:11.596645117 CET53501418.8.8.8192.168.2.3
        Dec 10, 2020 21:57:12.875602961 CET5302353192.168.2.38.8.8.8
        Dec 10, 2020 21:57:12.900060892 CET53530238.8.8.8192.168.2.3
        Dec 10, 2020 21:57:13.667177916 CET4956353192.168.2.38.8.8.8
        Dec 10, 2020 21:57:13.691607952 CET53495638.8.8.8192.168.2.3
        Dec 10, 2020 21:57:14.450725079 CET5135253192.168.2.38.8.8.8
        Dec 10, 2020 21:57:14.484752893 CET53513528.8.8.8192.168.2.3
        Dec 10, 2020 21:57:14.742130041 CET5934953192.168.2.38.8.8.8
        Dec 10, 2020 21:57:14.766546011 CET53593498.8.8.8192.168.2.3
        Dec 10, 2020 21:57:15.560647964 CET5708453192.168.2.38.8.8.8
        Dec 10, 2020 21:57:15.593636036 CET53570848.8.8.8192.168.2.3
        Dec 10, 2020 21:57:16.050615072 CET5882353192.168.2.38.8.8.8
        Dec 10, 2020 21:57:16.075059891 CET53588238.8.8.8192.168.2.3
        Dec 10, 2020 21:57:17.009074926 CET5756853192.168.2.38.8.8.8
        Dec 10, 2020 21:57:17.041919947 CET53575688.8.8.8192.168.2.3
        Dec 10, 2020 21:57:17.902090073 CET5054053192.168.2.38.8.8.8
        Dec 10, 2020 21:57:17.926407099 CET53505408.8.8.8192.168.2.3
        Dec 10, 2020 21:57:18.856375933 CET5436653192.168.2.38.8.8.8
        Dec 10, 2020 21:57:18.880717039 CET53543668.8.8.8192.168.2.3
        Dec 10, 2020 21:57:19.887326002 CET5303453192.168.2.38.8.8.8
        Dec 10, 2020 21:57:19.911648989 CET53530348.8.8.8192.168.2.3
        Dec 10, 2020 21:57:36.349677086 CET5776253192.168.2.38.8.8.8
        Dec 10, 2020 21:57:36.374238014 CET53577628.8.8.8192.168.2.3
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Dec 10, 2020 21:57:15.560647964 CET192.168.2.38.8.8.80x2d9cStandard query (0)csync.loopme.meA (IP address)IN (0x0001)
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Dec 10, 2020 21:57:15.593636036 CET8.8.8.8192.168.2.30x2d9cNo error (0)csync.loopme.megeneric.lb.lm5v.comCNAME (Canonical name)IN (0x0001)
        Dec 10, 2020 21:57:15.593636036 CET8.8.8.8192.168.2.30x2d9cNo error (0)generic.lb.lm5v.com116.202.114.114A (IP address)IN (0x0001)
        Dec 10, 2020 21:57:15.593636036 CET8.8.8.8192.168.2.30x2d9cNo error (0)generic.lb.lm5v.com116.202.161.117A (IP address)IN (0x0001)
        Dec 10, 2020 21:57:15.593636036 CET8.8.8.8192.168.2.30x2d9cNo error (0)generic.lb.lm5v.com116.202.172.174A (IP address)IN (0x0001)
        • csync.loopme.me
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.349720116.202.114.11480C:\Program Files (x86)\Internet Explorer\iexplore.exe
        TimestampkBytes transferredDirectionData
        Dec 10, 2020 21:57:15.628855944 CET74OUTGET / HTTP/1.1
        Accept: text/html, application/xhtml+xml, image/jxr, */*
        Accept-Language: en-US
        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
        Accept-Encoding: gzip, deflate
        Host: csync.loopme.me
        Connection: Keep-Alive
        Dec 10, 2020 21:57:15.654418945 CET74INHTTP/1.1 204 No Content
        date: Thu, 10 Dec 2020 20:57:15 GMT
        server: _


        Code Manipulations

        Statistics

        CPU Usage

        0102030s020406080100

        Click to jump to process

        Memory Usage

        0102030s0.002040MB

        Click to jump to process

        Behavior

        Click to jump to process

        System Behavior

        Start time:21:57:13
        Start date:10/12/2020
        Path:C:\Program Files\internet explorer\iexplore.exe
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
        Imagebase:0x7ff6d8cc0000
        File size:823560 bytes
        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Start time:21:57:13
        Start date:10/12/2020
        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        Wow64 process (32bit):true
        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3096 CREDAT:17410 /prefetch:2
        Imagebase:0xbe0000
        File size:822536 bytes
        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Disassembly