Play interactive tourEdit tour

Analysis Report http://script.crazyegg.com

Overview

General Information

Sample URL:http://script.crazyegg.com
Analysis ID:337211

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • iexplore.exe (PID: 6836 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6880 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6836 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7b016776,0x01d6e554</date><accdate>0x7b016776,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7b016776,0x01d6e554</date><accdate>0x7b016776,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: script.crazyegg.com
Source: ~DF46EFB654B5E801D9.TMP.1.drString found in binary or memory: http://script.crazyegg.com/
Source: {A5BEEA89-5147-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: http://script.crazyegg.com/Root
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: classification engineClassification label: clean0.win@3/15@3/0
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A5BEEA87-5147-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF4EDBDFE8B6FB254.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6836 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6836 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 337211 URL: http://script.crazyegg.com Startdate: 08/01/2021 Architecture: WINDOWS Score: 0 11 www.crazyegg.com 2->11 13 script.crazyegg.com 2->13 6 iexplore.exe 1 73 2->6         started        process3 process4 8 iexplore.exe 2 24 6->8         started        dnsIp5 15 script.crazyegg.com 8->15

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://script.crazyegg.com0%VirustotalBrowse
http://script.crazyegg.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
www.crazyegg.com
52.21.17.103
truefalse
    high
    script.crazyegg.com
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://script.crazyegg.com/false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.wikipedia.com/msapplication.xml6.1.drfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://script.crazyegg.com/~DF46EFB654B5E801D9.TMP.1.drfalse
          high
          http://www.amazon.com/msapplication.xml.1.drfalse
            high
            http://script.crazyegg.com/Root{A5BEEA89-5147-11EB-90EB-ECF4BBEA1588}.dat.1.drfalse
              high
              http://www.nytimes.com/msapplication.xml3.1.drfalse
                high
                http://www.live.com/msapplication.xml2.1.drfalse
                  high
                  http://www.reddit.com/msapplication.xml4.1.drfalse
                    high
                    http://www.twitter.com/msapplication.xml5.1.drfalse
                      high
                      http://www.youtube.com/msapplication.xml7.1.drfalse
                        high
                        No contacted IP infos

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:337211
                        Start date:08.01.2021
                        Start time:01:22:06
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 2m 49s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:browseurl.jbs
                        Sample URL:http://script.crazyegg.com
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:15
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:CLEAN
                        Classification:clean0.win@3/15@3/0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        Warnings:
                        • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 104.43.193.48, 88.221.62.148, 104.19.148.8, 104.19.147.8, 52.255.188.83, 51.104.139.180, 92.122.213.194, 92.122.213.247, 152.199.19.161, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210
                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, script.crazyegg.com.cdn.cloudflare.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, go.microsoft.com, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, ie9comview.vo.msecnd.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, cs9.wpc.v0cdn.net
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A5BEEA87-5147-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):30296
                        Entropy (8bit):1.8499716642978639
                        Encrypted:false
                        SSDEEP:192:r9IZzJZKE2KR9WP+thifYfhzM3ZBnTD/GsfXFfMjX:rOjKcU2+Nbf9K
                        MD5:0D3BB5665A36E7788CA25E28E7911FE6
                        SHA1:743F876B82DE9F485CB986465C1E6E16F4240F2A
                        SHA-256:C1063C90DC48BD8AF0958E5701DC179D191123E84AAD7D9EAA3929BC3C3B7FC8
                        SHA-512:4374912C8E178ACBF4D617F234AE6BBD8E7BED06E7681101C0BBED3555021B2E7BE5B050F403B03FF4E77AAA687B46AAC8FBCA2643436B286D5CDA6B82403264
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{A5BEEA89-5147-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):24164
                        Entropy (8bit):1.6283528067758901
                        Encrypted:false
                        SSDEEP:48:IwD7GcprqGwpaqhG4pQ8TGrapbSdrGQpBRoGHHpcQsTGUp84GzYpmrfYGopSl9jW:rVZyQqz683BSdFjRn2QkWcMjY4Jg
                        MD5:7A5FCE6654BE83C122292B3B1A3EFB7C
                        SHA1:A8B51DD68BEDE648B79FD4805419CED1FA529627
                        SHA-256:CF1211D50A9E449514D072265F79A3760B8E7383CAB8BD3673A2A84F824FF54D
                        SHA-512:AA7494A4FDEAE26D5B8BAFAE36A21318ECB87EFE11C8879D0547EE743DE2B1B7918BEBD3F86D80E1CBDC55CD1F0996DDA366C23B2BBE4D9AF17D2084871BF9A8
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{A5BEEA8A-5147-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):16984
                        Entropy (8bit):1.5645958456832894
                        Encrypted:false
                        SSDEEP:48:IwlGcprZ6GwpafhG4pQNTGrapbS1rGQpK4G7HpRWsTGIpG:r7ZZiQfz6N3BS1FADTW4A
                        MD5:445201520A6A98BD16ED37B44D4FB78F
                        SHA1:2B5A606E03BD0AA67A319D1E2A2D57E815FD2D72
                        SHA-256:F66A6FABB670C4555DE371A35C05B905A2392AEF6428A9D6F11561330BA32BDF
                        SHA-512:2CB31D53C9CB29A2BBC7238FD51F7E2F1D5F69EF1CA448080A1B79D44AA475A3EDCC75B7A8369EFB464FA007FFF7CA110D255F03969F545F2B8E67FDA5EB86AF
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):656
                        Entropy (8bit):5.110542098747094
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxOER1b11nWimI002EtM3MHdNMNxOER1b11nWimI00OYGVbkEtMb:2d6NxOgRbSZHKd6NxOgRbSZ7YLb
                        MD5:C00AAC3BF47E0C00024AB6EEE381ECD0
                        SHA1:5A347D5107707E5A7179205CCC2C3FE57844826C
                        SHA-256:5B258310DF0A7679432F95D45DF64CC8E684E90653E630A9B5B85F31AD26F6E5
                        SHA-512:87833AE2CC31D1D0370A8EEB28F5AA2186124CB8AB31BFC60C3A55E895DED57563C5985FAAB1140E2E9D5742BE2BDCFB6EDB6874FA838EBCE7FFFBBC0351E0D0
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):653
                        Entropy (8bit):5.092140075953097
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxe2kqY1nWimI002EtM3MHdNMNxe2kqY1nWimI00OYGkak6EtMb:2d6NxroSZHKd6NxroSZ7Yza7b
                        MD5:6F8A22D7345EDBE1A885AD3F0EDFA08D
                        SHA1:503A721D173757F9C95C3B316E79B3FA5A977F8D
                        SHA-256:391673B9B0ED609E0549BD89AC1A74131632AF48CE228DD1CA198E788AE6B2F7
                        SHA-512:43C8B0D4A77896420D27B491EF3E094A08B9272D4B324FA5A51F1C9B4C4788CE7CDB4E3E01B2DCEAB293271E3BCD8BAA58AA4F04C2744B31485E9980E1E92729
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x7aff05a7,0x01d6e554</date><accdate>0x7aff05a7,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x7aff05a7,0x01d6e554</date><accdate>0x7aff05a7,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):662
                        Entropy (8bit):5.129364517198806
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxvLR1b11nWimI002EtM3MHdNMNxvLR1b11nWimI00OYGmZEtMb:2d6NxvdRbSZHKd6NxvdRbSZ7Yjb
                        MD5:54B841C2C0AD9FFF723DD4BE7C553473
                        SHA1:37EF5AADB602851C5ED5ED69F90CD52D6BDF1488
                        SHA-256:9EDEA53A45D4E0307C5A846066A82829C0D8C7B1C9052855C39040EA372133E3
                        SHA-512:C4B590508BB7C74A3C1383A455713B2E9113A6FFD2DCF9A7CB962DC05589B6ECBBBB606B78B70E8779F5A87B69AE8992391E2C3CDD6FBEE80373565A72ED20AC
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):647
                        Entropy (8bit):5.109924034777717
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxi6SIS1nWimI002EtM3MHdNMNxi6SIS1nWimI00OYGd5EtMb:2d6NxXrISZHKd6NxXrISZ7YEjb
                        MD5:3A3C3082873F51F874308E52A47BF154
                        SHA1:EE88ADE79FCABDF57C015C826827A86AD8CD7535
                        SHA-256:F20FD19C730AE742AFF2A1A5E3DB7480E69C34D6F344C40A5546C32C8E872BFE
                        SHA-512:FBB91A929BF6330E58367B4A491837CBD93A505EF566FACBC7B23443341F3A17AE590BF1E10E5F654548D6070D21B7127680DC7B52B9ECA2C4E9ABDB9C43305D
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):656
                        Entropy (8bit):5.141181565096405
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxhGwR1b11nWimI002EtM3MHdNMNxhGwR1b11nWimI00OYG8K075EtMb:2d6NxQkRbSZHKd6NxQkRbSZ7YrKajb
                        MD5:4AA29B423E62A973A0EB55D73393F38A
                        SHA1:1A3362DBFE233185C6E27B96AE2A99B6564EDBB2
                        SHA-256:9D719C53B09F239BD2F179CA63EC150C9B8A2121813E8209DFECFA0494CEF362
                        SHA-512:643FDF91BEEDFEA914ECBDE966AEC79F9E8983E4EED4511948E26DA6C659543EEB63062F2DECC6B512E88D24BD4FE9EDC9C73E52B4303EEF9F5F4D71C990575E
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x7b062c2d,0x01d6e554</date><accdate>0x7b062c2d,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):653
                        Entropy (8bit):5.098219346803089
                        Encrypted:false
                        SSDEEP:12:TMHdNMNx0n6SIS1nWimI002EtM3MHdNMNx0n6SIS1nWimI00OYGxEtMb:2d6Nx06rISZHKd6Nx06rISZ7Ygb
                        MD5:FBA6E2557424B89EF5E80AA812A1E959
                        SHA1:BE11D8BC0C054B5F19F1B52BB2695E01195DD2CF
                        SHA-256:1F5DC36828BFD9AD2701D5E58D4C2DD03841A0770C087AECDCC332F22B820AC8
                        SHA-512:A7B2DC740B58D181E9D879812AAFC2324FAE0FF8F8D5EE2A423E73B38CDE269D46D13B777EF7A29FE94965F44ED005D46D9B137923F4C65D0DDEC9395DE2C1E3
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):656
                        Entropy (8bit):5.134089984899133
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxx6SIS1nWimI002EtM3MHdNMNxx6SIS1nWimI00OYG6Kq5EtMb:2d6NxwrISZHKd6NxwrISZ7Yhb
                        MD5:C5BB486CCBC9FAFAB13AB1AECBD447CC
                        SHA1:1BD77197493240B6040EB4C1E831470002B361BC
                        SHA-256:BE93039922E998C8FA6EB1345D3DE328D931B2A59DDF8E0A2B0722AED6D235B9
                        SHA-512:5808A02A0E85EB6AA6C2E6B8035EBBAF89EEF3453B8C6E598E907273C76FA75A1EBF9F5C1909BE71FD9B0366A0AD438D72C1E95BF6974F559C3CA5BA1884CE53
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):659
                        Entropy (8bit):5.1141996100781615
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxcM+1K+11nWimI002EtM3MHdNMNxcM+1K+11nWimI00OYGVEtMb:2d6NxeSZHKd6NxeSZ7Ykb
                        MD5:55AF5098C3395E9A7A355F6DA6B408D6
                        SHA1:870E866CF32FE72671B587D57B09DA5AAF88A7DF
                        SHA-256:99F3B4D0E3A78013DF8D32953C2B6B26C535119C3FADE1B073CA404C8B7F5BF2
                        SHA-512:88F85F08639CEA57CE12A558A6606B986C8E8B444DF1F38571CB0968C99A3302170625B89D4B5329EE987EEAFBF07D31780CCF24EF526E5D6503B12098AACE5D
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7b016776,0x01d6e554</date><accdate>0x7b016776,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x7b016776,0x01d6e554</date><accdate>0x7b016776,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):653
                        Entropy (8bit):5.095262363004954
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxfn6SIS1nWimI002EtM3MHdNMNxfn6SIS1nWimI00OYGe5EtMb:2d6NxyrISZHKd6NxyrISZ7YLjb
                        MD5:5B83702DCF2589B989F05512E1560FF6
                        SHA1:C4B2DA04F4F2151677DA2636C329FB061B1000CF
                        SHA-256:69FF1CCA1CEDF8799AAB81D0363610A7ABB7AA8FC8EA4675B902BDA3BFC00159
                        SHA-512:A8F414B03DA8DC72DEBD874C45C397002B229D98EA51478E6E39A28828A702F971A3EA0491A4BC585C5B55AA05AD5EB58DBD932B6844050BBEE7E26771163009
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x7b03c9e5,0x01d6e554</date><accdate>0x7b03c9e5,0x01d6e554</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Temp\~DF229A1D1C51A1DC8E.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):25441
                        Entropy (8bit):0.27918767598683664
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
                        MD5:AB889A32AB9ACD33E816C2422337C69A
                        SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
                        SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
                        SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
                        Malicious:false
                        Reputation:low
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DF46EFB654B5E801D9.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):34357
                        Entropy (8bit):0.34974903966087534
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwx9lwR9l2P9l2P9l/rp:kBqoxKAuvScS+iEOnrIrsl9jl
                        MD5:5568C58209CC65C2DC12603B842B109C
                        SHA1:862F0D28128F30B57D0425D0493E0620D59ECCE8
                        SHA-256:78C23C3802DBBC867EC5BC74286A1E607509597727CBB5C6196669AB9CF3F889
                        SHA-512:79F2975C24AC5FDAC59E8AED403AD35A702D096C4D0D39F06240568296DB07116A972C3AF8494B052BC410DAF482492CEA2F8B9C5150B8BA3D80BCA3431F182E
                        Malicious:false
                        Reputation:low
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFF4EDBDFE8B6FB254.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):13029
                        Entropy (8bit):0.47414462713581684
                        Encrypted:false
                        SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fR3gJF9l8fR3gL9lTq3gDPJZR+v:c9lLh9lLh9lIn9lIn9loO9lo+9lWkBZw
                        MD5:5E246FF9BE7E1D6A690EF3AD0FC11CEF
                        SHA1:81E5404265D27DE7F465E1D0861146369B867510
                        SHA-256:569FFF9FEC24F934257C0ED4AC277EB46D31E36976A77F9BC3CDFDE7743DD30C
                        SHA-512:2CA38724C459D20660E17A2B2D7A9BEA68F580DE1808F49F116A211BC5EA0D09DAF652E1006D70D2B50818A94FDCD2BBB84A7DCB7AB0009C15AF64385A1CDB6C
                        Malicious:false
                        Reputation:low
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        No static file info

                        Network Behavior

                        Download Network PCAP: filteredfull

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        01/08/21-01:22:55.794400TCP1201ATTACK-RESPONSES 403 Forbidden8049740104.19.148.8192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 8, 2021 01:22:50.290875912 CET5172653192.168.2.48.8.8.8
                        Jan 8, 2021 01:22:50.338745117 CET53517268.8.8.8192.168.2.4
                        Jan 8, 2021 01:22:54.505228996 CET5679453192.168.2.48.8.8.8
                        Jan 8, 2021 01:22:54.563107014 CET53567948.8.8.8192.168.2.4
                        Jan 8, 2021 01:22:55.535586119 CET5653453192.168.2.48.8.8.8
                        Jan 8, 2021 01:22:55.591941118 CET53565348.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:11.875089884 CET5662753192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:11.934384108 CET53566278.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:12.281426907 CET5662153192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:12.343488932 CET53566218.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:13.630331993 CET6311653192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:13.678284883 CET53631168.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:14.122678995 CET6407853192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:14.173543930 CET53640788.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:14.423505068 CET6480153192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:14.471534014 CET53648018.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:18.291027069 CET6172153192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:18.348846912 CET53617218.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:24.496419907 CET5125553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:24.555593014 CET53512558.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:25.218533993 CET6152253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:25.277911901 CET53615228.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:25.505855083 CET5125553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:25.556718111 CET53512558.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:26.223793983 CET6152253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:26.274715900 CET53615228.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:26.505058050 CET5125553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:26.555891991 CET53512558.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:27.240084887 CET6152253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:27.299278975 CET53615228.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:28.570458889 CET5125553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:28.621526003 CET53512558.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:29.255295992 CET6152253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:29.306226969 CET53615228.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:32.583476067 CET5125553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:32.634497881 CET53512558.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:33.380146980 CET6152253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:33.439815044 CET53615228.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:35.952550888 CET5233753192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:36.054187059 CET53523378.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:36.538216114 CET5504653192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:36.610626936 CET53550468.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:36.928410053 CET4961253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:36.994760036 CET53496128.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:37.164438009 CET4928553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:37.220938921 CET53492858.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:37.619175911 CET5060153192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:37.678275108 CET53506018.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:38.094476938 CET6087553192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:38.180318117 CET53608758.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:38.691366911 CET5644853192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:38.747718096 CET53564488.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:39.299813032 CET5917253192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:39.357932091 CET6242053192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:39.359064102 CET53591728.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:39.415534019 CET53624208.8.8.8192.168.2.4
                        Jan 8, 2021 01:23:39.916718960 CET6057953192.168.2.48.8.8.8
                        Jan 8, 2021 01:23:39.972862959 CET53605798.8.8.8192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jan 8, 2021 01:22:55.535586119 CET192.168.2.48.8.8.80xeb9aStandard query (0)script.crazyegg.comA (IP address)IN (0x0001)
                        Jan 8, 2021 01:23:11.875089884 CET192.168.2.48.8.8.80x1717Standard query (0)script.crazyegg.comA (IP address)IN (0x0001)
                        Jan 8, 2021 01:23:12.281426907 CET192.168.2.48.8.8.80x5651Standard query (0)www.crazyegg.comA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jan 8, 2021 01:22:55.591941118 CET8.8.8.8192.168.2.40xeb9aNo error (0)script.crazyegg.comscript.crazyegg.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)
                        Jan 8, 2021 01:23:11.934384108 CET8.8.8.8192.168.2.40x1717No error (0)script.crazyegg.comscript.crazyegg.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)
                        Jan 8, 2021 01:23:12.343488932 CET8.8.8.8192.168.2.40x5651No error (0)www.crazyegg.com52.21.17.103A (IP address)IN (0x0001)
                        Jan 8, 2021 01:23:12.343488932 CET8.8.8.8192.168.2.40x5651No error (0)www.crazyegg.com52.72.111.31A (IP address)IN (0x0001)

                        Code Manipulations

                        Statistics

                        CPU Usage

                        01020304050s020406080100

                        Click to jump to process

                        Memory Usage

                        01020304050s0.002040MB

                        Click to jump to process

                        Behavior

                        Click to jump to process

                        System Behavior

                        Start time:01:22:53
                        Start date:08/01/2021
                        Path:C:\Program Files\internet explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x7ff6d2f30000
                        File size:823560 bytes
                        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Start time:01:22:54
                        Start date:08/01/2021
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6836 CREDAT:17410 /prefetch:2
                        Imagebase:0x160000
                        File size:822536 bytes
                        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Disassembly