Play interactive tourEdit tour

Analysis Report http://torpig-sinkhole.org

Overview

General Information

Sample URL:http://torpig-sinkhole.org
Analysis ID:381785
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • iexplore.exe (PID: 5836 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6104 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5836 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: TrafficSnort IDS: 2015813 ET TROJAN DNS Query Sinkhole Domain Various Families (Possible Infected Host) 192.168.2.3:63492 -> 8.8.8.8:53
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: torpig-sinkhole.orgConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: torpig-sinkhole.org
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.2Date: Mon, 05 Apr 2021 01:44:01 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveContent-Encoding: gzipData Raw: 38 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 19 9a e8 19 21 2b d1 07 59 02 32 54 1f ea 40 00 da 1e 3f 07 a9 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 84(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!+Y2T@?0
Source: ~DFD3590096A0055ECA.TMP.1.drString found in binary or memory: http://torpig-sinkhole.org/
Source: {D4337692-95FB-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: http://torpig-sinkhole.org/Root
Source: classification engineClassification label: mal48.win@3/14@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFB6768C1D871089C9.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5836 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5836 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 381785 URL: http://torpig-sinkhole.org Startdate: 05/04/2021 Architecture: WINDOWS Score: 48 13 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->13 6 iexplore.exe 2 61 2->6         started        process3 process4 8 iexplore.exe 39 6->8         started        dnsIp5 11 torpig-sinkhole.org 87.106.18.122, 49712, 49713, 80 ONEANDONE-ASBrauerstrasse48DE Germany 8->11

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://torpig-sinkhole.org1%VirustotalBrowse
http://torpig-sinkhole.org0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
torpig-sinkhole.org1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://torpig-sinkhole.org/1%VirustotalBrowse
http://torpig-sinkhole.org/0%Avira URL Cloudsafe
http://torpig-sinkhole.org/Root0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
torpig-sinkhole.org
87.106.18.122
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://torpig-sinkhole.org/false
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://torpig-sinkhole.org/Root{D4337692-95FB-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
87.106.18.122
torpig-sinkhole.orgGermany
8560ONEANDONE-ASBrauerstrasse48DEfalse

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:381785
Start date:05.04.2021
Start time:03:43:15
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://torpig-sinkhole.org
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.win@3/14@1/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
  • Exclude process from analysis (whitelisted): ielowutil.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.43.193.48, 52.255.188.83, 88.221.62.148, 13.64.90.137
  • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, e11290.dspg.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, skypedataprdcolwus17.cloudapp.net, go.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, skypedataprdcolcus15.cloudapp.net
Errors:
  • URL not reachable
No simulations
No context
No context
No context
No context
No context
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4337690-95FB-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.8601663852646546
Encrypted:false
SSDEEP:96:rbZAZ20n220sTW20s2G1t20s2Gs0Df20s2GsH0JdM20s2GcHHR20s2GcmHjY20sR:rbZAZ/2wWAt4fkdMDtWf6sX
MD5:7D3A7498E6D3A77A7F77B41EA001DA72
SHA1:CDDCE540C5D4AC97857D2F391248A01AA7A6D3CF
SHA-256:EA9CDB373FCCBD11D39E15AA5FCF06EAABD06D87729B930FFA1D64E0C383D718
SHA-512:0C9D6D0A7E484F765B24F596D23974FE92088F588677B018DE8CF71379D1DCADD7801038400FA4B6FCE30D512BC3E3994D1EC03AB53B1E843642D71FE227E80B
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4337692-95FB-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):24164
Entropy (8bit):1.6280145780594188
Encrypted:false
SSDEEP:48:IwMcGcpraxhGwpaVG4pQ1GrapbSqGQpB2GHHpcvTGUp8ZGzYpmMiGopSKuGmXpm:rMAZaxQH6lBSSj125W3ML4rg
MD5:C9CEA3E6B0E7C276113A7355DED7D15A
SHA1:69A73418535B1A56E7BC532A95DFA76E901155AE
SHA-256:4A13C9CD0FF1FCB47180F345EB2CACA6C733498CBFA5E82E8E0186663D3D22B0
SHA-512:0D02E1A0EDE164EDCED1E4CDE90B0AD997DA168639B2101CCF3C02437FD1F8DC2B2705A0613C7B920E85772D2B8427F954C514C33E36476F16BDA8A3121FBDA9
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4337693-95FB-11EB-90E4-ECF4BB862DED}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.5659019637473253
Encrypted:false
SSDEEP:48:Iw9qGcpriGwpavG4pQ3GrapbS8GQpK1G7HpRFTGIpG:rIZKQh6LBSUAkTTA
MD5:27FED712265BAF7DBBB8626DCCEF41E2
SHA1:6F8AAC346F3CC07ECC07026D62B9B06B015E735A
SHA-256:C8A7A2ECC4E2EC093F355A6C4A90936F16BE2DDF73F82AB60375CFBAC3F03208
SHA-512:37CCF964A4034FFFA101F89F5691BA76B3BF80F8E5F248221D8B3B9429E51D4CA578814CA989E2DAC4319A5AC49DC3695FBC8473585A34C17AA200E5884368A2
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\ErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2168
Entropy (8bit):5.207912016937144
Encrypted:false
SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\bullet[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):447
Entropy (8bit):7.304718288205936
Encrypted:false
SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
MD5:26F971D87CA00E23BD2D064524AEF838
SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/bullet.png
Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\background_gradient[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
Category:downloaded
Size (bytes):453
Entropy (8bit):5.019973044227213
Encrypted:false
SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
MD5:20F0110ED5E4E0D5384A496E4880139B
SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/background_gradient.jpg
Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\http_404[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
Category:downloaded
Size (bytes):6495
Entropy (8bit):3.8998802417135856
Encrypted:false
SSDEEP:48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM
MD5:F65C729DC2D457B7A1093813F1253192
SHA1:5006C9B50108CF582BE308411B157574E5A893FC
SHA-256:B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F
SHA-512:717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/http_404.htm
Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html dir="ltr">.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css">.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 404 Not Found</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\info_48[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
Category:downloaded
Size (bytes):4113
Entropy (8bit):7.9370830126943375
Encrypted:false
SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
MD5:5565250FCC163AA3A79F0B746416CE69
SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/info_48.png
Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
C:\Users\user\AppData\Local\Temp\~DF8588A9F629EFC490.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):25441
Entropy (8bit):0.2885111250006736
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA0:kBqoxxJhHWSVSEab0
MD5:C2790107F0B8509FACD9199A5C1B1E7E
SHA1:28465E8B1627FD603E1BCCE67FEFD0FA4EE8E998
SHA-256:22BEF87DE5AADA3071C0A6778451C7935E7C29162A30F974497C564EA46B963E
SHA-512:5E89BC7279C7210F8C6D1781796150D9070FD58937C8C0D2D1D730EBCA38F6CCDC36E041A491B4D2FBB9590DBB3B71EC3B61175B0197CEE89A729BC4B2A89FA3
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFB6768C1D871089C9.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.4804693838507338
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lo20DF9lo20J9lW20Yx2GsH2GccbnGcryAHA2:kBqoI20S20M20Yx2GsH2GcOnGcmAHA2
MD5:6DE121E3241E0942E5BA0DDC7CD85EB6
SHA1:4227AE86C7FB2BE6CAB54301A088045871A8C7AD
SHA-256:D6F884EDD7241DAA865064E3C895789E2A5B092D64D43A05EF8A5EFD03253200
SHA-512:91231D2839189F12E6725FA904D5C5D742CA5C5ABC55C8702042176207E415EE4E43A011C7EF212A3051738D002E9981BE8993619065238D48BDE9CCCED62709
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFD3590096A0055ECA.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):34357
Entropy (8bit):0.34912511677180924
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwq9lwn69l2Od9l2Od9v:kBqoxKAuvScS+9DhAMIMsKhY
MD5:BE118EB85213FB3C959C8C325BAAEBE1
SHA1:2DAD5C9BB5F1D331B3BC179DBADA57228E695979
SHA-256:E83F1A03A3F54CD3877E14D0E0D71BAC0D15020570B23E537E0F92E14A8AD723
SHA-512:8D466DEDC6D3AEFD1338B8DC10E3415FFC2C9FBA4059B2243BD81D518EB1BDFAF518DFAFF53C47B3D5A09E7914D70CF6170442CF06100027A5FAC04FC6577F95
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Download Network PCAP: filteredfull

Snort IDS Alerts

TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
04/05/21-03:44:01.704073UDP2015813ET TROJAN DNS Query Sinkhole Domain Various Families (Possible Infected Host)6349253192.168.2.38.8.8.8

Network Port Distribution

  • Total Packets: 26
  • 80 (HTTP)
  • 53 (DNS)
TimestampSource PortDest PortSource IPDest IP
Apr 5, 2021 03:44:01.825244904 CEST4971280192.168.2.387.106.18.122
Apr 5, 2021 03:44:01.825413942 CEST4971380192.168.2.387.106.18.122
Apr 5, 2021 03:44:01.867840052 CEST804971287.106.18.122192.168.2.3
Apr 5, 2021 03:44:01.867995024 CEST4971280192.168.2.387.106.18.122
Apr 5, 2021 03:44:01.868602037 CEST4971280192.168.2.387.106.18.122
Apr 5, 2021 03:44:01.869725943 CEST804971387.106.18.122192.168.2.3
Apr 5, 2021 03:44:01.869899035 CEST4971380192.168.2.387.106.18.122
Apr 5, 2021 03:44:01.910718918 CEST804971287.106.18.122192.168.2.3
Apr 5, 2021 03:44:01.911189079 CEST804971287.106.18.122192.168.2.3
Apr 5, 2021 03:44:01.911299944 CEST4971280192.168.2.387.106.18.122
TimestampSource PortDest PortSource IPDest IP
Apr 5, 2021 03:43:54.049621105 CEST5062053192.168.2.38.8.8.8
Apr 5, 2021 03:43:54.104187012 CEST53506208.8.8.8192.168.2.3
Apr 5, 2021 03:43:56.082256079 CEST6493853192.168.2.38.8.8.8
Apr 5, 2021 03:43:56.140618086 CEST53649388.8.8.8192.168.2.3
Apr 5, 2021 03:43:57.036355019 CEST6015253192.168.2.38.8.8.8
Apr 5, 2021 03:43:57.082353115 CEST53601528.8.8.8192.168.2.3
Apr 5, 2021 03:43:57.817724943 CEST5754453192.168.2.38.8.8.8
Apr 5, 2021 03:43:57.873593092 CEST53575448.8.8.8192.168.2.3
Apr 5, 2021 03:43:58.879528999 CEST5598453192.168.2.38.8.8.8
Apr 5, 2021 03:43:58.928560019 CEST53559848.8.8.8192.168.2.3
Apr 5, 2021 03:43:59.685482025 CEST6418553192.168.2.38.8.8.8
Apr 5, 2021 03:43:59.733675003 CEST53641858.8.8.8192.168.2.3
Apr 5, 2021 03:44:00.654109955 CEST6511053192.168.2.38.8.8.8
Apr 5, 2021 03:44:00.710040092 CEST53651108.8.8.8192.168.2.3
Apr 5, 2021 03:44:00.881083012 CEST5836153192.168.2.38.8.8.8
Apr 5, 2021 03:44:00.928158045 CEST53583618.8.8.8192.168.2.3
Apr 5, 2021 03:44:01.704072952 CEST6349253192.168.2.38.8.8.8
Apr 5, 2021 03:44:01.808159113 CEST53634928.8.8.8192.168.2.3
Apr 5, 2021 03:44:02.325992107 CEST6083153192.168.2.38.8.8.8
Apr 5, 2021 03:44:02.383641005 CEST53608318.8.8.8192.168.2.3
Apr 5, 2021 03:44:03.268105984 CEST6010053192.168.2.38.8.8.8
Apr 5, 2021 03:44:03.323987961 CEST53601008.8.8.8192.168.2.3
Apr 5, 2021 03:44:06.999126911 CEST5319553192.168.2.38.8.8.8
Apr 5, 2021 03:44:07.050622940 CEST53531958.8.8.8192.168.2.3
Apr 5, 2021 03:44:08.258164883 CEST5014153192.168.2.38.8.8.8
Apr 5, 2021 03:44:08.309263945 CEST53501418.8.8.8192.168.2.3
Apr 5, 2021 03:44:10.786550045 CEST5302353192.168.2.38.8.8.8
Apr 5, 2021 03:44:10.835403919 CEST53530238.8.8.8192.168.2.3
Apr 5, 2021 03:44:11.621444941 CEST4956353192.168.2.38.8.8.8
Apr 5, 2021 03:44:11.678200960 CEST53495638.8.8.8192.168.2.3
Apr 5, 2021 03:44:13.096106052 CEST5135253192.168.2.38.8.8.8
Apr 5, 2021 03:44:13.154882908 CEST53513528.8.8.8192.168.2.3
Apr 5, 2021 03:44:14.039916039 CEST5934953192.168.2.38.8.8.8
Apr 5, 2021 03:44:14.085983992 CEST53593498.8.8.8192.168.2.3
Apr 5, 2021 03:44:17.584471941 CEST5708453192.168.2.38.8.8.8
Apr 5, 2021 03:44:17.630629063 CEST53570848.8.8.8192.168.2.3
Apr 5, 2021 03:44:19.839092016 CEST5882353192.168.2.38.8.8.8
Apr 5, 2021 03:44:19.888073921 CEST53588238.8.8.8192.168.2.3
Apr 5, 2021 03:44:20.760742903 CEST5756853192.168.2.38.8.8.8
Apr 5, 2021 03:44:20.806921959 CEST53575688.8.8.8192.168.2.3
TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Apr 5, 2021 03:44:01.704072952 CEST192.168.2.38.8.8.80x2c7bStandard query (0)torpig-sinkhole.orgA (IP address)IN (0x0001)
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Apr 5, 2021 03:44:01.808159113 CEST8.8.8.8192.168.2.30x2c7bNo error (0)torpig-sinkhole.org87.106.18.122A (IP address)IN (0x0001)
  • torpig-sinkhole.org
Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.34971287.106.18.12280C:\Program Files (x86)\Internet Explorer\iexplore.exe
TimestampkBytes transferredDirectionData
Apr 5, 2021 03:44:01.868602037 CEST1077OUTGET / HTTP/1.1
Accept: text/html, application/xhtml+xml, image/jxr, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: torpig-sinkhole.org
Connection: Keep-Alive
Apr 5, 2021 03:44:01.911189079 CEST1078INHTTP/1.1 404 Not Found
Server: nginx/1.14.2
Date: Mon, 05 Apr 2021 01:44:01 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Content-Encoding: gzip
Data Raw: 38 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 19 9a e8 19 21 2b d1 07 59 02 32 54 1f ea 40 00 da 1e 3f 07 a9 00 00 00 0d 0a 30 0d 0a 0d 0a
Data Ascii: 84(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!+Y2T@?0


Code Manipulations

Statistics

CPU Usage

0102030s020406080100

Click to jump to process

Memory Usage

0102030s0.002040MB

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:03:44:00
Start date:05/04/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff628c90000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Start time:03:44:00
Start date:05/04/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5836 CREDAT:17410 /prefetch:2
Imagebase:0xd00000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly