Play interactive tourEdit tour

Analysis Report http://e8652.dscx.akamaiedge.net

Overview

General Information

Sample URL:http://e8652.dscx.akamaiedge.net
Analysis ID:386611
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • iexplore.exe (PID: 6700 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6772 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6700 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: TrafficSnort IDS: 1200 ATTACK-RESPONSES Invalid URL 23.50.97.168:80 -> 192.168.2.4:49745
Source: ~DFD5470EFD0201D3FD.TMP.3.drString found in binary or memory: http://e8652.dscx.akamaiedge.net/
Source: {605E3897-9D2A-11EB-90EB-ECF4BBEA1588}.dat.3.drString found in binary or memory: http://e8652.dscx.akamaiedge.net/Root
Source: classification engineClassification label: mal48.win@3/14@0/0
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{605E3895-9D2A-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFAC68D84C1DE9BC6C.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6700 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6700 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 386611 URL: http://e8652.dscx.akamaiedge.net Startdate: 14/04/2021 Architecture: WINDOWS Score: 48 10 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->10 6 iexplore.exe 1 51 2->6         started        process3 process4 8 iexplore.exe 38 6->8         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://e8652.dscx.akamaiedge.net0%VirustotalBrowse
http://e8652.dscx.akamaiedge.net0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:386611
Start date:14.04.2021
Start time:16:04:08
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 18s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://e8652.dscx.akamaiedge.net
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.win@3/14@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.107.253.254, 13.64.90.137, 92.122.145.220, 88.221.62.148, 23.50.97.168, 52.255.188.83, 13.88.21.125, 20.50.102.62
  • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, e8652.dscx.akamaiedge.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, t-ring.msedge.net, t-9999.fb-t-msedge.net, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, t-ring.t-9999.t-msedge.net, skypedataprdcolwus15.cloudapp.net
Errors:
  • URL not reachable
No simulations
No context
No context
No context
No context
No context
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{605E3895-9D2A-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.8537089429855076
Encrypted:false
SSDEEP:192:r6Z1Zh2oW9tGifY6AzMjoBwuD0sfW6NjX:rm7QfHX1cpjj
MD5:127060A8224EF73D807138B08E53AA83
SHA1:74967D65E1435D394D8E6CA3B4030780E97E236B
SHA-256:99436570D26C807E0214FAFFCCEF42DEC8AE95FB50C894D82BA0F9E651E5F5FF
SHA-512:74BC6452CBD93E7E262A75B8B039F72D0BDCC7D715A0FD6EC64C8BE66472061B47315E83773DF6555082979EE0DDF77BD8A0BF2F7C00ACEAE03DC99463977906
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{605E3897-9D2A-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):24176
Entropy (8bit):1.6314605547657632
Encrypted:false
SSDEEP:48:IwCGcprnGwpafG4pQLGrapbS1GQpBKGHHpc3TGUp8JGzYpmnhGop2h8GiXpm:r2ZxQx6/BS/jR2BWHMr8kg
MD5:1EA54993F60D2B98AFE21D32E83F4B36
SHA1:51E0F4AC902EBD37281C9CA44C0FBC655FD30ACF
SHA-256:6C837821FB08B726D3C01FC0B2FEF7C2C082E8D0FA237D0047E7BDB010F429B1
SHA-512:903281014DA7886C080804F35CD3467FD987141C864E242365860A685C564D82C6D5B0DB13EBC631FD640F71C2F9C0A57E154402B534CA5DA96882F50D551AEF
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{605E3898-9D2A-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.5663560633969538
Encrypted:false
SSDEEP:48:Iw7Gcpr67GwpaPG4pQnGrapbSnGQpKxG7HpRyTGIpG:rhZ6VQB67BSRAgTmA
MD5:41F972ECB562C482ACF8CED31B333D64
SHA1:9ABCA53835C04863D32CAADC4B90F7B6465F0EE7
SHA-256:7B37A9DC1F3BC5CDE95CADB77FD005E56CB1079EAD8FDA9CCBCBFCD0B4552324
SHA-512:339400E6A9F93DB94840CBB748A45E878B1ECDD807CB9444EE0F32CA52A8A22C2C8EBE5F64D3B1A76231A14C117D1DF20A6899B14F5B72BCA44B0A74E87FDEB4
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\http_400[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):6410
Entropy (8bit):3.863492220582535
Encrypted:false
SSDEEP:48:upUPinvV4VkBXvLuJyk5N9JXa5TI7kZ3GUsn3GFa7K083GJehBuU1kpd87KxnNst:ufbp69N9JcKktZs36a7x05h427Ow
MD5:1960097B221E608A79D278C7959B3C59
SHA1:10C261310CA68C5624185C4F6FEF8AF44EA6FBAF
SHA-256:1BCAF35CA02140D731E6A3AE3D3D6A5EA49CE7E552728457F790919A540AEC78
SHA-512:88A5AA0223462A576F07EEDC8182762C1E926B5B91163799FA4357B961ABA28AB94920479C993D30337A3814BE03430437DF9372F9D99743512E7F4152B0DE98
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/http_400.htm
Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html>.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css" >.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 400 Bad Request</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\info_48[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
Category:downloaded
Size (bytes):4113
Entropy (8bit):7.9370830126943375
Encrypted:false
SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
MD5:5565250FCC163AA3A79F0B746416CE69
SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/info_48.png
Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\background_gradient[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
Category:downloaded
Size (bytes):453
Entropy (8bit):5.019973044227213
Encrypted:false
SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
MD5:20F0110ED5E4E0D5384A496E4880139B
SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/background_gradient.jpg
Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\ErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2168
Entropy (8bit):5.207912016937144
Encrypted:false
SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bullet[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):447
Entropy (8bit):7.304718288205936
Encrypted:false
SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
MD5:26F971D87CA00E23BD2D064524AEF838
SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/bullet.png
Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
C:\Users\user\AppData\Local\Temp\~DFAC68D84C1DE9BC6C.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.4736812268381424
Encrypted:false
SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fRfAF9l8fRfo9lTqfrOSNAP1Ogb:c9lLh9lLh9lIn9lIn9log9low9lWzC1P
MD5:621FCE95A812DBBE4DB68B287560F289
SHA1:BC46DE4E128BCEA94107C7BE8DB79A02461F054F
SHA-256:0A1F70A5EDE6FE5A37F8CBFD2752CC90E7F25872E9A00BCAA8E1412349D3CF21
SHA-512:F3085C5C4108E33122418E2246AC28A7B8C547B18364FC2C66B72C9C77D382C69A7310649A8F42944089E146778910642358398B472603956B70A26DC8076C38
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFD5470EFD0201D3FD.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):34369
Entropy (8bit):0.3518256414412615
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwl/9lwd9l2r9l2r9l//:kBqoxKAuvScS+l4YSbnInIhB
MD5:91C64348E68731E3A80FFB95D5B10FF4
SHA1:D96D22338850A2D776A03DFDBDC83EA2079D909C
SHA-256:B8BB61919D908AA8F7906F2D3577F101A85AD712DAA37EF63ACD78445DECF452
SHA-512:65E2D95859E595667BF3B5919582C5F09297A209E874CC8576F157013350C1C9AA9F961175934D8ED9D6B51EE5F3E5BFBF32755850016AD3C5DC84C7DB660BDC
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFF6C0F150DF958B21.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):25441
Entropy (8bit):0.3359184290854625
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAp:kBqoxxJhHWSVSEabp
MD5:1DAADF63E09CBDCACAB495EF9A5521C1
SHA1:5851DBFDA3026B00A8F169CE422285CD733C18F7
SHA-256:EAF40A96602ED51CA9BA754DD7B506246CCF9D6DF741E593B68ADF11F7B68B85
SHA-512:740A3A6ED0E38CEA6C668DED8C7930DF4452E563C9A7FD9A3F55A3C7C15A5996AE5B65709A291F319B253D0749B316AE2861C607A971D7AE6DB466BAAE2A717E
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Download Network PCAP: filteredfull

Snort IDS Alerts

TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
04/14/21-16:04:53.887821TCP1200ATTACK-RESPONSES Invalid URL804974523.50.97.168192.168.2.4
TimestampSource PortDest PortSource IPDest IP
Apr 14, 2021 16:04:44.832134008 CEST4991053192.168.2.48.8.8.8
Apr 14, 2021 16:04:44.884501934 CEST53499108.8.8.8192.168.2.4
Apr 14, 2021 16:04:45.156662941 CEST5585453192.168.2.48.8.8.8
Apr 14, 2021 16:04:45.208030939 CEST53558548.8.8.8192.168.2.4
Apr 14, 2021 16:04:46.038289070 CEST6454953192.168.2.48.8.8.8
Apr 14, 2021 16:04:46.097172022 CEST53645498.8.8.8192.168.2.4
Apr 14, 2021 16:04:51.684302092 CEST6315353192.168.2.48.8.8.8
Apr 14, 2021 16:04:51.733211994 CEST53631538.8.8.8192.168.2.4
Apr 14, 2021 16:04:52.123260975 CEST5299153192.168.2.48.8.8.8
Apr 14, 2021 16:04:52.185502052 CEST53529918.8.8.8192.168.2.4
Apr 14, 2021 16:04:53.717931986 CEST5370053192.168.2.48.8.8.8
Apr 14, 2021 16:04:53.779632092 CEST53537008.8.8.8192.168.2.4
Apr 14, 2021 16:04:53.783899069 CEST5172653192.168.2.48.8.8.8
Apr 14, 2021 16:04:53.835629940 CEST53517268.8.8.8192.168.2.4
Apr 14, 2021 16:05:00.457098961 CEST5679453192.168.2.48.8.8.8
Apr 14, 2021 16:05:00.514255047 CEST53567948.8.8.8192.168.2.4
Apr 14, 2021 16:05:02.168764114 CEST5653453192.168.2.48.8.8.8
Apr 14, 2021 16:05:02.218842030 CEST53565348.8.8.8192.168.2.4
Apr 14, 2021 16:05:03.382992983 CEST5662753192.168.2.48.8.8.8
Apr 14, 2021 16:05:03.434556961 CEST53566278.8.8.8192.168.2.4
Apr 14, 2021 16:05:04.205563068 CEST5662153192.168.2.48.8.8.8
Apr 14, 2021 16:05:04.254317999 CEST53566218.8.8.8192.168.2.4
Apr 14, 2021 16:05:11.040330887 CEST6311653192.168.2.48.8.8.8
Apr 14, 2021 16:05:11.089544058 CEST53631168.8.8.8192.168.2.4
Apr 14, 2021 16:05:12.163806915 CEST6407853192.168.2.48.8.8.8
Apr 14, 2021 16:05:12.214463949 CEST53640788.8.8.8192.168.2.4
Apr 14, 2021 16:05:13.376597881 CEST6480153192.168.2.48.8.8.8
Apr 14, 2021 16:05:13.425311089 CEST53648018.8.8.8192.168.2.4
Apr 14, 2021 16:05:14.189050913 CEST6172153192.168.2.48.8.8.8
Apr 14, 2021 16:05:14.237868071 CEST53617218.8.8.8192.168.2.4
Apr 14, 2021 16:05:15.260447025 CEST5125553192.168.2.48.8.8.8
Apr 14, 2021 16:05:15.279202938 CEST6152253192.168.2.48.8.8.8
Apr 14, 2021 16:05:15.312052965 CEST53512558.8.8.8192.168.2.4
Apr 14, 2021 16:05:15.330646038 CEST53615228.8.8.8192.168.2.4
Apr 14, 2021 16:05:16.082916975 CEST5233753192.168.2.48.8.8.8
Apr 14, 2021 16:05:16.132642031 CEST53523378.8.8.8192.168.2.4
Apr 14, 2021 16:05:17.249011040 CEST5504653192.168.2.48.8.8.8
Apr 14, 2021 16:05:17.297930002 CEST53550468.8.8.8192.168.2.4

Code Manipulations

Statistics

CPU Usage

0102030s020406080100

Click to jump to process

Memory Usage

0102030s0.002040MB

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:16:04:50
Start date:14/04/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff6e2ca0000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Start time:16:04:51
Start date:14/04/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6700 CREDAT:17410 /prefetch:2
Imagebase:0x30000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly