Create Interactive Tour

Analysis Report http://nexusrules.officeapps.live.com

Overview

General Information

Sample URL:http://nexusrules.officeapps.live.com
Analysis ID:426948
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • iexplore.exe (PID: 6208 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6256 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6208 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: ~DF84D31C5273841249.TMP.1.drString found in binary or memory: http://nexusrules.officeapps.live.com/
Source: {16BF1BD9-C1E3-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: http://nexusrules.officeapps.live.com/Root
Source: classification engineClassification label: unknown0.win@3/11@0/0
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{16BF1BD7-C1E3-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF3EE653ACCCE16508.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6208 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6208 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 426948 URL: http://nexusrules.officeapp... Startdate: 31/05/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 1 51 2->5         started        process3 7 iexplore.exe 35 5->7         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://nexusrules.officeapps.live.com0%VirustotalBrowse
http://nexusrules.officeapps.live.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:426948
Start date:31.05.2021
Start time:09:36:58
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://nexusrules.officeapps.live.com
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.win@3/11@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 20.82.210.154, 13.107.5.88, 13.107.42.23, 92.122.145.129, 92.122.145.220, 104.43.139.144, 88.221.62.148, 52.109.76.31, 52.147.198.201, 152.199.19.161
  • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, client-office365-tas.msedge.net, ocos-office365-s2s.msedge.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, l-0014.config.skype.com, arc.msn.com, storeedgefd.xbetservices.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, arc.trafficmanager.net, watson.telemetry.microsoft.com, config.edge.skype.com, storeedgefd.dsx.mp.microsoft.com, skypedataprdcolwus17.cloudapp.net, afdo-tas-offload.trafficmanager.net, ie9comview.vo.msecnd.net, skypedataprdcolcus16.cloudapp.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, prod.nexusrules.live.com.akadns.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, skypedataprdcoleus16.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, l-0014.l-msedge.net, e16646.dscg.akamaiedge.net, nexusrules.officeapps.live.com, cs9.wpc.v0cdn.net
Errors:
  • URL not reachable
No simulations
No context
No context
No context
No context
No context
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{16BF1BD7-C1E3-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.8543022113889043
Encrypted:false
SSDEEP:192:rFZWZ82uWNtxifHfuuzMPGuBrUuD7Zsf7WsRfZujX:rLSLF3OGnOm4c7c7WsLa
MD5:4673219E98A28DF8A98B614F1E25A855
SHA1:5BA36276B22F46FFD0BDE2FD7AB5919D790DBC97
SHA-256:8789BA8F5957DCF13B29BBF509C83106DFE862AD85E8DB792EFBED0DD2377968
SHA-512:5BDCCD81413E965FA6DBE51B7A077ACBD432A707AC1E6B7D6B3831B9F82C95FBEE33A7599D7447927528D4F349E5B9318862EBA060458DBA0197585FC8AF9E74
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{16BF1BD9-C1E3-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):24188
Entropy (8bit):1.6353028048553997
Encrypted:false
SSDEEP:48:IwYhGcprxGwpaihG4pQ6GrapbScGQpB6GHHpc3TGUp8RGzYpmHNGopK92MGOXpm:rgZrQi6sBS0jB2BWfMfAIWg
MD5:25306C0BB6E01EEFFD9417EC0C197496
SHA1:1A66AABF7E1C30A71D1183181AF6CCE43339C126
SHA-256:D1B7AC68C34009646B0C59C35932172C9ACCE1B862B1422C8DE15ABF1401B913
SHA-512:19B7C8B642F9711EA3D1EB8103B23D040BED9F4B177CC86510F5CF8F5B0CE4A7C3824A0F74A199E2D298E3ACA4130E84FA9E93E0C9BE1ED4A097E7052C0F9884
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{20E11835-C1E3-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.564161647131896
Encrypted:false
SSDEEP:48:IwQGcpr1Gwpa4G4pQIGrapbSlGQpKKG7HpR9TGIpG:rUZfQo6WBSPAlT7A
MD5:9811A5199CA0F5F8BFDA7A11840832CC
SHA1:39D681D4D8C19DE4F96C5A426A0FBA5F5CA13C7C
SHA-256:6755426FF1B878C22089869535A47122528F8EF47ECF0E4C9BBE3F030E6C5310
SHA-512:6E045F8956AA4A2B25967DA5348499642939EAD9DA914CEC95EC6C7B6F6606DD17EE2DF7C8956430E846F1A5752F989E1C1F6F26F06328DCB27A3718A128D808
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\dnserror[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2997
Entropy (8bit):4.4885437940628465
Encrypted:false
SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
MD5:2DC61EB461DA1436F5D22BCE51425660
SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=9002
Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\NewErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):1612
Entropy (8bit):4.869554560514657
Encrypted:false
SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
MD5:DFEABDE84792228093A5A270352395B6
SHA1:E41258C9576721025926326F76063C2305586F76
SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
C:\Users\user\AppData\Local\Temp\~DF07B3F87C46BEDED5.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):25441
Entropy (8bit):0.27918767598683664
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
MD5:AB889A32AB9ACD33E816C2422337C69A
SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF3EE653ACCCE16508.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.4782871067856595
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lox9loR9lWo7mWq:kBqoI6EoKWq
MD5:62538E61DC57273F3A307294BCF0AFE0
SHA1:4DB3409765C1C98C0E8A7D79572AC78630105300
SHA-256:1E9743C840283FE271FB1D0A6A6E753EE4D40D198A3CDE5C3CDE4465BAF97794
SHA-512:5ADD2FCABF8E332F2E4577ACFD2AA3B538C1ED997549CB4F8766C8386157B1F46819BEDA9F0689AA75AAB0F5761B1BCA3561F1BCBDA4813D40221568716DAD81
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF84D31C5273841249.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):34381
Entropy (8bit):0.3536473721129626
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwd9lw99l2L9l2L9l/H9:kBqoxKAuvScS++4y7HIH092MP
MD5:005C330D799FE3A7DEF985E95E893EBB
SHA1:F5B9905BA4B937B375FB638047D8EBF82839394C
SHA-256:19BB3CBD4102396FDADF30146F0C6C2AE61484BAD77A2EAE57DB0468BD58DCEA
SHA-512:91AC6A7E3611B7A57EC83ABE8A32404FF5C2E31EEB1EBE0FA17C4EDAE3E68B383B8AFF4A510E8CB05F9CC88A6D4582E636ED829CE29B572F3D074FB36A98B9D6
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
May 31, 2021 09:37:37.872414112 CEST5057953192.168.2.48.8.8.8
May 31, 2021 09:37:37.922441006 CEST53505798.8.8.8192.168.2.4
May 31, 2021 09:37:37.985074043 CEST5170353192.168.2.48.8.8.8
May 31, 2021 09:37:38.038189888 CEST53517038.8.8.8192.168.2.4
May 31, 2021 09:37:38.467605114 CEST6524853192.168.2.48.8.8.8
May 31, 2021 09:37:38.481561899 CEST5372353192.168.2.48.8.8.8
May 31, 2021 09:37:38.520227909 CEST53652488.8.8.8192.168.2.4
May 31, 2021 09:37:38.531364918 CEST53537238.8.8.8192.168.2.4
May 31, 2021 09:37:38.575206995 CEST6464653192.168.2.48.8.8.8
May 31, 2021 09:37:38.625109911 CEST53646468.8.8.8192.168.2.4
May 31, 2021 09:37:39.084901094 CEST6529853192.168.2.48.8.8.8
May 31, 2021 09:37:39.143795967 CEST53652988.8.8.8192.168.2.4
May 31, 2021 09:37:39.247524977 CEST5912353192.168.2.48.8.8.8
May 31, 2021 09:37:39.305807114 CEST53591238.8.8.8192.168.2.4
May 31, 2021 09:37:40.421376944 CEST5453153192.168.2.48.8.8.8
May 31, 2021 09:37:40.471471071 CEST53545318.8.8.8192.168.2.4
May 31, 2021 09:37:41.389458895 CEST4971453192.168.2.48.8.8.8
May 31, 2021 09:37:41.449048996 CEST53497148.8.8.8192.168.2.4
May 31, 2021 09:37:41.523119926 CEST5802853192.168.2.48.8.8.8
May 31, 2021 09:37:41.572957993 CEST53580288.8.8.8192.168.2.4
May 31, 2021 09:37:42.838243008 CEST5309753192.168.2.48.8.8.8
May 31, 2021 09:37:42.890533924 CEST53530978.8.8.8192.168.2.4
May 31, 2021 09:37:44.042435884 CEST4925753192.168.2.48.8.8.8
May 31, 2021 09:37:44.094954014 CEST53492578.8.8.8192.168.2.4
May 31, 2021 09:37:45.049313068 CEST6238953192.168.2.48.8.8.8
May 31, 2021 09:37:45.099461079 CEST53623898.8.8.8192.168.2.4
May 31, 2021 09:37:45.990197897 CEST4991053192.168.2.48.8.8.8
May 31, 2021 09:37:46.053111076 CEST53499108.8.8.8192.168.2.4
May 31, 2021 09:37:47.453490019 CEST5585453192.168.2.48.8.8.8
May 31, 2021 09:37:47.526669025 CEST53558548.8.8.8192.168.2.4
May 31, 2021 09:37:47.636596918 CEST6454953192.168.2.48.8.8.8
May 31, 2021 09:37:47.695004940 CEST53645498.8.8.8192.168.2.4
May 31, 2021 09:37:48.639626026 CEST6315353192.168.2.48.8.8.8
May 31, 2021 09:37:48.689974070 CEST53631538.8.8.8192.168.2.4
May 31, 2021 09:37:49.979372025 CEST5299153192.168.2.48.8.8.8
May 31, 2021 09:37:50.030452013 CEST53529918.8.8.8192.168.2.4
May 31, 2021 09:37:51.063369989 CEST5370053192.168.2.48.8.8.8
May 31, 2021 09:37:51.113159895 CEST53537008.8.8.8192.168.2.4
May 31, 2021 09:37:52.013447046 CEST5172653192.168.2.48.8.8.8
May 31, 2021 09:37:52.064094067 CEST53517268.8.8.8192.168.2.4
May 31, 2021 09:37:52.934834003 CEST5679453192.168.2.48.8.8.8
May 31, 2021 09:37:52.987658978 CEST53567948.8.8.8192.168.2.4
May 31, 2021 09:37:54.567172050 CEST5653453192.168.2.48.8.8.8
May 31, 2021 09:37:54.618549109 CEST53565348.8.8.8192.168.2.4
May 31, 2021 09:37:55.700871944 CEST5662753192.168.2.48.8.8.8
May 31, 2021 09:37:55.750672102 CEST53566278.8.8.8192.168.2.4
May 31, 2021 09:37:56.909728050 CEST5662153192.168.2.48.8.8.8
May 31, 2021 09:37:56.968174934 CEST53566218.8.8.8192.168.2.4
May 31, 2021 09:37:57.827168941 CEST6311653192.168.2.48.8.8.8
May 31, 2021 09:37:57.878209114 CEST53631168.8.8.8192.168.2.4
May 31, 2021 09:37:58.945233107 CEST6407853192.168.2.48.8.8.8
May 31, 2021 09:37:58.995229006 CEST53640788.8.8.8192.168.2.4
May 31, 2021 09:38:01.887794018 CEST6480153192.168.2.48.8.8.8
May 31, 2021 09:38:01.945986986 CEST53648018.8.8.8192.168.2.4
May 31, 2021 09:38:03.493993044 CEST6172153192.168.2.48.8.8.8
May 31, 2021 09:38:03.546695948 CEST53617218.8.8.8192.168.2.4
May 31, 2021 09:38:11.906518936 CEST5125553192.168.2.48.8.8.8
May 31, 2021 09:38:11.957020044 CEST53512558.8.8.8192.168.2.4
May 31, 2021 09:38:15.942522049 CEST6152253192.168.2.48.8.8.8
May 31, 2021 09:38:15.995039940 CEST53615228.8.8.8192.168.2.4
May 31, 2021 09:38:16.915205956 CEST5233753192.168.2.48.8.8.8

Code Manipulations

Statistics

CPU Usage

0102030s020406080100

Click to jump to process

Memory Usage

0102030s0.002040MB

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:09:37:45
Start date:31/05/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff6eda60000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Start time:09:37:46
Start date:31/05/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6208 CREDAT:17410 /prefetch:2
Imagebase:0xe40000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly