Play interactive tourEdit tour

Analysis Report http://icon-adc.realsh.xyz

Overview

General Information

Sample URL:http://icon-adc.realsh.xyz
Analysis ID:427162
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:20
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Performs DNS queries to domains with low reputation

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Some HTTP requests failed (404). It is likely the sample will exhibit less behavior



  • System is w10x64
  • iexplore.exe (PID: 5540 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4868 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5540 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Networking:

barindex
Performs DNS queries to domains with low reputation
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: icon-adc.realsh.xyz
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: icon-adc.realsh.xyzConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: icon-adc.realsh.xyz
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 31 May 2021 13:58:16 GMTContent-Length: 0Connection: keep-aliveCF-Cache-Status: DYNAMICcf-request-id: 0a6450e72a00004eb0c7b84000000001Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=uK8Xaevo5Iw8sfvE%2Fv%2FGbvVc2W%2FjYjETEjFqpHbfDE2UUxxD8dQDgelcVna%2FSI1lUmsx9IG7ANP2EVVjZtr6dAX76NRCNyDCDBWVrexf3re8d6ElpIlFX90KnANJkAjWRA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 6580b751dded4eb0-FRAalt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
Source: ~DFB1AAEA48B9293B2E.TMP.1.drString found in binary or memory: http://icon-adc.realsh.xyz/
Source: {AD68DF7F-C263-11EB-90E6-ECF4BB82F7E0}.dat.1.drString found in binary or memory: http://icon-adc.realsh.xyz/Root
Source: classification engineClassification label: sus20.troj.win@3/14@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD68DF7D-C263-11EB-90E6-ECF4BB82F7E0}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF3189524FBDA53A0D.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5540 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5540 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 427162 URL: http://icon-adc.realsh.xyz Startdate: 31/05/2021 Architecture: WINDOWS Score: 20 13 Performs DNS queries to domains with low reputation 2->13 6 iexplore.exe 1 51 2->6         started        process3 process4 8 iexplore.exe 38 6->8         started        dnsIp5 11 icon-adc.realsh.xyz 104.21.20.18, 49705, 49706, 80 CLOUDFLARENETUS United States 8->11

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://icon-adc.realsh.xyz0%VirustotalBrowse
http://icon-adc.realsh.xyz0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://icon-adc.realsh.xyz/0%Avira URL Cloudsafe
http://icon-adc.realsh.xyz/Root0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
icon-adc.realsh.xyz
104.21.20.18
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://icon-adc.realsh.xyz/false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://icon-adc.realsh.xyz/Root{AD68DF7F-C263-11EB-90E6-ECF4BB82F7E0}.dat.1.drfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.21.20.18
    icon-adc.realsh.xyzUnited States
    13335CLOUDFLARENETUStrue

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:427162
    Start date:31.05.2021
    Start time:15:57:24
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 2m 43s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:browseurl.jbs
    Sample URL:http://icon-adc.realsh.xyz
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:SUS
    Classification:sus20.troj.win@3/14@1/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • URL browsing timeout or error
    Warnings:
    • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 40.88.32.150, 104.43.193.48, 92.122.145.220, 88.221.62.148, 52.255.188.83, 13.64.90.137, 92.122.144.200, 20.82.209.183
    • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, e11290.dspg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net
    • Not all processes where analyzed, report is missing behavior information
    Errors:
    • URL not reachable
    No simulations
    No context
    No context
    No context
    No context
    No context
    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD68DF7D-C263-11EB-90E6-ECF4BB82F7E0}.dat
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:Microsoft Word Document
    Category:dropped
    Size (bytes):30296
    Entropy (8bit):1.8530654022313717
    Encrypted:false
    SSDEEP:192:rwZTZc2yW2tlifDj9zMHz1BSvDKsfGjAjX:rg1rxWKKLQZD
    MD5:CE1C7290190000C1FE9064542B61B02C
    SHA1:F7E63975C43FE2DE26000EC7FCB2DD322E33683A
    SHA-256:9D4B9AC6795131D8C9810D663C2641D498C6AE6E128D4FB072A38980F11B56EC
    SHA-512:9CF6B6791D9608E3C89932CF417AB5B2C024F7A447FE3EE99CE259B7E4F74FCFCC89C8ED001BC0637FD3B4C6CC39D67D43FE0753AE997410BFEBF76992A3781E
    Malicious:false
    Reputation:low
    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{AD68DF7F-C263-11EB-90E6-ECF4BB82F7E0}.dat
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:Microsoft Word Document
    Category:dropped
    Size (bytes):24164
    Entropy (8bit):1.6272713599272883
    Encrypted:false
    SSDEEP:48:IwYGcpr9GwpaDG4pQHGrapbSmGQpBF4GHHpcFpTGUp8FxGzYpmFUSGopS3UXGmXg:rsZnQ16bBSejF32FrWF/MFj43mg
    MD5:9EF1FA1EAA5D55C0DA6609C05718E21C
    SHA1:374EA55E3EAB8023821A1CDEE8160CF29A9780C5
    SHA-256:85B4B2C84AF9203808766A37972DBCDD24978433E3FD4955619A2FAB0D3D911C
    SHA-512:0EF1F1091C34E48BEDC60351B47D7F3F3D69AAFFB1567BC0FFB26D8628E97BC32E91347BCAC2777E5FD6994771FF91560C2CCC5C17EA0166516C95643FC8E4FB
    Malicious:false
    Reputation:low
    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{AD68DF80-C263-11EB-90E6-ECF4BB82F7E0}.dat
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:Microsoft Word Document
    Category:dropped
    Size (bytes):16984
    Entropy (8bit):1.5644550010723464
    Encrypted:false
    SSDEEP:48:IwkGcprpGwpaMG4pQUGrapbSlGQpK7G7HpR7TGIpG:r4ZDQM6iBSPA6TxA
    MD5:F4D6416579BB227BAB1A4ADAFBB93413
    SHA1:E822ED5E86C27F17114E10CAD869BA7569FBC748
    SHA-256:0B82B05419AAAFD0219E35A6DC54F064CDD513CD7DAAEB770314EA7B8789989E
    SHA-512:0AB1B714F8543CB5064B8E00A82CF0ED29EF34427D021813EEDD021CC3C02055D1E1E91FB6E83DB17A7E8485E0FE80985D659F81CA73ECF74BF476DC7A4A5B7D
    Malicious:false
    Reputation:low
    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\ErrorPageTemplate[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):2168
    Entropy (8bit):5.207912016937144
    Encrypted:false
    SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
    MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
    SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
    SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
    SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
    Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\bullet[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
    Category:downloaded
    Size (bytes):447
    Entropy (8bit):7.304718288205936
    Encrypted:false
    SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
    MD5:26F971D87CA00E23BD2D064524AEF838
    SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
    SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
    SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/bullet.png
    Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\down[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
    Category:downloaded
    Size (bytes):748
    Entropy (8bit):7.249606135668305
    Encrypted:false
    SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
    MD5:C4F558C4C8B56858F15C09037CD6625A
    SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
    SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
    SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/down.png
    Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\errorPageStrings[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):4720
    Entropy (8bit):5.164796203267696
    Encrypted:false
    SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
    MD5:D65EC06F21C379C87040B83CC1ABAC6B
    SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
    SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
    SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/errorPageStrings.js
    Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\http_404[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
    Category:downloaded
    Size (bytes):6495
    Entropy (8bit):3.8998802417135856
    Encrypted:false
    SSDEEP:48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM
    MD5:F65C729DC2D457B7A1093813F1253192
    SHA1:5006C9B50108CF582BE308411B157574E5A893FC
    SHA-256:B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F
    SHA-512:717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/http_404.htm
    Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html dir="ltr">.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css">.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 404 Not Found</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\info_48[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
    Category:downloaded
    Size (bytes):4113
    Entropy (8bit):7.9370830126943375
    Encrypted:false
    SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
    MD5:5565250FCC163AA3A79F0B746416CE69
    SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
    SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
    SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/info_48.png
    Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\background_gradient[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
    Category:downloaded
    Size (bytes):453
    Entropy (8bit):5.019973044227213
    Encrypted:false
    SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
    MD5:20F0110ED5E4E0D5384A496E4880139B
    SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
    SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
    SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/background_gradient.jpg
    Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\httpErrorPagesScripts[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):12105
    Entropy (8bit):5.451485481468043
    Encrypted:false
    SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
    MD5:9234071287E637F85D721463C488704C
    SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
    SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
    SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
    Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
    C:\Users\user\AppData\Local\Temp\~DF3189524FBDA53A0D.TMP
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):13029
    Entropy (8bit):0.4797051708082548
    Encrypted:false
    SSDEEP:24:c9lLh9lLh9lIn9lIn9loh9loB9lWOraBcv:kBqoIKUOraBcv
    MD5:0BD5950F2D4A01AA44F9EF8E06CE224F
    SHA1:184654BFCD208AFA856BEB3C420838AF17DFD953
    SHA-256:7B79413A4ADCCA3FDCA01CE1581789E934F44E10E66E99C0A4433699B92381CB
    SHA-512:4BD19504FEFAC1ECFCA2A1DD88623B80D05FB3E53EAB73C8DC15BE14591D566E65CAE7D9B27CD93C655DD4AC11F383BE3CDCB4FA8681D4C1687196318D19EF40
    Malicious:false
    Reputation:low
    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\~DF8E508E98C799B0E6.TMP
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:data
    Category:modified
    Size (bytes):25441
    Entropy (8bit):0.4010301486997805
    Encrypted:false
    SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAvHRV3i9Ms0:kBqoxxJhHWSVSEab/eycgV
    MD5:05DBC1DDC01B0E420E1E22E152078A50
    SHA1:04E6DB39331A903BA2FE8D6872DA74A2906BE41E
    SHA-256:4C8F9F71067302C9617DBAD532E230F8435905F74D50BC4DB16C8B8B995FDD97
    SHA-512:5FDC2E17A28E0EC662670B3F7AA2BB87BD5A8513AD30780A1B0E170102A6C547DC77418B2A211C96BDDEBF78F61663E802F85656C60BE95EE43F464A40ABEE1F
    Malicious:false
    Reputation:low
    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\~DFB1AAEA48B9293B2E.TMP
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):34357
    Entropy (8bit):0.34839932707624066
    Encrypted:false
    SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwFi9lwFy9l2FE9l2Fk8:kBqoxKAuvScS+FlFLFpFYFUIFUs3U5
    MD5:B4561F7D86660688331C775840AB9275
    SHA1:5CEEFA2D5AEDA7E7599CE884E6FFD03E1FEB43A9
    SHA-256:9A7DF7A491D9AE9767224FD5F15AAA4F09D0C647DE27B7CABE713510B143D7E1
    SHA-512:9799B5EAB3D2C2918001AD7A65C0F52281FCE00B8A24F8C4860B0DC8EEC20D6D2B86CFEC6D89CBB48CDBA59A6EBB505149BF358653E329A186B6C21A696A08F3
    Malicious:false
    Reputation:low
    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

    Static File Info

    No static file info

    Network Behavior

    Download Network PCAP: filteredfull

    Network Port Distribution

    • Total Packets: 33
    • 80 (HTTP)
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    May 31, 2021 15:58:16.540416002 CEST4970680192.168.2.7104.21.20.18
    May 31, 2021 15:58:16.540565968 CEST4970580192.168.2.7104.21.20.18
    May 31, 2021 15:58:16.587264061 CEST8049705104.21.20.18192.168.2.7
    May 31, 2021 15:58:16.587286949 CEST8049706104.21.20.18192.168.2.7
    May 31, 2021 15:58:16.587420940 CEST4970580192.168.2.7104.21.20.18
    May 31, 2021 15:58:16.587470055 CEST4970680192.168.2.7104.21.20.18
    May 31, 2021 15:58:16.588399887 CEST4970680192.168.2.7104.21.20.18
    May 31, 2021 15:58:16.630254984 CEST8049706104.21.20.18192.168.2.7
    May 31, 2021 15:58:16.657947063 CEST8049706104.21.20.18192.168.2.7
    May 31, 2021 15:58:16.658099890 CEST4970680192.168.2.7104.21.20.18
    May 31, 2021 15:58:31.629406929 CEST8049705104.21.20.18192.168.2.7
    May 31, 2021 15:58:31.629652023 CEST4970580192.168.2.7104.21.20.18
    TimestampSource PortDest PortSource IPDest IP
    May 31, 2021 15:58:07.884614944 CEST5084853192.168.2.78.8.8.8
    May 31, 2021 15:58:07.943236113 CEST53508488.8.8.8192.168.2.7
    May 31, 2021 15:58:08.710858107 CEST6124253192.168.2.78.8.8.8
    May 31, 2021 15:58:08.764168978 CEST53612428.8.8.8192.168.2.7
    May 31, 2021 15:58:09.617620945 CEST5856253192.168.2.78.8.8.8
    May 31, 2021 15:58:09.670308113 CEST53585628.8.8.8192.168.2.7
    May 31, 2021 15:58:09.711627960 CEST5659053192.168.2.78.8.8.8
    May 31, 2021 15:58:09.774082899 CEST53565908.8.8.8192.168.2.7
    May 31, 2021 15:58:10.528496027 CEST6050153192.168.2.78.8.8.8
    May 31, 2021 15:58:10.581490040 CEST53605018.8.8.8192.168.2.7
    May 31, 2021 15:58:11.883735895 CEST5377553192.168.2.78.8.8.8
    May 31, 2021 15:58:11.933859110 CEST53537758.8.8.8192.168.2.7
    May 31, 2021 15:58:13.188494921 CEST5183753192.168.2.78.8.8.8
    May 31, 2021 15:58:13.239372969 CEST53518378.8.8.8192.168.2.7
    May 31, 2021 15:58:14.131186008 CEST5541153192.168.2.78.8.8.8
    May 31, 2021 15:58:14.183830023 CEST53554118.8.8.8192.168.2.7
    May 31, 2021 15:58:15.092104912 CEST6366853192.168.2.78.8.8.8
    May 31, 2021 15:58:15.154937029 CEST53636688.8.8.8192.168.2.7
    May 31, 2021 15:58:15.267641068 CEST5464053192.168.2.78.8.8.8
    May 31, 2021 15:58:15.319046974 CEST53546408.8.8.8192.168.2.7
    May 31, 2021 15:58:16.465588093 CEST5873953192.168.2.78.8.8.8
    May 31, 2021 15:58:16.471141100 CEST6033853192.168.2.78.8.8.8
    May 31, 2021 15:58:16.522440910 CEST53603388.8.8.8192.168.2.7
    May 31, 2021 15:58:16.528285980 CEST53587398.8.8.8192.168.2.7
    May 31, 2021 15:58:18.424937963 CEST5871753192.168.2.78.8.8.8
    May 31, 2021 15:58:18.474817991 CEST53587178.8.8.8192.168.2.7
    May 31, 2021 15:58:19.456778049 CEST5976253192.168.2.78.8.8.8
    May 31, 2021 15:58:19.506824970 CEST53597628.8.8.8192.168.2.7
    May 31, 2021 15:58:20.573663950 CEST5432953192.168.2.78.8.8.8
    May 31, 2021 15:58:20.631525993 CEST53543298.8.8.8192.168.2.7
    May 31, 2021 15:58:21.388722897 CEST5805253192.168.2.78.8.8.8
    May 31, 2021 15:58:21.440161943 CEST53580528.8.8.8192.168.2.7
    May 31, 2021 15:58:22.177382946 CEST5400853192.168.2.78.8.8.8
    May 31, 2021 15:58:22.230392933 CEST53540088.8.8.8192.168.2.7
    May 31, 2021 15:58:23.109534979 CEST5945153192.168.2.78.8.8.8
    May 31, 2021 15:58:23.159667015 CEST53594518.8.8.8192.168.2.7
    May 31, 2021 15:58:24.240298986 CEST5291453192.168.2.78.8.8.8
    May 31, 2021 15:58:24.290793896 CEST53529148.8.8.8192.168.2.7
    May 31, 2021 15:58:25.106616974 CEST6456953192.168.2.78.8.8.8
    May 31, 2021 15:58:25.156824112 CEST53645698.8.8.8192.168.2.7
    May 31, 2021 15:58:26.260088921 CEST5281653192.168.2.78.8.8.8
    May 31, 2021 15:58:26.313030958 CEST53528168.8.8.8192.168.2.7
    May 31, 2021 15:58:27.424837112 CEST5078153192.168.2.78.8.8.8
    May 31, 2021 15:58:27.474828959 CEST53507818.8.8.8192.168.2.7
    May 31, 2021 15:58:28.775496960 CEST5423053192.168.2.78.8.8.8
    May 31, 2021 15:58:28.833463907 CEST53542308.8.8.8192.168.2.7
    May 31, 2021 15:58:33.130688906 CEST5491153192.168.2.78.8.8.8
    May 31, 2021 15:58:33.190706015 CEST53549118.8.8.8192.168.2.7
    May 31, 2021 15:58:33.580945015 CEST4995853192.168.2.78.8.8.8
    May 31, 2021 15:58:33.633944988 CEST53499588.8.8.8192.168.2.7
    May 31, 2021 15:58:43.945601940 CEST5086053192.168.2.78.8.8.8
    May 31, 2021 15:58:44.012011051 CEST53508608.8.8.8192.168.2.7
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    May 31, 2021 15:58:16.465588093 CEST192.168.2.78.8.8.80x866cStandard query (0)icon-adc.realsh.xyzA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    May 31, 2021 15:58:16.528285980 CEST8.8.8.8192.168.2.70x866cNo error (0)icon-adc.realsh.xyz104.21.20.18A (IP address)IN (0x0001)
    May 31, 2021 15:58:16.528285980 CEST8.8.8.8192.168.2.70x866cNo error (0)icon-adc.realsh.xyz172.67.190.209A (IP address)IN (0x0001)
    • icon-adc.realsh.xyz
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.749706104.21.20.1880C:\Program Files (x86)\Internet Explorer\iexplore.exe
    TimestampkBytes transferredDirectionData
    May 31, 2021 15:58:16.588399887 CEST1057OUTGET / HTTP/1.1
    Accept: text/html, application/xhtml+xml, image/jxr, */*
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: icon-adc.realsh.xyz
    Connection: Keep-Alive
    May 31, 2021 15:58:16.657947063 CEST1058INHTTP/1.1 404 Not Found
    Date: Mon, 31 May 2021 13:58:16 GMT
    Content-Length: 0
    Connection: keep-alive
    CF-Cache-Status: DYNAMIC
    cf-request-id: 0a6450e72a00004eb0c7b84000000001
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v2?s=uK8Xaevo5Iw8sfvE%2Fv%2FGbvVc2W%2FjYjETEjFqpHbfDE2UUxxD8dQDgelcVna%2FSI1lUmsx9IG7ANP2EVVjZtr6dAX76NRCNyDCDBWVrexf3re8d6ElpIlFX90KnANJkAjWRA%3D%3D"}],"group":"cf-nel","max_age":604800}
    NEL: {"report_to":"cf-nel","max_age":604800}
    Server: cloudflare
    CF-RAY: 6580b751dded4eb0-FRA
    alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400


    Code Manipulations

    Statistics

    CPU Usage

    0102030s020406080100

    Click to jump to process

    Memory Usage

    0102030s0.002040MB

    Click to jump to process

    Behavior

    Click to jump to process

    System Behavior

    Start time:15:58:13
    Start date:31/05/2021
    Path:C:\Program Files\internet explorer\iexplore.exe
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
    Imagebase:0x7ff6c3c60000
    File size:823560 bytes
    MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Start time:15:58:14
    Start date:31/05/2021
    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    Wow64 process (32bit):true
    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5540 CREDAT:17410 /prefetch:2
    Imagebase:0x1060000
    File size:822536 bytes
    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    Disassembly