Play interactive tourEdit tour

Analysis Report http://mout.perfora.net

Overview

General Information

Sample URL:http://mout.perfora.net
Analysis ID:429888
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work
Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later



  • System is w10x64
  • iexplore.exe (PID: 5808 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5428 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5808 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.3:49728 -> 74.208.4.196:80
Source: global trafficTCP traffic: 192.168.2.3:49736 -> 74.208.4.197:80
Source: global trafficTCP traffic: 192.168.2.3:49742 -> 74.208.4.195:80
Source: global trafficTCP traffic: 192.168.2.3:49744 -> 74.208.4.194:80
Source: unknownDNS traffic detected: queries for: mout.perfora.net
Source: ~DF193BE2D7F610AB35.TMP.1.drString found in binary or memory: http://mout.perfora.net/
Source: {C570FF91-C5C0-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: http://mout.perfora.net/Root
Source: classification engineClassification label: unknown0.win@3/11@2/4
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF631EBF2048EE69F6.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5808 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5808 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 429888 URL: http://mout.perfora.net Startdate: 04/06/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 2 62 2->5         started        process3 7 iexplore.exe 36 5->7         started        dnsIp4 10 74.208.4.194, 80 ONEANDONE-ASBrauerstrasse48DE United States 7->10 12 74.208.4.195, 80 ONEANDONE-ASBrauerstrasse48DE United States 7->12 14 2 other IPs or domains 7->14

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://mout.perfora.net3%VirustotalBrowse
http://mout.perfora.net0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
mout.perfora.net
74.208.4.196
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://mout.perfora.net/~DF193BE2D7F610AB35.TMP.1.drfalse
      high
      http://mout.perfora.net/Root{C570FF91-C5C0-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        74.208.4.197
        unknownUnited States
        8560ONEANDONE-ASBrauerstrasse48DEfalse
        74.208.4.194
        unknownUnited States
        8560ONEANDONE-ASBrauerstrasse48DEfalse
        74.208.4.196
        mout.perfora.netUnited States
        8560ONEANDONE-ASBrauerstrasse48DEfalse
        74.208.4.195
        unknownUnited States
        8560ONEANDONE-ASBrauerstrasse48DEfalse

        General Information

        Joe Sandbox Version:32.0.0 Black Diamond
        Analysis ID:429888
        Start date:04.06.2021
        Start time:22:41:25
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 2m 36s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://mout.perfora.net
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:UNKNOWN
        Classification:unknown0.win@3/11@2/4
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • URL browsing timeout or error
        Warnings:
        • Exclude process from analysis (whitelisted): taskhostw.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 13.88.21.125, 13.64.90.137, 88.221.62.148, 104.42.151.234, 168.61.161.212, 104.43.193.48, 20.82.209.104, 152.199.19.161, 92.122.144.200
        • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ie9comview.vo.msecnd.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, e11290.dspg.akamaiedge.net, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, iecvlist.microsoft.com, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, cs9.wpc.v0cdn.net
        • Not all processes where analyzed, report is missing behavior information
        Errors:
        • URL not reachable
        No simulations
        No context
        No context
        No context
        No context
        No context
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C570FF8F-C5C0-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):30296
        Entropy (8bit):1.843851685842563
        Encrypted:false
        SSDEEP:192:rcZ3Zao2a7bWa7tOta7tC/fa7tCOLhMa7t6mOBa7t6ZOsa7t6ZNOxfa7t6ZNONkQ:rcJYZnV3//IU
        MD5:492D73AAAF6951AD98EE3858F5847736
        SHA1:F822F7D8C5CD3D21DF5F4041B8FAEF8B7FBB8847
        SHA-256:70AF133F9236497C45FE03127E0A840E5BBC384E564E04A6AB93BB8276E91CF6
        SHA-512:F55F4AA162F4D65CE92B4837C348C01F1D4A748521C45B6F10BD9F592EB569B357403D6ED13CDD86640FF1CFA8594A2EADF0F9D641C7D490D9D1583AEDD4E426
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C570FF91-C5C0-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):24160
        Entropy (8bit):1.6262689423837005
        Encrypted:false
        SSDEEP:48:IwmGcprzGwpafG4pQnGrapbSfZGQpByGHHpcQaTGUp8kWGzYpmIZOGopG2V1WGyw:r6ZtQx67BS7jJ2dWRMts82g
        MD5:42943E684A5807830B62EB9FFB8DA7E3
        SHA1:866FCD04994E3B7D4BC16F66E2EB9FE919298A12
        SHA-256:ABAC683C0DB75ED71DD68BD48E0936F6CDAD00BFAAE7C079AEACE65000BFB69E
        SHA-512:52FA7C7098BD14E282FCFF4AA78E47592625D92CC6EFB324BF3084B679EA3CE2182AE6ABB640ED67358D0A0ED9B131D5C751A1D8305396D3013B29852B03F782
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{CF4913E3-C5C0-11EB-90E4-ECF4BB862DED}.dat
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:Microsoft Word Document
        Category:dropped
        Size (bytes):16984
        Entropy (8bit):1.5650531810780535
        Encrypted:false
        SSDEEP:48:IwtGcproGwpaMG4pQsGrapbSnZGQpKRG7HpRLaTGIpG:rzZwQM6qBSzAATSA
        MD5:30C76876D2E4CA36B49BBED059878BC1
        SHA1:13E77603DF2144C5050E8BDA1FB92223277C977B
        SHA-256:C21C0F94546EB65CFCFFAF1EFC5C0F492BB62E24202CA13C388E6350285E69B3
        SHA-512:4F25EE3F30B1C1B7CABB37706DE72049F73D510AC44BE2F541A4162FD73811A23CF69E10812D335DA0FC49BB343BF373FB58BC64B101C3D1617DADB7DF1F0DFE
        Malicious:false
        Reputation:low
        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):4720
        Entropy (8bit):5.164796203267696
        Encrypted:false
        SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
        MD5:D65EC06F21C379C87040B83CC1ABAC6B
        SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
        SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
        SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/errorPageStrings.js
        Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\NewErrorPageTemplate[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):1612
        Entropy (8bit):4.869554560514657
        Encrypted:false
        SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
        MD5:DFEABDE84792228093A5A270352395B6
        SHA1:E41258C9576721025926326F76063C2305586F76
        SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
        SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
        Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):12105
        Entropy (8bit):5.451485481468043
        Encrypted:false
        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
        MD5:9234071287E637F85D721463C488704C
        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
        Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\dnserror[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
        Category:downloaded
        Size (bytes):2997
        Entropy (8bit):4.4885437940628465
        Encrypted:false
        SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
        MD5:2DC61EB461DA1436F5D22BCE51425660
        SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
        SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
        SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=0
        Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\down[1]
        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
        Category:downloaded
        Size (bytes):748
        Entropy (8bit):7.249606135668305
        Encrypted:false
        SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
        MD5:C4F558C4C8B56858F15C09037CD6625A
        SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
        SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
        SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
        Malicious:false
        Reputation:low
        IE Cache URL:res://ieframe.dll/down.png
        Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
        C:\Users\user\AppData\Local\Temp\~DF193BE2D7F610AB35.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):34353
        Entropy (8bit):0.34658404180935204
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw2f9lw2f9l22B9l22Bs:kBqoxKAuvScS+5XF0III42/
        MD5:16FA68B32C9AE8D49CC111DDBE8BF532
        SHA1:68E0A27B46D83E715FEC5B8AA68677661FD838E1
        SHA-256:1860EC5C7E576DB2A4657B7D01C6C6BD114B17BECCABB769AF6E99547583C785
        SHA-512:F0F04813AB4A977C7D1320F722D4ED6D2D461284D648A635B1150CA34EB6CCE79521409F4E40254B77296967A32FEB8F267E684D9A59BDD5623D2728488BD109
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\~DF3DB1A7A2071B95C9.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):25441
        Entropy (8bit):0.39573800375597756
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAggCZf2BmQ:kBqoxxJhHWSVSEab2+
        MD5:42FDDC900EA7E321A763A28104701987
        SHA1:6C593C456B95DF3EACF4391A17D91796004C9484
        SHA-256:C9A0E1E878616F08E1198F5669D05CFCAD6D12FABE0489CBF83266E2021DAA0B
        SHA-512:9DAF569087EA682DC4F7664597EEB64636E97D4E7631719C438E228E08ABB5BE85B6164C1F5D9C895380FD955287455789518BA58E99615EA74F67224668CBB9
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\~DF631EBF2048EE69F6.TMP
        Process:C:\Program Files\internet explorer\iexplore.exe
        File Type:data
        Category:dropped
        Size (bytes):13029
        Entropy (8bit):0.4768473089486685
        Encrypted:false
        SSDEEP:24:c9lLh9lLh9lIn9lIn9loaDF9loaJ9lWa7tGROtGJlGJZNON2:kBqoIaSaMa7tGROtGJlGJZNON2
        MD5:DD1F0B2BA0945E78A47C76A1A02256DF
        SHA1:B20C292C2FB566D24A42AD92B86CD12B9A203591
        SHA-256:3173E65F24D618B041FC2BA8B2D68900C75BCEC5C579C0EB6D7F3A11329B0A87
        SHA-512:B76B2F8A92CBD78F52C507131679987AEF54D19098627C6F1D20131C60F1A1EFCE4101850B1385233BF89A0843066E5B20F8827D71005F32E8CEAFB539F1D8E7
        Malicious:false
        Reputation:low
        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        No static file info

        Network Behavior

        Download Network PCAP: filteredfull

        Network Port Distribution

        • Total Packets: 59
        • 80 (HTTP)
        • 53 (DNS)
        TimestampSource PortDest PortSource IPDest IP
        Jun 4, 2021 22:42:13.068175077 CEST4972880192.168.2.374.208.4.196
        Jun 4, 2021 22:42:13.070015907 CEST4972980192.168.2.374.208.4.196
        Jun 4, 2021 22:42:14.069029093 CEST4972880192.168.2.374.208.4.196
        Jun 4, 2021 22:42:14.069052935 CEST4972980192.168.2.374.208.4.196
        Jun 4, 2021 22:42:16.069367886 CEST4972880192.168.2.374.208.4.196
        Jun 4, 2021 22:42:16.069403887 CEST4972980192.168.2.374.208.4.196
        Jun 4, 2021 22:42:20.072400093 CEST4973680192.168.2.374.208.4.197
        Jun 4, 2021 22:42:20.073312998 CEST4973780192.168.2.374.208.4.197
        Jun 4, 2021 22:42:21.085459948 CEST4973680192.168.2.374.208.4.197
        Jun 4, 2021 22:42:21.085485935 CEST4973780192.168.2.374.208.4.197
        Jun 4, 2021 22:42:23.085478067 CEST4973680192.168.2.374.208.4.197
        Jun 4, 2021 22:42:23.086229086 CEST4973780192.168.2.374.208.4.197
        Jun 4, 2021 22:42:27.162080050 CEST4974280192.168.2.374.208.4.195
        Jun 4, 2021 22:42:27.162467957 CEST4974380192.168.2.374.208.4.195
        Jun 4, 2021 22:42:28.148389101 CEST4974280192.168.2.374.208.4.195
        Jun 4, 2021 22:42:28.163981915 CEST4974380192.168.2.374.208.4.195
        Jun 4, 2021 22:42:30.148507118 CEST4974280192.168.2.374.208.4.195
        Jun 4, 2021 22:42:30.351716995 CEST4974380192.168.2.374.208.4.195
        Jun 4, 2021 22:42:34.150160074 CEST4974480192.168.2.374.208.4.194
        Jun 4, 2021 22:42:34.353146076 CEST4974580192.168.2.374.208.4.194
        Jun 4, 2021 22:42:35.164561033 CEST4974480192.168.2.374.208.4.194
        Jun 4, 2021 22:42:35.367710114 CEST4974580192.168.2.374.208.4.194
        Jun 4, 2021 22:42:37.164699078 CEST4974480192.168.2.374.208.4.194
        Jun 4, 2021 22:42:37.383503914 CEST4974580192.168.2.374.208.4.194
        Jun 4, 2021 22:42:41.425333023 CEST4975080192.168.2.374.208.4.196
        Jun 4, 2021 22:42:42.587146997 CEST4975080192.168.2.374.208.4.196
        Jun 4, 2021 22:42:44.587264061 CEST4975080192.168.2.374.208.4.196
        TimestampSource PortDest PortSource IPDest IP
        Jun 4, 2021 22:42:04.195569038 CEST53608318.8.8.8192.168.2.3
        Jun 4, 2021 22:42:05.085366011 CEST6010053192.168.2.38.8.8.8
        Jun 4, 2021 22:42:05.128602982 CEST53601008.8.8.8192.168.2.3
        Jun 4, 2021 22:42:06.448530912 CEST5319553192.168.2.38.8.8.8
        Jun 4, 2021 22:42:06.491110086 CEST53531958.8.8.8192.168.2.3
        Jun 4, 2021 22:42:07.621665955 CEST5014153192.168.2.38.8.8.8
        Jun 4, 2021 22:42:07.665184021 CEST53501418.8.8.8192.168.2.3
        Jun 4, 2021 22:42:08.723162889 CEST5302353192.168.2.38.8.8.8
        Jun 4, 2021 22:42:08.766402960 CEST53530238.8.8.8192.168.2.3
        Jun 4, 2021 22:42:09.933060884 CEST4956353192.168.2.38.8.8.8
        Jun 4, 2021 22:42:09.975385904 CEST53495638.8.8.8192.168.2.3
        Jun 4, 2021 22:42:11.049700975 CEST5135253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:11.095976114 CEST53513528.8.8.8192.168.2.3
        Jun 4, 2021 22:42:11.789376020 CEST5934953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:11.836126089 CEST53593498.8.8.8192.168.2.3
        Jun 4, 2021 22:42:12.264071941 CEST5708453192.168.2.38.8.8.8
        Jun 4, 2021 22:42:12.308161974 CEST53570848.8.8.8192.168.2.3
        Jun 4, 2021 22:42:13.011154890 CEST5882353192.168.2.38.8.8.8
        Jun 4, 2021 22:42:13.054007053 CEST53588238.8.8.8192.168.2.3
        Jun 4, 2021 22:42:13.481853008 CEST5756853192.168.2.38.8.8.8
        Jun 4, 2021 22:42:13.524102926 CEST53575688.8.8.8192.168.2.3
        Jun 4, 2021 22:42:14.652160883 CEST5054053192.168.2.38.8.8.8
        Jun 4, 2021 22:42:14.694508076 CEST53505408.8.8.8192.168.2.3
        Jun 4, 2021 22:42:16.355297089 CEST5436653192.168.2.38.8.8.8
        Jun 4, 2021 22:42:16.397902012 CEST53543668.8.8.8192.168.2.3
        Jun 4, 2021 22:42:17.664153099 CEST5303453192.168.2.38.8.8.8
        Jun 4, 2021 22:42:17.706309080 CEST53530348.8.8.8192.168.2.3
        Jun 4, 2021 22:42:18.593507051 CEST5776253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:18.635684967 CEST53577628.8.8.8192.168.2.3
        Jun 4, 2021 22:42:19.907933950 CEST5543553192.168.2.38.8.8.8
        Jun 4, 2021 22:42:19.950073004 CEST53554358.8.8.8192.168.2.3
        Jun 4, 2021 22:42:21.215626001 CEST5071353192.168.2.38.8.8.8
        Jun 4, 2021 22:42:21.258100033 CEST53507138.8.8.8192.168.2.3
        Jun 4, 2021 22:42:22.457612991 CEST5613253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:22.500333071 CEST53561328.8.8.8192.168.2.3
        Jun 4, 2021 22:42:23.690339088 CEST5898753192.168.2.38.8.8.8
        Jun 4, 2021 22:42:23.733340025 CEST53589878.8.8.8192.168.2.3
        Jun 4, 2021 22:42:24.936685085 CEST5657953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:24.979149103 CEST53565798.8.8.8192.168.2.3
        Jun 4, 2021 22:42:40.669689894 CEST6063353192.168.2.38.8.8.8
        Jun 4, 2021 22:42:40.726269960 CEST53606338.8.8.8192.168.2.3
        Jun 4, 2021 22:42:41.972810984 CEST6129253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:42.017586946 CEST53612928.8.8.8192.168.2.3
        Jun 4, 2021 22:42:42.666070938 CEST6361953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:42.708756924 CEST53636198.8.8.8192.168.2.3
        Jun 4, 2021 22:42:42.770394087 CEST6493853192.168.2.38.8.8.8
        Jun 4, 2021 22:42:42.814811945 CEST53649388.8.8.8192.168.2.3
        Jun 4, 2021 22:42:43.010900974 CEST6129253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:43.055969954 CEST53612928.8.8.8192.168.2.3
        Jun 4, 2021 22:42:43.683413982 CEST6361953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:43.727495909 CEST53636198.8.8.8192.168.2.3
        Jun 4, 2021 22:42:44.072868109 CEST6129253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:44.116214037 CEST53612928.8.8.8192.168.2.3
        Jun 4, 2021 22:42:44.728168011 CEST6361953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:44.773350954 CEST53636198.8.8.8192.168.2.3
        Jun 4, 2021 22:42:46.118829966 CEST6129253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:46.164201021 CEST53612928.8.8.8192.168.2.3
        Jun 4, 2021 22:42:46.728266001 CEST6361953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:46.770653009 CEST53636198.8.8.8192.168.2.3
        Jun 4, 2021 22:42:48.602102041 CEST6194653192.168.2.38.8.8.8
        Jun 4, 2021 22:42:48.646265030 CEST53619468.8.8.8192.168.2.3
        Jun 4, 2021 22:42:50.166062117 CEST6129253192.168.2.38.8.8.8
        Jun 4, 2021 22:42:50.209271908 CEST53612928.8.8.8192.168.2.3
        Jun 4, 2021 22:42:50.775557995 CEST6361953192.168.2.38.8.8.8
        Jun 4, 2021 22:42:50.817785025 CEST53636198.8.8.8192.168.2.3
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Jun 4, 2021 22:42:13.011154890 CEST192.168.2.38.8.8.80xf67bStandard query (0)mout.perfora.netA (IP address)IN (0x0001)
        Jun 4, 2021 22:42:48.602102041 CEST192.168.2.38.8.8.80xed72Standard query (0)mout.perfora.netA (IP address)IN (0x0001)
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Jun 4, 2021 22:42:13.054007053 CEST8.8.8.8192.168.2.30xf67bNo error (0)mout.perfora.net74.208.4.196A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:13.054007053 CEST8.8.8.8192.168.2.30xf67bNo error (0)mout.perfora.net74.208.4.197A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:13.054007053 CEST8.8.8.8192.168.2.30xf67bNo error (0)mout.perfora.net74.208.4.195A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:13.054007053 CEST8.8.8.8192.168.2.30xf67bNo error (0)mout.perfora.net74.208.4.194A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:48.646265030 CEST8.8.8.8192.168.2.30xed72No error (0)mout.perfora.net74.208.4.197A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:48.646265030 CEST8.8.8.8192.168.2.30xed72No error (0)mout.perfora.net74.208.4.195A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:48.646265030 CEST8.8.8.8192.168.2.30xed72No error (0)mout.perfora.net74.208.4.196A (IP address)IN (0x0001)
        Jun 4, 2021 22:42:48.646265030 CEST8.8.8.8192.168.2.30xed72No error (0)mout.perfora.net74.208.4.194A (IP address)IN (0x0001)

        Code Manipulations

        Statistics

        CPU Usage

        01020304050s020406080100

        Click to jump to process

        Memory Usage

        01020304050s0.002040MB

        Click to jump to process

        Behavior

        Click to jump to process

        System Behavior

        Start time:22:42:10
        Start date:04/06/2021
        Path:C:\Program Files\internet explorer\iexplore.exe
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
        Imagebase:0x7ff614180000
        File size:823560 bytes
        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Start time:22:42:11
        Start date:04/06/2021
        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
        Wow64 process (32bit):true
        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5808 CREDAT:17410 /prefetch:2
        Imagebase:0x1020000
        File size:822536 bytes
        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Disassembly