Play interactive tourEdit tour

Analysis Report http://api.btloader.com

Overview

General Information

Sample URL:http://api.btloader.com
Analysis ID:433998
Infos:

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Joe Sandbox was unable to browse the URL (domain or webserver down or HTTPS issue), try to browse the URL again later
Some HTTP requests failed (404). It is likely the sample will exhibit less behavior
  • System is w10x64
  • iexplore.exe (PID: 6120 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4228 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6120 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: api.btloader.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: api.btloader.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Mon, 14 Jun 2021 07:34:36 GMTContent-Length: 19Via: 1.1 googleData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
Source: ~DFDEFCBFB22C2BB792.TMP.1.drString found in binary or memory: http://api.btloader.com/
Source: {F696EBAF-CCE2-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: http://api.btloader.com/Root
Source: classification engineClassification label: unknown0.win@3/14@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F696EBAD-CCE2-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF2FABBF00A98A927E.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6120 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6120 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 433998 URL: http://api.btloader.com Startdate: 14/06/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 1 51 2->5         started        process3 7 iexplore.exe 38 5->7         started        dnsIp4 10 api.btloader.com 130.211.23.194, 49734, 49735, 80 GOOGLEUS United States 7->10

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
http://api.btloader.com1%VirustotalBrowse
http://api.btloader.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
api.btloader.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://api.btloader.com/1%VirustotalBrowse
http://api.btloader.com/0%Avira URL Cloudsafe
http://api.btloader.com/Root0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
api.btloader.com
130.211.23.194
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://api.btloader.com/false
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://api.btloader.com/Root{F696EBAF-CCE2-11EB-90EB-ECF4BBEA1588}.dat.1.drfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
130.211.23.194
api.btloader.comUnited States
15169GOOGLEUSfalse

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:433998
Start date:14.06.2021
Start time:09:33:38
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:http://api.btloader.com
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.win@3/14@1/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • URL browsing timeout or error
Warnings:
  • Exclude process from analysis (whitelisted): ielowutil.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 52.113.196.254, 13.107.3.254, 13.107.253.254, 104.43.139.144, 88.221.62.148, 52.255.188.83, 20.50.102.62
  • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, s-ring.msedge.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, s-ring.s-9999.s-msedge.net, t-ring.msedge.net, t-9999.fb-t-msedge.net, e11290.dspg.akamaiedge.net, teams-9999.teams-msedge.net, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, s-9999.s-msedge.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, t-ring.t-9999.t-msedge.net
  • Not all processes where analyzed, report is missing behavior information
Errors:
  • URL not reachable
No simulations
No context
No context
No context
No context
No context
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F696EBAD-CCE2-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):30296
Entropy (8bit):1.8479992824306049
Encrypted:false
SSDEEP:192:r2ZhZB2AWRtWifkmunzM5GnBNUnDdsf9mZnjX:rynwXjnRyywi
MD5:AC7B146AC1EA2D6F1F658C5B331339A4
SHA1:411D8C7135BC84E278E2B552BECE62E18CAA626E
SHA-256:608330BF67B61DA7B7168258E3B2C43E3C9BB809FF02FD8C9967490AF2754DF5
SHA-512:53FCEFB21523A0D8EFC4898269A8EE04046B57659FA335A056CDADC71CEDB4BA94362DCD2D51FB891326C6D8BFFA48A81A6D5C45043B2E1717190FD2766E4C19
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F696EBAF-CCE2-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):24160
Entropy (8bit):1.6239904847769502
Encrypted:false
SSDEEP:48:Iwz6GcprhhGwpaa6G4pQcIGrapbS1GQpBOGHHpcLTGUp8QGzYpm92GopGXncGyXg:rz+Zh7Qa66cWBS/jd2lWkMUsXyg
MD5:B786819ED2EBAFA28C1640CB83E09F4E
SHA1:4AA012FACE3EF6F60C3F2EFA0FC36AB3AFF0B3F9
SHA-256:C2FBAF30C82B6BC80B960259E57682569C053A9B777474DDFFF16E05C8A25458
SHA-512:098D1968D1575063240A9BEE52AA39D5360EA2A7D84B6EEB70F7D7AF3396E6A7B098CC4E05636E9F1DF137BE886693F6DF15B1B7CFF65732474F1204D4628929
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F696EBB0-CCE2-11EB-90EB-ECF4BBEA1588}.dat
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:Microsoft Word Document
Category:dropped
Size (bytes):16984
Entropy (8bit):1.5615326731315606
Encrypted:false
SSDEEP:48:IwV7GcprkGwpat7G4pQJGrapbSgTGQpKebG7HpRRTGIpG:r/ZcQD6pBSMAZTHA
MD5:53046658240F9840272F727BF8093CE8
SHA1:5AAD5AF991473372E6E0ECE488327476EB7C825F
SHA-256:C63BE03241436539372698E8BB906460DBEE2DCF528E75A7ED4856CD225D5D1B
SHA-512:B2F2FCB581EAC851C3B00F909051E19A4504A759895518F6FA5A0A16C34CF30C1F616A9A0C8F486261D9AFD532E683BE11C9163F7E5A10427A34E09B16FA4E7E
Malicious:false
Reputation:low
Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\http_404[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
Category:downloaded
Size (bytes):6495
Entropy (8bit):3.8998802417135856
Encrypted:false
SSDEEP:48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM
MD5:F65C729DC2D457B7A1093813F1253192
SHA1:5006C9B50108CF582BE308411B157574E5A893FC
SHA-256:B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F
SHA-512:717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/http_404.htm
Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html dir="ltr">.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css">.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 404 Not Found</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\info_48[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
Category:downloaded
Size (bytes):4113
Entropy (8bit):7.9370830126943375
Encrypted:false
SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
MD5:5565250FCC163AA3A79F0B746416CE69
SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/info_48.png
Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\down[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):748
Entropy (8bit):7.249606135668305
Encrypted:false
SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
MD5:C4F558C4C8B56858F15C09037CD6625A
SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/down.png
Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\errorPageStrings[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):4720
Entropy (8bit):5.164796203267696
Encrypted:false
SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
MD5:D65EC06F21C379C87040B83CC1ABAC6B
SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/errorPageStrings.js
Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\background_gradient[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
Category:downloaded
Size (bytes):453
Entropy (8bit):5.019973044227213
Encrypted:false
SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
MD5:20F0110ED5E4E0D5384A496E4880139B
SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/background_gradient.jpg
Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\httpErrorPagesScripts[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):12105
Entropy (8bit):5.451485481468043
Encrypted:false
SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
MD5:9234071287E637F85D721463C488704C
SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\ErrorPageTemplate[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:downloaded
Size (bytes):2168
Entropy (8bit):5.207912016937144
Encrypted:false
SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bullet[1]
Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
Category:downloaded
Size (bytes):447
Entropy (8bit):7.304718288205936
Encrypted:false
SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
MD5:26F971D87CA00E23BD2D064524AEF838
SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
Malicious:false
Reputation:low
IE Cache URL:res://ieframe.dll/bullet.png
Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
C:\Users\user\AppData\Local\Temp\~DF2FABBF00A98A927E.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):13029
Entropy (8bit):0.4723857120089621
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9loVS9loVC9lWVhnUEnIbIyVEV3:kBqoIfpx
MD5:43E0F28F92BEFEA04ACE7905072D77CC
SHA1:41B3EA6090D5D719F19A41766404CCCE7C0CB187
SHA-256:7081DDA9D13C3705CD0A2320630FCC54BC3EFB4EFB13CB08311B0A038AFC4280
SHA-512:9239782C45C9514051443C8FD644BAF9C4A62EFDC7FA3016C88B82474EA4E9418DF28FB9605617CF9D50663C482FE71ECB152EAD60806E81EABC6AFABF4ED697
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DF48803CDC04CA19E6.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):25441
Entropy (8bit):0.27918767598683664
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
MD5:AB889A32AB9ACD33E816C2422337C69A
SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Temp\~DFDEFCBFB22C2BB792.TMP
Process:C:\Program Files\internet explorer\iexplore.exe
File Type:data
Category:dropped
Size (bytes):34353
Entropy (8bit):0.34550913988649845
Encrypted:false
SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwT9lwT9l2l9l2l9l/9k:kBqoxKAuvScS+sKQx9I94XnO
MD5:4F15045E616430976927A518BA4112EE
SHA1:307171D577189396A51F7E95533B9D4B9954CB15
SHA-256:BD04BC118B8B12B47CC182CFE9B115255D2C2C82D0465551A3233C7AAE28DC5B
SHA-512:C073E5715BA1120534EE50CE08292A8F9FC972E8F872F12ADE2E27E3EF9E68C96963FF2FEAE5A208CEB848F8E2EC279140976F5F613DBAF21AA9823FFEEE9874
Malicious:false
Reputation:low
Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

No static file info

Network Behavior

Download Network PCAP: filteredfull

Network Port Distribution

  • Total Packets: 30
  • 80 (HTTP)
  • 53 (DNS)
TimestampSource PortDest PortSource IPDest IP
Jun 14, 2021 09:34:36.822216988 CEST4973480192.168.2.4130.211.23.194
Jun 14, 2021 09:34:36.823146105 CEST4973580192.168.2.4130.211.23.194
Jun 14, 2021 09:34:36.873328924 CEST8049735130.211.23.194192.168.2.4
Jun 14, 2021 09:34:36.873486042 CEST4973580192.168.2.4130.211.23.194
Jun 14, 2021 09:34:36.874603987 CEST4973580192.168.2.4130.211.23.194
Jun 14, 2021 09:34:36.875374079 CEST8049734130.211.23.194192.168.2.4
Jun 14, 2021 09:34:36.875524998 CEST4973480192.168.2.4130.211.23.194
Jun 14, 2021 09:34:36.924686909 CEST8049735130.211.23.194192.168.2.4
Jun 14, 2021 09:34:37.039510965 CEST8049735130.211.23.194192.168.2.4
Jun 14, 2021 09:34:37.040106058 CEST4973580192.168.2.4130.211.23.194
TimestampSource PortDest PortSource IPDest IP
Jun 14, 2021 09:34:28.571413040 CEST5309753192.168.2.48.8.8.8
Jun 14, 2021 09:34:28.622524023 CEST53530978.8.8.8192.168.2.4
Jun 14, 2021 09:34:29.461055994 CEST4925753192.168.2.48.8.8.8
Jun 14, 2021 09:34:29.513972998 CEST53492578.8.8.8192.168.2.4
Jun 14, 2021 09:34:29.787749052 CEST6238953192.168.2.48.8.8.8
Jun 14, 2021 09:34:29.838020086 CEST53623898.8.8.8192.168.2.4
Jun 14, 2021 09:34:29.863974094 CEST4991053192.168.2.48.8.8.8
Jun 14, 2021 09:34:29.918442011 CEST53499108.8.8.8192.168.2.4
Jun 14, 2021 09:34:30.037357092 CEST5585453192.168.2.48.8.8.8
Jun 14, 2021 09:34:30.090131044 CEST53558548.8.8.8192.168.2.4
Jun 14, 2021 09:34:33.052150965 CEST6454953192.168.2.48.8.8.8
Jun 14, 2021 09:34:33.110927105 CEST53645498.8.8.8192.168.2.4
Jun 14, 2021 09:34:34.182657003 CEST6315353192.168.2.48.8.8.8
Jun 14, 2021 09:34:34.241410971 CEST53631538.8.8.8192.168.2.4
Jun 14, 2021 09:34:35.419507980 CEST5299153192.168.2.48.8.8.8
Jun 14, 2021 09:34:35.477838039 CEST53529918.8.8.8192.168.2.4
Jun 14, 2021 09:34:35.518454075 CEST5370053192.168.2.48.8.8.8
Jun 14, 2021 09:34:35.568495989 CEST53537008.8.8.8192.168.2.4
Jun 14, 2021 09:34:36.752123117 CEST5172653192.168.2.48.8.8.8
Jun 14, 2021 09:34:36.811847925 CEST53517268.8.8.8192.168.2.4
Jun 14, 2021 09:34:36.863177061 CEST5679453192.168.2.48.8.8.8
Jun 14, 2021 09:34:36.916501045 CEST53567948.8.8.8192.168.2.4
Jun 14, 2021 09:34:38.456026077 CEST5653453192.168.2.48.8.8.8
Jun 14, 2021 09:34:38.507179022 CEST53565348.8.8.8192.168.2.4
Jun 14, 2021 09:34:39.756434917 CEST5662753192.168.2.48.8.8.8
Jun 14, 2021 09:34:39.806432962 CEST53566278.8.8.8192.168.2.4
Jun 14, 2021 09:34:40.684123039 CEST5662153192.168.2.48.8.8.8
Jun 14, 2021 09:34:40.742743969 CEST53566218.8.8.8192.168.2.4
Jun 14, 2021 09:34:41.517076969 CEST6311653192.168.2.48.8.8.8
Jun 14, 2021 09:34:41.567176104 CEST53631168.8.8.8192.168.2.4
Jun 14, 2021 09:34:43.600970030 CEST6407853192.168.2.48.8.8.8
Jun 14, 2021 09:34:43.650928020 CEST53640788.8.8.8192.168.2.4
Jun 14, 2021 09:34:44.952768087 CEST6480153192.168.2.48.8.8.8
Jun 14, 2021 09:34:45.004776955 CEST53648018.8.8.8192.168.2.4
Jun 14, 2021 09:34:45.872181892 CEST6172153192.168.2.48.8.8.8
Jun 14, 2021 09:34:45.925064087 CEST53617218.8.8.8192.168.2.4
Jun 14, 2021 09:34:48.588537931 CEST5125553192.168.2.48.8.8.8
Jun 14, 2021 09:34:48.639358044 CEST53512558.8.8.8192.168.2.4
Jun 14, 2021 09:34:53.087533951 CEST6152253192.168.2.48.8.8.8
Jun 14, 2021 09:34:53.140542984 CEST53615228.8.8.8192.168.2.4
Jun 14, 2021 09:34:54.508927107 CEST5233753192.168.2.48.8.8.8
Jun 14, 2021 09:34:54.562210083 CEST53523378.8.8.8192.168.2.4
Jun 14, 2021 09:34:55.439815998 CEST5504653192.168.2.48.8.8.8
Jun 14, 2021 09:34:55.493043900 CEST53550468.8.8.8192.168.2.4
Jun 14, 2021 09:34:56.394273043 CEST4961253192.168.2.48.8.8.8
Jun 14, 2021 09:34:56.455624104 CEST53496128.8.8.8192.168.2.4
Jun 14, 2021 09:34:57.429343939 CEST4928553192.168.2.48.8.8.8
Jun 14, 2021 09:34:57.491137981 CEST53492858.8.8.8192.168.2.4
TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Jun 14, 2021 09:34:36.752123117 CEST192.168.2.48.8.8.80x6844Standard query (0)api.btloader.comA (IP address)IN (0x0001)
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Jun 14, 2021 09:34:36.811847925 CEST8.8.8.8192.168.2.40x6844No error (0)api.btloader.com130.211.23.194A (IP address)IN (0x0001)
  • api.btloader.com
Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.449735130.211.23.19480C:\Program Files (x86)\Internet Explorer\iexplore.exe
TimestampkBytes transferredDirectionData
Jun 14, 2021 09:34:36.874603987 CEST2513OUTGET / HTTP/1.1
Accept: text/html, application/xhtml+xml, image/jxr, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: api.btloader.com
Connection: Keep-Alive
Jun 14, 2021 09:34:37.039510965 CEST2514INHTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
Date: Mon, 14 Jun 2021 07:34:36 GMT
Content-Length: 19
Via: 1.1 google
Data Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a
Data Ascii: 404 page not found


Code Manipulations

Statistics

CPU Usage

0102030s020406080100

Click to jump to process

Memory Usage

0102030s0.002040MB

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:09:34:34
Start date:14/06/2021
Path:C:\Program Files\internet explorer\iexplore.exe
Wow64 process (32bit):false
Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Imagebase:0x7ff6377f0000
File size:823560 bytes
MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Start time:09:34:35
Start date:14/06/2021
Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6120 CREDAT:17410 /prefetch:2
Imagebase:0xde0000
File size:822536 bytes
MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly