Analysis

Category Package Started Completed Duration Options Log
URL ie 2020-02-07 15:54:48 2020-02-07 15:55:57 69 seconds Show Options Show Log
route = inetsim
procdump = 1
2020-02-07 16:55:03,000 [root] INFO: Date set to: 02-07-20, time set to: 15:55:03, timeout set to: 200
2020-02-07 16:55:03,046 [root] DEBUG: Starting analyzer from: C:\ryhka
2020-02-07 16:55:03,046 [root] DEBUG: Storing results at: C:\tgQuIpD
2020-02-07 16:55:03,046 [root] DEBUG: Pipe server name: \\.\PIPE\FnEKqG
2020-02-07 16:55:03,046 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-02-07 16:55:03,046 [root] INFO: Automatically selected analysis package "ie"
2020-02-07 16:55:04,421 [root] DEBUG: Started auxiliary module Browser
2020-02-07 16:55:04,421 [root] DEBUG: Started auxiliary module Curtain
2020-02-07 16:55:04,421 [modules.auxiliary.digisig] DEBUG: Skipping authenticode validation, analysis is not a file.
2020-02-07 16:55:04,421 [root] DEBUG: Started auxiliary module DigiSig
2020-02-07 16:55:04,437 [root] DEBUG: Started auxiliary module Disguise
2020-02-07 16:55:04,437 [root] DEBUG: Started auxiliary module Human
2020-02-07 16:55:04,437 [root] DEBUG: Started auxiliary module Screenshots
2020-02-07 16:55:04,437 [root] DEBUG: Started auxiliary module Sysmon
2020-02-07 16:55:04,437 [root] DEBUG: Started auxiliary module Usage
2020-02-07 16:55:04,437 [root] INFO: Analyzer: Package modules.packages.ie does not specify a DLL option
2020-02-07 16:55:04,437 [root] INFO: Analyzer: Package modules.packages.ie does not specify a DLL_64 option
2020-02-07 16:55:04,467 [lib.api.process] INFO: Successfully executed process from path "C:\Program Files\Internet Explorer\iexplore.exe" with arguments ""https://onedrive.live.com/redir?resid=3AADA808C1858F4A%21112&authkey=%21ADgD5hhv3eAst6I&page=View&wd=target%28Quick%20Notes.one%7C37a31a00-f592-4d33-bd50-5dcbd78d4776%2FProTech%20Thermal%20Services%202020-02-06%7Caacc9179-286c-4ce2-b69b-2c3c242ec7b9%2F%29"" with pid 1052
2020-02-07 16:55:04,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-07 16:55:04,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\ryhka\dll\cMcLBD.dll, loader C:\ryhka\bin\zPpiXAj.exe
2020-02-07 16:55:04,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\FnEKqG.
2020-02-07 16:55:04,953 [root] DEBUG: Loader: Injecting process 1052 (thread 1848) with C:\ryhka\dll\cMcLBD.dll.
2020-02-07 16:55:04,953 [root] DEBUG: Process image base: 0x003B0000
2020-02-07 16:55:04,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\ryhka\dll\cMcLBD.dll.
2020-02-07 16:55:05,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-07 16:55:05,108 [root] DEBUG: Successfully injected DLL C:\ryhka\dll\cMcLBD.dll.
2020-02-07 16:55:05,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1052
2020-02-07 16:55:08,092 [lib.api.process] INFO: Successfully resumed process with pid 1052
2020-02-07 16:55:09,155 [root] INFO: Added new process to list with pid: 1052
2020-02-07 16:55:09,421 [root] DEBUG: Terminate processes on terminate_event disabled.
2020-02-07 16:55:10,046 [root] DEBUG: Process dumps enabled.
2020-02-07 16:55:10,296 [root] INFO: Disabling sleep skipping.
2020-02-07 16:55:10,296 [root] INFO: Disabling sleep skipping.
2020-02-07 16:55:10,296 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-02-07 16:55:10,296 [root] INFO: Disabling sleep skipping.
2020-02-07 16:55:10,328 [root] INFO: Disabling sleep skipping.
2020-02-07 16:55:10,328 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 1052 at 0x6c2d0000, image base 0x3b0000, stack from 0x1e2000-0x1f0000
2020-02-07 16:55:10,342 [root] DEBUG: Commandline: C:\Users\Rebecca\AppData\Local\Temp\"C:\Program Files\Internet Explorer\iexplore.exe" "https:\onedrive.live.com\redir?resid=3AADA808C1858F4A-- UNKNOWN FORMAT STRING -- 1112&authkey=-- UNKNOWN FORMAT STRING -- 1ADgD5hhv3eAst6I&page=View&wd=target-- UNKNOWN FORMAT STRING -- 8Quick-- UNKNOWN FORMAT STRING -- 0Notes.one-- UNKNOWN FORMAT STRING -- C37a31a00-f592-4d33-bd50-
2020-02-07 16:55:10,342 [root] INFO: Monitor successfully loaded in process with pid 1052.
2020-02-07 16:55:10,342 [root] DEBUG: DLL unloaded from 0x75290000.
2020-02-07 16:55:10,342 [root] DEBUG: DLL loaded at 0x74AC0000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2020-02-07 16:55:10,375 [root] DEBUG: DLL loaded at 0x6DCB0000: C:\Windows\system32\api-ms-win-downlevel-shell32-l1-1-0 (0x4000 bytes).
2020-02-07 16:55:10,390 [root] DEBUG: DLL loaded at 0x76200000: C:\Windows\system32\shell32 (0xc4c000 bytes).
2020-02-07 16:55:10,390 [root] DEBUG: DLL loaded at 0x6E030000: C:\Windows\system32\IEFRAME (0xd12000 bytes).
2020-02-07 16:55:10,390 [root] DEBUG: DLL loaded at 0x76160000: C:\Windows\system32\OLEAUT32 (0x91000 bytes).
2020-02-07 16:55:10,390 [root] DEBUG: DLL loaded at 0x72A90000: C:\Windows\system32\WINHTTP (0x58000 bytes).
2020-02-07 16:55:10,390 [root] DEBUG: DLL loaded at 0x72430000: C:\Windows\system32\webio (0x50000 bytes).
2020-02-07 16:55:10,405 [root] DEBUG: DLL loaded at 0x73AF0000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32 (0x19e000 bytes).
2020-02-07 16:55:10,515 [root] DEBUG: DLL loaded at 0x6C8B0000: C:\Program Files\Internet Explorer\IEShims (0x4b000 bytes).
2020-02-07 16:55:10,608 [root] DEBUG: DLL loaded at 0x750A0000: C:\Windows\system32\comdlg32 (0x7b000 bytes).
2020-02-07 16:55:10,625 [root] DEBUG: DLL loaded at 0x75380000: C:\Windows\system32\urlmon (0x150000 bytes).
2020-02-07 16:55:10,625 [root] DEBUG: DLL loaded at 0x74E50000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2020-02-07 16:55:10,750 [root] DEBUG: DLL loaded at 0x75AE0000: C:\Windows\system32\WININET (0x437000 bytes).
2020-02-07 16:55:10,750 [root] DEBUG: DLL loaded at 0x74E20000: C:\Windows\system32\USERENV (0x17000 bytes).
2020-02-07 16:55:10,750 [root] DEBUG: DLL loaded at 0x74BE0000: C:\Windows\system32\profapi (0xb000 bytes).
2020-02-07 16:55:10,890 [root] DEBUG: DLL loaded at 0x6C830000: C:\Program Files\Internet Explorer\sqmapi (0x39000 bytes).
2020-02-07 16:55:11,092 [root] DEBUG: DLL unloaded from 0x75130000.
2020-02-07 16:55:11,092 [root] DEBUG: DLL loaded at 0x70D30000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2020-02-07 16:55:11,092 [root] DEBUG: DLL loaded at 0x6CCB0000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l2-1-0 (0x4000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL loaded at 0x73060000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL loaded at 0x76FB0000: C:\Windows\system32\NSI (0x6000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL loaded at 0x73020000: C:\Windows\system32\WINNSI (0x7000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL loaded at 0x72D80000: C:\Windows\system32\dhcpcsvc6 (0xd000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL loaded at 0x75340000: C:\Windows\system32\WS2_32 (0x35000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL loaded at 0x72D30000: C:\Windows\system32\dhcpcsvc (0x12000 bytes).
2020-02-07 16:55:11,140 [root] DEBUG: DLL unloaded from 0x76E50000.
2020-02-07 16:55:11,140 [root] DEBUG: DLL unloaded from 0x75130000.
2020-02-07 16:55:11,155 [root] DEBUG: DLL loaded at 0x74590000: C:\Windows\system32\cryptsp (0x17000 bytes).
2020-02-07 16:55:11,155 [root] DEBUG: DLL loaded at 0x74260000: C:\Windows\system32\credssp (0x8000 bytes).
2020-02-07 16:55:11,155 [root] DEBUG: DLL unloaded from 0x74590000.
2020-02-07 16:55:11,155 [root] DEBUG: DLL loaded at 0x74D60000: C:\Windows\system32\CFGMGR32 (0x27000 bytes).
2020-02-07 16:55:11,671 [root] DEBUG: DLL loaded at 0x72C60000: C:\Windows\system32\SAMCLI (0xf000 bytes).
2020-02-07 16:55:11,671 [root] DEBUG: DLL loaded at 0x732C0000: C:\Windows\system32\WKSCLI (0xf000 bytes).
2020-02-07 16:55:11,671 [root] DEBUG: DLL loaded at 0x73740000: C:\Windows\system32\NETAPI32 (0x11000 bytes).
2020-02-07 16:55:11,671 [root] DEBUG: DLL loaded at 0x738B0000: C:\Windows\system32\netutils (0x9000 bytes).
2020-02-07 16:55:11,671 [root] DEBUG: DLL loaded at 0x74770000: C:\Windows\system32\srvcli (0x19000 bytes).
2020-02-07 16:55:11,828 [root] DEBUG: DLL unloaded from 0x76E50000.
2020-02-07 16:55:17,265 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 1052
2020-02-07 16:55:17,265 [root] DEBUG: GetHookCallerBase: failed to get return address.
2020-02-07 16:55:17,265 [root] DEBUG: DumpInterestingRegions: Dumping Imagebase at 0x003B0000.
2020-02-07 16:55:17,265 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-02-07 16:55:17,265 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x003B0000.
2020-02-07 16:55:17,265 [root] DEBUG: DumpProcess: Module entry point VA is 0x00001E00.
2020-02-07 16:55:23,546 [root] INFO: Added new CAPE file to list with path: C:\tgQuIpD\CAPE\1052_11723194502315187522020
2020-02-07 16:55:23,546 [root] DEBUG: DumpProcess: Module image dump success - dump size 0xc3c00.
2020-02-07 16:55:23,546 [root] INFO: Notified of termination of process with pid 1052.
2020-02-07 16:55:23,640 [root] DEBUG: Terminate Event: Process 1052 has already been dumped(!)
2020-02-07 16:55:29,375 [root] INFO: Process list is empty, terminating analysis.
2020-02-07 16:55:30,390 [root] INFO: Created shutdown mutex.
2020-02-07 16:55:31,405 [root] INFO: Shutting down package.
2020-02-07 16:55:31,405 [root] INFO: Stopping auxiliary modules.
2020-02-07 16:55:31,937 [root] INFO: Finishing auxiliary modules.
2020-02-07 16:55:31,937 [root] INFO: Shutting down pipe server and dumping dropped files.
2020-02-07 16:55:31,937 [root] WARNING: File at path "C:\tgQuIpD\debugger" does not exist, skip.
2020-02-07 16:55:31,937 [root] INFO: Analysis completed.

MalScore

3.0

Suspicious

Machine

Name Label Manager Started On Shutdown On
win7_3 win7_3 KVM 2020-02-07 15:54:48 2020-02-07 15:55:55

URL Details

URL
https://onedrive.live.com/redir?resid=3AADA808C1858F4A%21112&authkey=%21ADgD5hhv3eAst6I&page=View&wd=target%28Quick%20Notes.one%7C37a31a00-f592-4d33-bd50-5dcbd78d4776%2FProTech%20Thermal%20Services%202020-02-06%7Caacc9179-286c-4ce2-b69b-2c3c242ec7b9%2F%29

Signatures

Queries or connects to DNS-Over-HTTPS/DNS-Over-TLS domain or IP address
ip: 1.1.1.1
Network activity detected but not expressed in API logs

Screenshots


Hosts

Direct IP Country Name
Y 1.1.1.1 [VT] Australia

DNS

No domains contacted.


Summary

WHOIS Information

Name: Domain Administrator
Country: US
State: WA
City: Redmond
ZIP Code: 98052
Address: None

Orginization: Microsoft Corporation
Domain Name(s):
    LIVE.COM
    live.com
Creation Date:
    1994-12-28 05:00:00
    1994-12-28 00:00:00
Updated Date:
    2019-12-23 06:15:20
    2019-12-23 01:15:20
Expiration Date:
    2020-12-27 05:00:00
Email(s):
    [email protected]
    [email protected]
    [email protected]

Registrar(s):
    CSC CORPORATE DOMAINS, INC.
Name Server(s):
    NS1.MSFT.NET
    NS2.MSFT.NET
    NS3.MSFT.NET
    NS4.MSFT.NET
    NSE12.O365FILTERING.COM
    NSE13.O365FILTERING.COM
    NSE21.O365FILTERING.COM
    NSE24.O365FILTERING.COM
    nse24.o365filtering.com
    nse12.o365filtering.com
    nse21.o365filtering.com
    ns1.msft.net
    ns4.msft.net
    nse13.o365filtering.com
    ns2.msft.net
    ns3.msft.net
Referral URL(s):
    None
This file is not on VirusTotal.

Process Tree


iexplore.exe, PID: 1052, Parent PID: 776
Full Path: C:\Program Files\Internet Explorer\iexplore.exe
Command Line: "C:\Program Files\Internet Explorer\iexplore.exe" "https://onedrive.live.com/redir?resid=3AADA808C1858F4A%21112&authkey=%21ADgD5hhv3eAst6I&page=View&wd=target%28Quick%20Notes.one%7C37a31a00-f592-4d33-bd50-5dcbd78d4776%2FProTech%20Thermal%20Services%202020-02-06%7Caacc9179-286c-4ce2-b69b-2c3c242ec7b9%2F%29"

Hosts

Direct IP Country Name
Y 1.1.1.1 [VT] Australia

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.1.3 50933 1.1.1.1 53
192.168.1.3 56366 1.1.1.1 53
192.168.1.3 62840 1.1.1.1 53
192.168.1.3 62988 1.1.1.1 53

DNS

No domains contacted.

HTTP Requests

No HTTP requests performed.

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

ICMP traffic

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

No Suricata Alerts

Suricata TLS

Timestamp Source IP Source Port Destination IP Destination Port Subject Issuer Fingerprint Version
2020-02-07 15:55:36.212 192.168.1.3 [VT] 49165 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLSv1

Suricata HTTP

No Suricata HTTP

Sorry! No dropped Suricata Extracted files.

JA3

Source Source Port Destination Destination Port JA3 Hash JA3 Description
192.168.1.3 49165 192.0.2.123 443 26b795b92394b98210b2495089be3a26 unknown
Sorry! No dropped files.
Sorry! No CAPE files.
Process Name iexplore.exe
PID 1052
Dump Size 801792 bytes
Module Path C:\Program Files\Internet Explorer\iexplore.exe
Type PE image: 32-bit executable
MD5 ad525461b3c7352199b22615ac8bfce0
SHA1 e2ed8f75844c0a6dce6ced92b0de9123ccfe565e
SHA256 dc76f32472571b960a3ae74329dfd82ee4aee06080ffbd4d29591e2b2d3d2b50
CRC32 8720B9FA
Ssdeep 24576:mQBc87TbGLbMMHMMMvMMZMMMKzb6XmMMMiMMMz8JMMHMMM6MMZMMMeXNMMzMMMUQ:m5MMHMMMvMMZMMMlmMMMiMMMYJMMHMMs
ClamAV None
Yara None matched
CAPE Yara None matched
Dump Filename dc76f32472571b960a3ae74329dfd82ee4aee06080ffbd4d29591e2b2d3d2b50
Download Download ZIP Submit file

BinGraph

JSON Report Download
MAEC Report Download

Comments



No comments posted

Processing ( 6.196 seconds )

  • 5.025 Suricata
  • 0.408 VirusTotal
  • 0.352 ProcDump
  • 0.271 Static
  • 0.082 NetworkAnalysis
  • 0.049 Deduplicate
  • 0.007 AnalysisInfo
  • 0.002 Debug

Signatures ( 0.017 seconds )

  • 0.004 ransomware_files
  • 0.003 antiav_detectreg
  • 0.002 ransomware_extensions
  • 0.001 tinba_behavior
  • 0.001 persistence_autorun
  • 0.001 antianalysis_detectfile
  • 0.001 antiav_detectfile
  • 0.001 browser_security
  • 0.001 infostealer_bitcoin
  • 0.001 infostealer_ftp
  • 0.001 infostealer_im

Reporting ( 0.765 seconds )

  • 0.758 BinGraph
  • 0.007 JsonDump
Task ID 12497
Mongo ID 5e3d88968d3709078941c625
Cuckoo release 1.3-CAPE
Delete