analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://sosenviro-my.sharepoint.com/:o:/g/personal/gwilson_sosenvironmental_com/EsWHNnoLG85HvHoTGhVyRqoBcEUk0iMqC7tJqOnWWm9u1g?e=ObEOqe

Full analysis: https://app.any.run/tasks/55fedbad-2742-4bb9-b3e6-f3261ceca537
Verdict: Malicious activity
Analysis date: January 17, 2020, 22:21:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

7619313ACAA29B3E0CBC66F5A36E962F

SHA1:

9B7FBDF5E229E4BAD351638E822A542514503B71

SHA256:

085D666C62F974826A7E9339FB68AA4B9EC54513EA4A80DC01F0A3AA8814267F

SSDEEP:

3:N8HrTKArL5+KVFSCz6WNuT2e/duZLy+4AiAnAniqLHLYn:2LeAfNeW4CAHAnAniqXY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 1784)
    • Changes internet zones settings

      • iexplore.exe (PID: 2752)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1784)
      • iexplore.exe (PID: 2752)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2752)
    • Application launched itself

      • iexplore.exe (PID: 2752)
      • chrome.exe (PID: 748)
    • Creates files in the user directory

      • iexplore.exe (PID: 1784)
    • Manual execution by user

      • chrome.exe (PID: 748)
    • Reads the hosts file

      • chrome.exe (PID: 748)
      • chrome.exe (PID: 1704)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2752)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2752)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
17
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2752"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1784"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2752 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
748"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1316"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6feda9d0,0x6feda9e0,0x6feda9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2892"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1412 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3272"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=988,1473734425587331207,9715594643039276054,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=1639296464589903088 --mojo-platform-channel-handle=996 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
1704"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,1473734425587331207,9715594643039276054,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=8373751357080644534 --mojo-platform-channel-handle=1588 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2604"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,1473734425587331207,9715594643039276054,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3358970918647750489 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2864"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,1473734425587331207,9715594643039276054,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11577169406743462397 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2404 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,1473734425587331207,9715594643039276054,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17719327659537453291 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
Total events
649
Read events
526
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
14
Text files
94
Unknown types
14

Dropped files

PID
Process
Filename
Type
2752iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2752iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6YZJTO1I\WopiFrame[1].aspx
MD5:
SHA256:
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:9BFA749EE94E1B00D2797297F86C97FE
SHA256:0197492AB4AC5A150DA202FF3F053D8123762EA0D11207825EC126EECD85F365
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6YZJTO1I\WopiFrame[1].htmhtml
MD5:633663064AE2AD8B3C1FA50EFB1B965E
SHA256:BB97AE138117C6B1459ED793279549CA4FB9C1231BAD9A7F157BE2BFC0710521
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:3199916076BAA38B6DFFC1EB99C07156
SHA256:4B9AC718512FAF8B76111E197D9729D998BF20961D5E6A9EB6AEF93ED996C26A
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\0BRZ9D4M\blank[1].jstext
MD5:C3738EFAB74814A2FDAA2B11AA33F6E3
SHA256:DEAA139590617911AF41D0ABFAAFFC41DA0EB29133C5BB83D28BE1221B716BD8
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012020011720200118\index.datdat
MD5:6C6A38BA12CBFA0D103478A019E50BE3
SHA256:4512B59A2F7B3FE46B38DE6CB2D83B358BB68A2AEB1A7A65A6040A32A90436F7
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:54CBF28F83FC4F4A81DBAFCE7A545E9D
SHA256:477B6C217B19B100F0D6D30F6CE0B0FC50C95DFE5C397DEC0F4CE8F9F916F83E
1784iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\G41PWRQU\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
47
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
74.125.8.57:80
http://r3---sn-5hne6n7z.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=85.203.44.113&mm=28&mn=sn-5hne6n7z&ms=nvh&mt=1579299676&mv=m&mvi=2&pl=27&shardbypass=yes
US
whitelisted
1704
chrome.exe
GET
302
216.58.208.46:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
509 b
whitelisted
1704
chrome.exe
GET
200
172.217.132.6:80
http://r1---sn-5hne6nsd.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=85.203.44.113&mm=28&mn=sn-5hne6nsd&ms=nvh&mt=1579299676&mv=m&mvi=0&pl=27&shardbypass=yes
US
crx
293 Kb
whitelisted
1704
chrome.exe
GET
302
216.58.208.46:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
514 b
whitelisted
2752
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2752
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1784
iexplore.exe
13.107.6.171:443
onenote.officeapps.live.com
Microsoft Corporation
US
whitelisted
1784
iexplore.exe
13.107.136.9:443
sosenviro-my.sharepoint.com
Microsoft Corporation
US
whitelisted
1784
iexplore.exe
184.28.112.67:443
static.sharepointonline.com
Akamai International B.V.
US
unknown
1784
iexplore.exe
23.8.11.188:443
go.microsoft.com
Akamai International B.V.
NL
malicious
2752
iexplore.exe
2.18.232.191:443
c1-onenote-15.cdn.office.net
Akamai International B.V.
whitelisted
1784
iexplore.exe
152.199.19.160:443
az725175.vo.msecnd.net
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1784
iexplore.exe
23.37.60.73:443
support.office.com
Akamai Technologies, Inc.
NL
whitelisted
1784
iexplore.exe
2.16.186.27:443
statics-marketingsites-neu-ms-com.akamaized.net
Akamai International B.V.
whitelisted
1784
iexplore.exe
40.90.22.190:443
login.live.com
Microsoft Corporation
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
sosenviro-my.sharepoint.com
  • 13.107.136.9
suspicious
static.sharepointonline.com
  • 184.28.112.67
whitelisted
onenote.officeapps.live.com
  • 13.107.6.171
whitelisted
c1-onenote-15.cdn.office.net
  • 2.18.232.191
whitelisted
go.microsoft.com
  • 23.8.11.188
whitelisted
support.office.com
  • 23.37.60.73
whitelisted
www.microsoft.com
  • 2.21.38.54
whitelisted
statics-marketingsites-neu-ms-com.akamaized.net
  • 2.16.186.27
  • 2.16.186.41
whitelisted
az725175.vo.msecnd.net
  • 152.199.19.160
whitelisted

Threats

No threats detected
No debug info