analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://cloud.mail.ru/stock/beftvhszhA6UsvnxSHtebm2S

Full analysis: https://app.any.run/tasks/19640aeb-0c05-4e9e-9f45-d5cd76525398
Verdict: Malicious activity
Analysis date: September 30, 2020, 06:22:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

48FFD30B25CF97A82CE77C1394A7779A

SHA1:

38DB5BECB0BF5B6A6995CE256DC0EFCEAD361D09

SHA256:

0B5E01A3D3B357C9E489FA7F9D4E9387A2F76C983F43E8F1B33188832F49750D

SSDEEP:

3:N8ULBLxs/N3LUmoX2:2UKN3D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • evakuasiya.exe (PID: 3940)
      • evakuasiya.exe (PID: 3700)
    • Loads dropped or rewritten executable

      • evakuasiya.exe (PID: 3700)
      • explorer.exe (PID: 352)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2108)
      • evakuasiya.exe (PID: 3940)
    • Application launched itself

      • evakuasiya.exe (PID: 3940)
    • Loads Python modules

      • evakuasiya.exe (PID: 3700)
    • Uses RUNDLL32.EXE to load library

      • explorer.exe (PID: 352)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2108)
      • chrome.exe (PID: 2800)
    • Manual execution by user

      • verclsid.exe (PID: 2420)
      • notepad++.exe (PID: 3568)
    • Application launched itself

      • chrome.exe (PID: 2108)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2108)
    • Dropped object may contain Bitcoin addresses

      • evakuasiya.exe (PID: 3940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
81
Monitored processes
40
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs verclsid.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs evakuasiya.exe chrome.exe no specs chrome.exe no specs evakuasiya.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs notepad++.exe explorer.exe no specs rundll32.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2108"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://cloud.mail.ru/stock/beftvhszhA6UsvnxSHtebm2S"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2544"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6f1da9d0,0x6f1da9e0,0x6f1da9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2272"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1500 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2508"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=7068415976347478039 --mojo-platform-channel-handle=1008 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2800"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=977392615625400283 --mojo-platform-channel-handle=1636 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3872"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12247736199699342675 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2960"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15110909127903450097 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=508 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2432"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12073471699528164367 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2488 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2400"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=9704640776265603917 --mojo-platform-channel-handle=3644 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1208"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=996,5417610324640819046,5329011680590189718,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16659780354932615 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
3 371
Read events
2 580
Write events
0
Delete events
0

Modification events

No data
Executable files
62
Suspicious files
106
Text files
1 062
Unknown types
10

Dropped files

PID
Process
Filename
Type
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F742432-83C.pma
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\9bd58496-936b-4691-b915-676060e9fdfb.tmp
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000046.dbtmp
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF3b7669.TMPtext
MD5:4AFC066387D33D5264F8E796393B223B
SHA256:BB3E0F925E883318FB09FC498CACEA57F0F71548C9D42FF07634DC30D87F2D86
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF3b7659.TMPtext
MD5:D55489ED6031D8B188E37B0B59F5CED3
SHA256:365B01D1B3333E366EEA50106551AAC8721156CB2572C173E2F501D8255093F4
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF3b7669.TMPtext
MD5:D33038DC70A58F2AC0EA1823980691AE
SHA256:6EE5DB5588EB879D13CE5A0DB3CA1744079C1BE3F73959A3B900684C56061D97
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
109
DNS requests
61
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2800
chrome.exe
172.217.21.227:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2800
chrome.exe
94.100.180.197:443
rs.mail.ru
Limited liability company Mail.Ru
RU
unknown
2800
chrome.exe
217.69.139.102:443
img.imgsmail.ru
Limited liability company Mail.Ru
RU
unknown
2800
chrome.exe
217.69.139.209:443
limg.imgsmail.ru
Limited liability company Mail.Ru
RU
unknown
2800
chrome.exe
216.58.207.45:443
accounts.google.com
Google Inc.
US
whitelisted
2800
chrome.exe
94.100.180.61:443
oauth.mail.ru
Limited liability company Mail.Ru
RU
unknown
2800
chrome.exe
195.181.175.49:443
cdn.consentmanager.mgr.consensu.org
Datacamp Limited
DE
suspicious
2800
chrome.exe
216.58.207.78:443
www.google-analytics.com
Google Inc.
US
whitelisted
2800
chrome.exe
217.69.139.6:443
cloud.mail.ru
Limited liability company Mail.Ru
RU
unknown
2800
chrome.exe
217.69.139.244:443
r.mradx.net
Limited liability company Mail.Ru
RU
unknown

DNS requests

Domain
IP
Reputation
cloud.mail.ru
  • 217.69.139.6
  • 217.69.139.7
  • 94.100.180.5
  • 217.69.139.5
  • 94.100.180.6
  • 94.100.180.7
whitelisted
clientservices.googleapis.com
  • 172.217.21.227
whitelisted
accounts.google.com
  • 216.58.207.45
shared
img.imgsmail.ru
  • 217.69.139.102
whitelisted
www.googletagmanager.com
  • 172.217.23.104
whitelisted
rs.mail.ru
  • 94.100.180.197
whitelisted
oauth.mail.ru
  • 94.100.180.61
  • 217.69.139.61
unknown
r.mradx.net
  • 217.69.139.244
whitelisted
limg.imgsmail.ru
  • 217.69.139.209
  • 94.100.180.211
  • 217.69.139.211
  • 94.100.180.209
whitelisted
an.mail.ru
  • 94.100.180.197
whitelisted

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093