analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://mega.nz/?fbclid=IwAR2xeM2z6RmJRikLryfHrmfsctk-bZP7JGkQdqlobJCK2YqwNHmQ_uY7MZg#!NMdwwIJA!6slSB4o0VS_Eh-RTMmrnsIU-hCmHs3Q_KCnMDzr3D_Q

Full analysis: https://app.any.run/tasks/4cba808e-5574-4adb-8f9e-829462a2a37e
Verdict: Malicious activity
Analysis date: September 19, 2019, 07:07:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

216D34857F5AB87AB365E7A95AA0F813

SHA1:

7C654527AFBC763098045FEAF4679039A19BF303

SHA256:

1A36ACD95E1ED4FCFB3C11D42D7D15BF7AB05B585268C056A50CDC06F47E23CC

SSDEEP:

3:N8X/iabGJOSkdF7VOCuDBoI6TJKHRXort0Q8bKGrB689J20aw7WlQR0FmcJGh60:2hbj72doIQcart0Q8mcPTL7iK0F5JGs0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2812)
    • Creates files in the Windows directory

      • NPE.exe (PID: 2948)
    • Creates files in the driver directory

      • NPE.exe (PID: 2948)
    • Creates files in the program directory

      • NPE.exe (PID: 2948)
    • Executable content was dropped or overwritten

      • NPE.exe (PID: 2948)
    • Removes files from Windows directory

      • NPE.exe (PID: 2948)
  • INFO

    • Manual execution by user

      • NOTEPAD.EXE (PID: 3420)
      • NPE.exe (PID: 3200)
      • WinRAR.exe (PID: 3836)
      • WinRAR.exe (PID: 3844)
      • NPE.exe (PID: 2948)
    • Reads the hosts file

      • chrome.exe (PID: 2812)
      • chrome.exe (PID: 2376)
      • NPE.exe (PID: 2948)
    • Application launched itself

      • chrome.exe (PID: 2812)
    • Reads settings of System Certificates

      • NPE.exe (PID: 2948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
27
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs winrar.exe no specs chrome.exe no specs notepad.exe no specs npe.exe no specs npe.exe

Process information

PID
CMD
Path
Indicators
Parent process
2812"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mega.nz/?fbclid=IwAR2xeM2z6RmJRikLryfHrmfsctk-bZP7JGkQdqlobJCK2YqwNHmQ_uY7MZg#!NMdwwIJA!6slSB4o0VS_Eh-RTMmrnsIU-hCmHs3Q_KCnMDzr3D_Q"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6fdea9d0,0x6fdea9e0,0x6fdea9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2876"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2816 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
4060"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=16019435867645496190 --mojo-platform-channel-handle=1016 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2376"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=18147687699976492502 --mojo-platform-channel-handle=1640 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3904"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5974800594433913000 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3264"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4714829695144002811 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2200 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3684"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7708631783294229257 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2532 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3172"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=6471741357045972510 --mojo-platform-channel-handle=3348 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2584"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,4756398656555230842,14661670697041074113,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10264212087423042207 --mojo-platform-channel-handle=3428 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
1 954
Read events
1 797
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
78
Text files
271
Unknown types
20

Dropped files

PID
Process
Filename
Type
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF16a117.TMP
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\9659559e-e739-4ee9-848f-f7c70a208843.tmp
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:A519780ED0A2F4336DB4F5651D79C369
SHA256:DA5B71BD0075B55757BF757BF5F4D4A1DCBCF0762CDA5B31B28680963E068C75
2812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF16a1a3.TMPtext
MD5:A519780ED0A2F4336DB4F5651D79C369
SHA256:DA5B71BD0075B55757BF757BF5F4D4A1DCBCF0762CDA5B31B28680963E068C75
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
71
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
152.195.132.112:80
http://definitions.symantec.com/defs/dm/smrscd.7z
US
compressed
6.36 Kb
malicious
2948
NPE.exe
GET
200
152.195.132.112:80
http://definitions.symantec.com/defs/dm/smrscd.7z
US
compressed
6.36 Kb
malicious
GET
200
151.101.2.202:80
http://www.ccleaner.com/auto?a=0&p=cc&v=5.61.7392&l=1033&lk=&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&o=6.1W3&au=1&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gd=b72fc9d0-e691-4d02-bf89-b669089e91d3
US
text
23 b
whitelisted
GET
200
151.101.2.109:80
http://license.piriform.com/verify/?p=ccpro&c=cc&cv=5.61.7392&l=1033&lk=CJ9T-J7CU-SPNV-GWMB-WBEC&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gd=b72fc9d0-e691-4d02-bf89-b669089e91d3
US
html
5.58 Kb
whitelisted
2376
chrome.exe
GET
302
216.58.208.46:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
516 b
whitelisted
2376
chrome.exe
GET
200
84.15.64.141:80
http://r2---sn-cpux-8ov6.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=85.206.166.82&mm=28&mn=sn-cpux-8ov6&ms=nvh&mt=1568876591&mv=u&mvi=1&pl=20&shardbypass=yes
LT
crx
862 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2376
chrome.exe
172.217.16.206:443
clients1.google.com
Google Inc.
US
whitelisted
2376
chrome.exe
172.217.22.77:443
accounts.google.com
Google Inc.
US
whitelisted
2376
chrome.exe
172.217.18.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2376
chrome.exe
31.216.147.133:443
g.api.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
2376
chrome.exe
31.216.148.10:443
mega.nz
Datacenter Luxembourg S.A.
LU
unknown
2376
chrome.exe
89.44.169.132:443
eu.static.mega.co.nz
Datacenter Luxembourg S.A.
LU
suspicious
2376
chrome.exe
172.217.22.42:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2376
chrome.exe
172.217.22.1:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted
2376
chrome.exe
172.217.21.196:443
www.google.com
Google Inc.
US
whitelisted
2376
chrome.exe
216.58.208.46:80
redirector.gvt1.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.18.3
whitelisted
mega.nz
  • 31.216.148.10
  • 89.44.169.135
whitelisted
accounts.google.com
  • 172.217.22.77
shared
safebrowsing.googleapis.com
  • 172.217.22.42
whitelisted
clients1.google.com
  • 172.217.16.206
whitelisted
eu.static.mega.co.nz
  • 89.44.169.132
  • 31.216.148.13
  • 31.216.148.11
  • 89.44.169.134
shared
g.api.mega.co.nz
  • 31.216.147.133
  • 31.216.147.136
  • 31.216.147.135
  • 31.216.147.134
shared
www.google.com
  • 172.217.21.196
whitelisted
clients2.google.com
  • 172.217.16.206
whitelisted
clients2.googleusercontent.com
  • 172.217.22.1
whitelisted

Threats

No threats detected
No debug info