| URL: | https://skrinshoter.ru |
| Full analysis: | https://app.any.run/tasks/6d0568ba-07a6-43e1-99cb-d483c985df2f |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | August 06, 2021, 17:08:19 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 86223507B5D25D75AF6E6AB048E3BB47 |
| SHA1: | A815A950B4B68A066395E244E1C0D1C961766E5E |
| SHA256: | 1B51567425C865B6176577AF5442C114F20F4C6310C12400DD66F0065F86E5C8 |
| SSDEEP: | 3:N8D6KbbA:2GKb8 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 668 | -s -S -A SkrinshoterWin/3.10.2.12 --insecure -d "v=1&t=event&tid=UA-17620704-15&cid=A57393D5-EBB8-4C38-A006-4028E0923D1C&ec=Settings&ea=Open Tab Pro&an=SkrinshoterWin&av=3.10.2.12" -X POST https://www.google-analytics.com/collect -w"%{http_code}" | C:\Program Files\Skrinshoter\curl.exe | skrinshoter.exe | ||||||||||||
User: admin Company: curl, https://curl.haxx.se/ Integrity Level: MEDIUM Description: The curl executable Exit code: 0 Version: 7.68.0 Modules
| |||||||||||||||
| 696 | -s -S -A SkrinshoterWin/3.10.2.12 --insecure -d "v=1&t=event&tid=UA-17620704-15&cid=A57393D5-EBB8-4C38-A006-4028E0923D1C&ec=Settings&ea=WriteJsonFileOk-2&an=SkrinshoterWin&av=3.10.2.12" -X POST https://www.google-analytics.com/collect -w"%{http_code}" | C:\Program Files\Skrinshoter\curl.exe | skrinshoter.exe | ||||||||||||
User: admin Company: curl, https://curl.haxx.se/ Integrity Level: MEDIUM Description: The curl executable Exit code: 0 Version: 7.68.0 Modules
| |||||||||||||||
| 772 | "C:\Users\admin\AppData\Local\Yandex\BrowserManager\MBlauncher.exe" /firstrun | C:\Users\admin\AppData\Local\Yandex\BrowserManager\MBlauncher.exe | — | msiexec.exe | |||||||||||
User: admin Company: Yandex LLC Integrity Level: MEDIUM Description: Launcher ??? ????????? ????????? Exit code: 0 Version: 3.0.5.827 Modules
| |||||||||||||||
| 908 | -s -S -A SkrinshoterWin/3.10.2.12 --insecure -d "v=1&t=event&tid=UA-17620704-15&cid=A57393D5-EBB8-4C38-A006-4028E0923D1C&ec=Application&ea=Launch&el=OS[6.1.7601],Up-0, 1 displays[1280x720], Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz, 4 cores, 4 Gb, {gdi}&an=SkrinshoterWin&av=3.10.2.12" -X POST https://www.google-analytics.com/collect -w"%{http_code}" | C:\Program Files\Skrinshoter\curl.exe | skrinshoter.exe | ||||||||||||
User: admin Company: curl, https://curl.haxx.se/ Integrity Level: MEDIUM Description: The curl executable Exit code: 0 Version: 7.68.0 Modules
| |||||||||||||||
| 928 | C:\Windows\system32\msiexec.exe /V | C:\Windows\system32\msiexec.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows� installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1040 | "C:\Users\admin\AppData\Local\Temp\28D12CEE-B8C4-4B4F-94FE-D5C9774BD5D0\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSER | C:\Users\admin\AppData\Local\Temp\28D12CEE-B8C4-4B4F-94FE-D5C9774BD5D0\lite_installer.exe | MsiExec.exe | ||||||||||||
User: admin Company: Yandex Integrity Level: MEDIUM Description: YandexBrowserDownloader Exit code: 0 Version: 1.0.1.88 Modules
| |||||||||||||||
| 1420 | -s -S -A SkrinshoterWin/3.10.2.12 --insecure -d "v=1&t=event&tid=UA-17620704-15&cid=A57393D5-EBB8-4C38-A006-4028E0923D1C&ec=SelectRegion&ea=Open without Editor&an=SkrinshoterWin&av=3.10.2.12" -X POST https://www.google-analytics.com/collect -w"%{http_code}" | C:\Program Files\Skrinshoter\curl.exe | skrinshoter.exe | ||||||||||||
User: admin Company: curl, https://curl.haxx.se/ Integrity Level: MEDIUM Description: The curl executable Exit code: 0 Version: 7.68.0 Modules
| |||||||||||||||
| 1900 | C:\Users\admin\AppData\Local\Yandex\Updater2\yupdate-exec.exe --stat-callback 0 --appid bm --job {3ABE1900-B667-43D1-B63F-D31840808283} | C:\Users\admin\AppData\Local\Yandex\Updater2\yupdate-exec.exe | — | svchost.exe | |||||||||||
User: admin Company: Yandex LLC Integrity Level: MEDIUM Description: Yandex updater (EU) Exit code: 0 Version: 1.2.0.1834 Modules
| |||||||||||||||
| 2008 | C:\Windows\system32\MsiExec.exe -Embedding 52B6FCC1DC272785C73324ED03B220B1 | C:\Windows\system32\MsiExec.exe | msiexec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows� installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2068 | C:\Users\admin\AppData\Local\Temp\6111B9E6-471D-47DA-A46F-9979E0036E07\downloader.exe --stat dwnldr/p=bm-partner-ru/cnt=0/dt=5/ct=0/rt=0 --dh 1448 --st 1628269760 | C:\Users\admin\AppData\Local\Temp\6111B9E6-471D-47DA-A46F-9979E0036E07\downloader.exe | downloader.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Setup Downloader Exit code: 0 Version: 0.1.0.32 Modules
| |||||||||||||||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30903013 | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30903013 | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3568) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 | binary | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 | der | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | compressed | |
MD5:F7DCB24540769805E5BB30D193944DCE | SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\XD9ERJJ0.htm | html | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\styles[1].css | text | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\scripts[1].js | text | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | der | |
MD5:— | SHA256:— | |||
| 2988 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2988 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCBwXmOUIIn%2FAoAAAAA8rrr | US | der | 472 b | whitelisted |
2988 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D | US | der | 724 b | whitelisted |
2988 | iexplore.exe | GET | 200 | 2.16.107.89:80 | http://crl.identrust.com/DSTROOTCAX3CRL.crl | unknown | der | 1.16 Kb | whitelisted |
2988 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEGq%2BdSta4rCACgAAAADyw3Q%3D | US | der | 471 b | whitelisted |
2988 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
2988 | iexplore.exe | GET | 200 | 2.16.186.232:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I | unknown | der | 1.54 Kb | whitelisted |
2988 | iexplore.exe | GET | 200 | 5.45.205.242:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CECosiqdXosrVzE6LrmbYt3c%3D | RU | der | 1.48 Kb | whitelisted |
2988 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEBtpDEx%2Fx4YJCgAAAADyw4g%3D | US | der | 471 b | whitelisted |
2988 | iexplore.exe | GET | 200 | 2.16.186.232:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso | unknown | der | 1.50 Kb | whitelisted |
2988 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDuuJG5Km9TjgoAAAAA8rro | US | der | 472 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2988 | iexplore.exe | 23.45.105.185:80 | x1.c.lencr.org | Akamai International B.V. | NL | unknown |
2988 | iexplore.exe | 2.16.107.89:80 | crl.identrust.com | Akamai International B.V. | — | suspicious |
2988 | iexplore.exe | 142.250.186.131:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
2988 | iexplore.exe | 142.250.185.106:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
2988 | iexplore.exe | 142.250.181.238:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
2988 | iexplore.exe | 136.243.19.144:443 | skrinshoter.ru | Hetzner Online GmbH | DE | suspicious |
2988 | iexplore.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2988 | iexplore.exe | 13.225.81.216:443 | thumbs.gfycat.com | — | US | unknown |
2988 | iexplore.exe | 13.225.84.97:80 | o.ss2.us | — | US | unknown |
2988 | iexplore.exe | 2.16.186.232:80 | subca.ocsp-certum.com | Akamai International B.V. | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
skrinshoter.ru |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.identrust.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
www.google-analytics.com |
| whitelisted |
mc.yandex.ru |
| whitelisted |
thumbs.gfycat.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3884 | downloader.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2976 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
2976 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
2976 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
2976 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
2976 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
2976 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
2796 | skrinshoter.exe | Attempted Information Leak | ET POLICY curl User-Agent Outbound |
3568 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
3568 | iexplore.exe | Potential Corporate Privacy Violation | ET INFO Lets Encrypt Free SSL Cert Observed with IDN/Punycode Domain - Possible Phishing |
Process | Message |
|---|---|
YandexPackSetup.exe | IsAlreadyRun() In
|
YandexPackSetup.exe | IsAlreadyRun() Out : ret (BOOL) = 0
|
YandexPackSetup.exe | IsMSISrvFree() In |
YandexPackSetup.exe | IsMSISrvFree() : OpenMutex() err ret = 2
|
YandexPackSetup.exe | IsMSISrvFree() Out ret = 1
|
YandexPackSetup.exe | GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
|
YandexPackSetup.exe | GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
|
YandexPackSetup.exe | GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin
|
YandexPackSetup.exe | GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000
|
YandexPackSetup.exe | GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
|