File name: | apple2.png |
Full analysis: | https://app.any.run/tasks/e24b0852-3390-43b0-8385-177167c7713f |
Verdict: | Malicious activity |
Analysis date: | November 29, 2020, 17:30:28 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | image/png |
File info: | PNG image data, 768 x 432, 8-bit/color RGBA, non-interlaced |
MD5: | CB2F9F801DA0FE7E1D2A64EBC5B7859F |
SHA1: | F9BA7035A29BB3B88B97E98B5EE0E62E1CFABA22 |
SHA256: | 26FB2BC614296744C511B9180F5C0D919FD87162947D9C28243125E76068D056 |
SSDEEP: | 12288:SfvP1Ut4kemV9YdAnPDMSf24oW8WN7imUVBrhacxJ0lUsexYNE:SnP1UikemXbMStDYVZhclyYNE |
.png | | | Portable Network Graphics (100) |
---|
Megapixels: | 0.332 |
---|---|
ImageSize: | 768x432 |
AltTimecodeTimeFormat: | 25 fps |
---|---|
AltTimecodeTimeValue: | 00:04:53:03 |
StartTimecodeTimeValue: | 00:04:53:03 |
StartTimecodeTimeFormat: | 25 fps |
DurationScale: | 0.04 |
DurationValue: | 248 |
VideoFrameSizeUnit: | pixel |
VideoFrameSizeH: | 432 |
VideoFrameSizeW: | 768 |
HistoryChanged: |
|
HistorySoftwareAgent: |
|
HistoryWhen: |
|
HistoryInstanceID: |
|
HistoryAction: |
|
Format: | PNG |
StartTimeSampleSize: | 1 |
StartTimeScale: | 25 |
VideoPixelAspectRatio: | 1 |
VideoFieldOrder: | Progressive |
VideoFrameRate: | 25 |
CreateDate: | 2020:11:26 16:48:51 |
ModifyDate: | 2020:11:26 16:49:22Z |
MetadataDate: | 2020:11:26 16:49:22Z |
OriginalDocumentID: | xmp.did:8517dfdc-0edd-8141-92c3-94c7e31540b1 |
DocumentID: | bed2f23e-a996-cac6-9966-b0da0000003f |
InstanceID: | xmp.iid:69541ef9-9d56-6d48-83ab-c2254b51dc97 |
XMPToolkit: | Adobe XMP Core 6.0-c002 79.164360, 2020/02/13-01:07:22 |
Creator: | Premiere Pro |
---|---|
PixelUnits: | Unknown |
PixelsPerUnitY: | 1 |
PixelsPerUnitX: | 1 |
Interlace: | Noninterlaced |
Filter: | Adaptive |
Compression: | Deflate/Inflate |
ColorType: | RGB with Alpha |
BitDepth: | 8 |
ImageHeight: | 432 |
ImageWidth: | 768 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2728 | "C:\Windows\System32\rundll32.exe" "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\admin\AppData\Local\Temp\apple2.png | C:\Windows\System32\rundll32.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3880 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 3221225547 Version: 75.0.3770.100 | ||||
2680 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6e4ea9d0,0x6e4ea9e0,0x6e4ea9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3804 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3868 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
2956 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,5350725570364173055,14095141721391263925,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6791054276776364278 --mojo-platform-channel-handle=1060 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3248 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1048,5350725570364173055,14095141721391263925,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=10116403278816152525 --mojo-platform-channel-handle=1592 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3360 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,5350725570364173055,14095141721391263925,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13044330968669803428 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
2208 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,5350725570364173055,14095141721391263925,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9439487249342668271 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2492 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
876 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,5350725570364173055,14095141721391263925,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13745034728136530082 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2564 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3356 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1048,5350725570364173055,14095141721391263925,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14326543286044839851 --mojo-platform-channel-handle=3312 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5FC3DACD-F28.pma | — | |
MD5:— | SHA256:— | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\001c27ac-cee5-4836-9ecc-46436aac2bb2.tmp | — | |
MD5:— | SHA256:— | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp | — | |
MD5:— | SHA256:— | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF18f96e.TMP | text | |
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE | SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9 | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:FB5B20517A0D1F7DAD485989565BEE5E | SHA256:99405F66EDBEB2306F4D0B4469DCADFF5293B5E1549C588CCFACEA439BB3B101 | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:D4322EEBAC92D1B8F7A6F5E39F6264B7 | SHA256:A3EEDF21B850DCC7CE5AE04395ECDD2D29DA4EA549C8A185DD9E8B552A87B8C2 | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old | text | |
MD5:67F45CAA18C889645F50CD6216C81E65 | SHA256:33ED82CDDDFFD55A5059C147C6CD20F66C6712314F890A39576D3C10914D0029 | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old | text | |
MD5:1C97B70A4BAD7C026F79467C7D496AFA | SHA256:C5A02E4984DE3F30DADFC0A89A93F45418C06653C3962EAA94C93909E51D272D | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabs | binary | |
MD5:E815400F953EA8DB8A98D52737C9A50D | SHA256:E9F064927A191500B7365F51C9CD0763A6A8E68A8B866ACED39AA0E72C3EAD85 | |||
3880 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RF18f9dc.TMP | text | |
MD5:1C97B70A4BAD7C026F79467C7D496AFA | SHA256:C5A02E4984DE3F30DADFC0A89A93F45418C06653C3962EAA94C93909E51D272D |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3248 | chrome.exe | GET | 302 | 18.200.170.55:80 | http://performance.affiliaxe.com/aff_c?offer_id=28127&aff_id=12958&aff_sub=12038&aff_sub2=f59c1db6-a94d-47f3-a193-7a730b1385cd | US | html | 300 b | suspicious |
2904 | chrome.exe | GET | 200 | 67.225.152.21:80 | http://freevbucks.novateknik.net/media/1527779044eb29bf06b89f3209ae1c61773c32e4b8.png | US | image | 124 Kb | suspicious |
3248 | chrome.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D | US | der | 471 b | whitelisted |
2904 | chrome.exe | GET | 200 | 67.225.152.21:80 | http://freevbucks.novateknik.net/media/1527779050953d8f430c58916ec29f342ce799aa0d.png | US | image | 112 Kb | suspicious |
2904 | chrome.exe | GET | 200 | 67.225.152.21:80 | http://freevbucks.novateknik.net/media/css_front.css | US | text | 1.36 Kb | suspicious |
2904 | chrome.exe | GET | 200 | 67.225.152.21:80 | http://freevbucks.novateknik.net/media/font-awesome.min.css | US | text | 6.54 Kb | suspicious |
2904 | chrome.exe | GET | 200 | 67.225.152.21:80 | http://freevbucks.novateknik.net/ | US | html | 19.4 Kb | suspicious |
3248 | chrome.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAqN7HPiQ2%2F4c3rdXE3uHG8%3D | US | der | 471 b | whitelisted |
2904 | chrome.exe | GET | 200 | 67.225.152.21:80 | http://freevbucks.novateknik.net/og.php?tool=cl&toolarg=s&id=2b68bec0c2256e31ee1641030cf66d99 | US | text | 1.28 Kb | suspicious |
2904 | chrome.exe | GET | 200 | 172.67.69.215:80 | http://bucket.cpabuild.com/assets/landing_pages/fa/fonts/fontawesome-webfont.woff2?v=4.6.3 | US | woff2 | 70.2 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3248 | chrome.exe | 216.58.212.163:443 | fonts.gstatic.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 172.217.23.100:443 | www.google.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 172.217.23.110:443 | clients2.google.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 216.58.206.10:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 172.217.16.195:443 | www.gstatic.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 216.58.207.67:443 | www.google.com.ua | Google Inc. | US | whitelisted |
3248 | chrome.exe | 172.217.16.142:443 | ogs.google.com.ua | Google Inc. | US | whitelisted |
3248 | chrome.exe | 172.217.16.205:443 | accounts.google.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 172.217.6.206:443 | apis.google.com | Google Inc. | US | whitelisted |
3248 | chrome.exe | 216.58.213.3:443 | www.google.se | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
www.google.com.ua |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
apis.google.com |
| whitelisted |
ogs.google.com.ua |
| whitelisted |
www.google.com |
| whitelisted |
www.google.se |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |
3248 | chrome.exe | Potentially Bad Traffic | ET INFO Suspicious Domain (*.icu) in TLS SNI |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |