URL: | https://www.sohu.com |
Full analysis: | https://app.any.run/tasks/daf89382-2846-4e2e-9742-e78286e70bfa |
Verdict: | Malicious activity |
Analysis date: | April 23, 2019, 12:13:57 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MD5: | DEE97671174CD057D301B7B688DDE43C |
SHA1: | 3703E96140DC44C3ADF23E8134114D7C28BC1ED0 |
SHA256: | 2795DDE18220FCCFDC91CB973C9693D67A9B62E122099B98AA1070E25E1E1D2D |
SSDEEP: | 3:N8DSLGdI:2OLp |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3872 | "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.sohu.com | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | ||||||||||||
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Version: 73.0.3683.75 Modules
| |||||||||||||||
2532 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=73.0.3683.75 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6f3c0f18,0x6f3c0f28,0x6f3c0f34 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Version: 73.0.3683.75 Modules
| |||||||||||||||
4084 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3880 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Version: 73.0.3683.75 Modules
| |||||||||||||||
3076 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=17152363334188467644 --mojo-platform-channel-handle=940 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Version: 73.0.3683.75 Modules
| |||||||||||||||
1108 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --service-pipe-token=10855541577996207699 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=10855541577996207699 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1996 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 73.0.3683.75 Modules
| |||||||||||||||
2304 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --service-pipe-token=12343856439365095520 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12343856439365095520 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1924 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 73.0.3683.75 Modules
| |||||||||||||||
1372 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --service-pipe-token=7084744540794025850 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7084744540794025850 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 73.0.3683.75 Modules
| |||||||||||||||
320 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=13364872823116223262 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13364872823116223262 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 73.0.3683.75 Modules
| |||||||||||||||
2816 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=9192318381543494991 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9192318381543494991 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 73.0.3683.75 Modules
| |||||||||||||||
3992 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=948,7684098884706590447,18307735252959577817,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=15158099339491890811 --mojo-platform-channel-handle=4816 /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 73.0.3683.75 Modules
|
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | failed_count |
Value: 0 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 2 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
Operation: | write | Name: | StatusCodes |
Value: | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 1 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
Operation: | write | Name: | dr |
Value: 1 | |||
(PID) Process: | (4084) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | write | Name: | 3872-13200495251910250 |
Value: 259 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | delete value | Name: | 3488-13197474229333984 |
Value: 0 | |||
(PID) Process: | (3872) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
Operation: | write | Name: | usagestats |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0 | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2 | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3 | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\2f9a42bc-f91d-4d20-856b-516b7646b287.tmp | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000018.dbtmp | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0 | — | |
MD5:— | SHA256:— | |||
3872 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1 | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_103/c_cut,x_27,y_-2,w_462,h_308/os/news/5ad63e415628f62bd652a2b77b9b1e34.jpg | US | image | 3.13 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_213/c_cut,x_105,y_36,w_385,h_256/os/news/e6b392bb7bd46d5d2560d4f616e077af.jpg | US | image | 22.6 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_213/c_cut,x_49,y_0,w_634,h_423/os/news/c089841a41910bb415e79e9d4ab48c93.jpg | US | image | 16.8 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_213/c_cut,x_0,y_9,w_500,h_333/os/news/ffdf41f5f8f1d82847b9caf202521042.jpg | US | image | 14.0 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_160/c_cut,x_0,y_23,w_640,h_320/os/news/194a19f41ce91f73403b3539acba8129.jpg | US | image | 8.00 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_103/c_cut,x_35,y_0,w_494,h_330/os/news/aeed7f8df51211a598aba17a9b7048e9.jpg | US | image | 2.58 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_103/c_cut,x_26,y_-2,w_507,h_338/os/news/fb80b6b641d1d4beeabb2257a5eb18fa.jpg | US | image | 3.91 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_103/c_cut,x_30,y_52,w_414,h_276/os/news/913af5de4e855bffb35ede6fecb12df8.jpg | US | image | 12.7 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_103/c_cut,x_0,y_0,w_155,h_103/os/news/7941e51a61cd9b65540ec63512348bc2.jpg | US | image | 19.4 Kb | malicious |
3872 | chrome.exe | GET | 200 | 163.171.130.130:80 | http://29e5534ea20a8.cdn.sohucs.com/c_zoom,h_103/c_cut,x_0,y_0,w_155,h_103/os/news/a769af0ad3cb0851c8b819741f03bc66.jpg | US | image | 20.5 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3872 | chrome.exe | 216.58.210.13:443 | accounts.google.com | Google Inc. | US | whitelisted |
3872 | chrome.exe | 216.58.207.67:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3872 | chrome.exe | 172.217.16.196:443 | www.google.com | Google Inc. | US | whitelisted |
3872 | chrome.exe | 121.29.54.195:443 | hotword.sogoucdn.com | CHINA UNICOM China169 Backbone | CN | malicious |
3872 | chrome.exe | 163.171.130.130:443 | statics.itc.cn | — | US | malicious |
3872 | chrome.exe | 175.100.207.233:443 | txt.go.sohu.com | ISP | HK | malicious |
3872 | chrome.exe | 175.100.207.206:443 | www.sohu.com | ISP | HK | malicious |
3872 | chrome.exe | 175.100.207.206:80 | www.sohu.com | ISP | HK | malicious |
3872 | chrome.exe | 163.171.130.130:80 | statics.itc.cn | — | US | malicious |
— | — | 216.58.206.3:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
clientservices.googleapis.com |
| whitelisted |
www.sohu.com |
| malicious |
accounts.google.com |
| shared |
statics.itc.cn |
| malicious |
29e5534ea20a8.cdn.sohucs.com |
| malicious |
39d0825d09f05.cdn.sohucs.com |
| suspicious |
txt.go.sohu.com |
| suspicious |
js.sohu.com |
| malicious |
images.sohu.com |
| malicious |
www.google.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
3872 | chrome.exe | Generic Protocol Command Decode | SURICATA STREAM excessive retransmissions |
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |