analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgo.pardot.com%2Fe%2F375012%2Fital-transformation-Whitepaper%2F6hg49n%2F3254768467%3Fh%3DAQrdAQ_znXmzou7ybL6YUEqTjlCrMntK3vz0Ri_3HMQ&data=04%7C01%7Ctim.salmon%40hydro.com.au%7C760b24a5d7874868654408d874245e5d%7C21d73791531e45c59c072ea902502975%7C1%7C0%7C637387046868367152%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=P89VVhCedWp11Vv5%2Fx1C%2F9D8SkSGQb1lRdG%2Fs5v5Rl4%3D&reserved=0

Full analysis: https://app.any.run/tasks/c4bc676e-f010-46a4-b4c3-fff2c4679c9f
Verdict: Malicious activity
Analysis date: October 19, 2020, 21:51:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

945AB9ED6B844025D4622315BF339017

SHA1:

4083D6E87104F4107C80AD28FFBAAF91C533D9A3

SHA256:

2976E147A35A96393AA7ADD1AA0E9F99FFDDC23DD027FF69ED4F0EEF55607EBA

SSDEEP:

12:2/5qxW1w6WSbL8yN8e5NVKINhYyGKP7RlyPsHQZ/:2/5q6tbdDNo0qyFP7vysHQF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 3240)
    • Reads the hosts file

      • chrome.exe (PID: 3240)
      • chrome.exe (PID: 2492)
    • Application launched itself

      • chrome.exe (PID: 2492)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
14
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2492"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgo.pardot.com%2Fe%2F375012%2Fital-transformation-Whitepaper%2F6hg49n%2F3254768467%3Fh%3DAQrdAQ_znXmzou7ybL6YUEqTjlCrMntK3vz0Ri_3HMQ&data=04%7C01%7Ctim.salmon%40hydro.com.au%7C760b24a5d7874868654408d874245e5d%7C21d73791531e45c59c072ea902502975%7C1%7C0%7C637387046868367152%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=P89VVhCedWp11Vv5%2Fx1C%2F9D8SkSGQb1lRdG%2Fs5v5Rl4%3D&reserved=0"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6c57a9d0,0x6c57a9e0,0x6c57a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2628"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2064 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2244"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5977373426504484178 --mojo-platform-channel-handle=1008 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3240"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=9866221398459007016 --mojo-platform-channel-handle=1612 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6036548689430880369 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2944"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=1838675298088547228 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
668"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9976121627666794941 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3660"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9683951532868869121 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
1836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,16582183469218985177,3084294381079792395,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=12558609316903390927 --mojo-platform-channel-handle=3172 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
685
Read events
611
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
27
Text files
57
Unknown types
0

Dropped files

PID
Process
Filename
Type
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F8E0A6C-9BC.pma
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF2d421e.TMP
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF2d421e.TMP
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF2d421e.TMP
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF2d421e.TMP
MD5:
SHA256:
2492chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\bf936545-217d-476d-a331-7cacfbc8d734.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
34
DNS requests
22
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3240
chrome.exe
99.86.7.72:443
storage.pardot.com
AT&T Services, Inc.
US
unknown
3240
chrome.exe
172.217.18.163:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3240
chrome.exe
209.197.3.15:443
stackpath.bootstrapcdn.com
Highwinds Network Group, Inc.
US
whitelisted
3240
chrome.exe
35.174.151.106:443
go.pardot.com
Amazon.com, Inc.
US
malicious
3240
chrome.exe
35.245.65.72:443
www.dja-pharma.com
US
unknown
3240
chrome.exe
18.232.28.189:443
ww2.verdict.co.uk
US
malicious
3240
chrome.exe
104.47.117.28:443
aus01.safelinks.protection.outlook.com
Microsoft Corporation
US
whitelisted
3240
chrome.exe
172.217.21.205:443
accounts.google.com
Google Inc.
US
whitelisted
3240
chrome.exe
151.139.128.8:443
kit.fontawesome.com
Highwinds Network Group, Inc.
US
suspicious
3240
chrome.exe
172.217.18.106:443
ajax.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
aus01.safelinks.protection.outlook.com
  • 104.47.117.28
  • 104.47.116.28
whitelisted
clientservices.googleapis.com
  • 172.217.18.163
whitelisted
accounts.google.com
  • 172.217.21.205
shared
go.pardot.com
  • 35.174.151.106
whitelisted
ww2.verdict.co.uk
  • 18.232.28.189
malicious
stackpath.bootstrapcdn.com
  • 209.197.3.15
whitelisted
kit.fontawesome.com
  • 151.139.128.8
whitelisted
www.dja-pharma.com
  • 35.245.65.72
unknown
storage.pardot.com
  • 99.86.7.72
  • 99.86.7.110
  • 99.86.7.49
  • 99.86.7.40
whitelisted
cdnjs.cloudflare.com
  • 104.17.78.107
  • 104.17.79.107
whitelisted

Threats

No threats detected
No debug info