analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://thehorseaholic.com/

Full analysis: https://app.any.run/tasks/b291935a-aa67-46ed-8e7e-6d38b7211caf
Verdict: Malicious activity
Analysis date: July 11, 2019, 19:52:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

A32CF2CEC317D1C16C87D585C07BA284

SHA1:

1DC7A1C4CCA9F9A67EC251F82B0BA958F3C95DFB

SHA256:

354CD74E56CD7347ADE0327F649F14EC30FCCF621FEE18C3BA6B3A05BD0325ED

SSDEEP:

3:N1KKNoRaGTK:CKNNGTK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • firefox.exe (PID: 3300)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 3300)
    • Application launched itself

      • firefox.exe (PID: 3300)
    • Creates files in the user directory

      • firefox.exe (PID: 3300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
5
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
3300"C:\Program Files\Mozilla Firefox\firefox.exe" http://thehorseaholic.com/C:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
67.0.4
768"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3300.0.955968241\243648836" -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3300 "\\.\pipe\gecko-crash-server-pipe.3300" 1152 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
67.0.4
3792"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3300.3.674334669\375587114" -childID 1 -isForBrowser -prefsHandle 1560 -prefMapHandle 820 -prefsLen 1 -prefMapSize 188076 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3300 "\\.\pipe\gecko-crash-server-pipe.3300" 1304 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
67.0.4
1516"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3300.13.1870986543\832997422" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2624 -prefsLen 5842 -prefMapSize 188076 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3300 "\\.\pipe\gecko-crash-server-pipe.3300" 2644 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
67.0.4
1400"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3300.20.1944854075\1851554508" -childID 3 -isForBrowser -prefsHandle 2560 -prefMapHandle 2804 -prefsLen 6604 -prefMapSize 188076 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3300 "\\.\pipe\gecko-crash-server-pipe.3300" 3428 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
67.0.4
Total events
913
Read events
910
Write events
3
Delete events
0

Modification events

(PID) Process:(3300) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
0000000000000000
(PID) Process:(3300) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3300) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
2
Suspicious files
282
Text files
87
Unknown types
100

Dropped files

PID
Process
Filename
Type
3300firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\pluginreg.dat.tmp
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
3300firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:D65B2BD591A1D6CC666241E6EEF1AFE7
SHA256:1B94F69A3BF3CB9F7349FE274CA82166C22D675F9B043B19F2770D044AE9BD16
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
122
TCP/UDP connections
130
DNS requests
255
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3300
firefox.exe
GET
200
198.71.233.227:80
http://thehorseaholic.com/
US
html
29.0 Kb
suspicious
3300
firefox.exe
GET
200
198.71.233.227:80
http://thehorseaholic.com/wp-content/plugins/social-popup/spu.css?ver=1.6.4.3
US
text
450 b
suspicious
3300
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3300
firefox.exe
GET
200
198.71.233.227:80
http://thehorseaholic.com/wp-content/themes/valenti/library/css/style.css?ver=5.0.2
US
text
30.7 Kb
suspicious
3300
firefox.exe
GET
200
198.71.233.227:80
http://thehorseaholic.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.2
US
text
4.66 Kb
suspicious
3300
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3300
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3300
firefox.exe
GET
200
198.71.233.227:80
http://thehorseaholic.com/wp-content/plugins/jetpack/modules/shortcodes/css/jetpack-email-subscribe.css?ver=1.0
US
text
305 b
suspicious
3300
firefox.exe
GET
200
198.71.233.227:80
http://thehorseaholic.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
US
text
3.92 Kb
suspicious
3300
firefox.exe
GET
200
2.19.43.118:80
http://platform-api.sharethis.com/js/sharethis.js
unknown
text
26.8 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3300
firefox.exe
198.71.233.227:80
thehorseaholic.com
GoDaddy.com, LLC
US
malicious
3300
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3300
firefox.exe
34.243.21.190:443
location.services.mozilla.com
Amazon.com, Inc.
IE
unknown
3300
firefox.exe
2.16.186.112:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
3300
firefox.exe
13.224.192.58:443
snippets.cdn.mozilla.net
US
unknown
3300
firefox.exe
52.42.232.148:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
3300
firefox.exe
35.160.254.42:443
push.services.mozilla.com
Amazon.com, Inc.
US
malicious
3300
firefox.exe
216.58.207.74:80
fonts.googleapis.com
Google Inc.
US
whitelisted
3300
firefox.exe
172.217.16.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3300
firefox.exe
93.184.220.66:80
platform.twitter.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 2.16.186.112
  • 2.16.186.50
whitelisted
thehorseaholic.com
  • 198.71.233.227
suspicious
a1089.dscd.akamai.net
  • 2.16.186.50
  • 2.16.186.112
whitelisted
location.services.mozilla.com
  • 34.243.21.190
  • 34.251.59.153
  • 52.18.148.152
whitelisted
locprod1-elb-eu-west-1.prod.mozaws.net
  • 52.18.148.152
  • 34.251.59.153
  • 34.243.21.190
whitelisted
push.services.mozilla.com
  • 35.160.254.42
whitelisted
autopush.prod.mozaws.net
  • 35.160.254.42
whitelisted
tiles.services.mozilla.com
  • 52.42.232.148
  • 52.26.166.58
  • 52.26.103.165
  • 52.27.87.181
  • 52.34.132.219
  • 52.35.96.157
  • 52.43.91.152
  • 54.186.163.246
whitelisted
tiles.r53-2.services.mozilla.com
  • 54.186.163.246
  • 52.43.91.152
  • 52.35.96.157
  • 52.34.132.219
  • 52.27.87.181
  • 52.26.103.165
  • 52.26.166.58
  • 52.42.232.148
whitelisted
snippets.cdn.mozilla.net
  • 13.224.192.58
whitelisted

Threats

No threats detected
No debug info