URL: | https://t.co/H6cTmonUKo |
Full analysis: | https://app.any.run/tasks/851bf6a5-7769-4218-8fd4-ee82de35e4ce |
Verdict: | Malicious activity |
Analysis date: | July 17, 2019, 17:24:50 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MD5: | CF570100B4CE84BCC89BA10D8BC9FFA3 |
SHA1: | C5BF8933A34712646070DE3B4B3C29FF17ABE472 |
SHA256: | 3D337776B88F5C8C828E7E9E0EF6B02C1773CDC2731DACC87E7FAD366B61685F |
SSDEEP: | 3:N8DItKx3Lun:28QlLun |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3348 | "C:\Program Files\Internet Explorer\iexplore.exe" -nohome | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3692 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3348 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
1256 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
840 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x7227a9d0,0x7227a9e0,0x7227a9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
3960 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1840 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
2212 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=992,11237000499309248717,7375385973831036528,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=11113097205210323090 --mojo-platform-channel-handle=1004 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Version: 75.0.3770.100 | ||||
3716 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,11237000499309248717,7375385973831036528,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=15157425045830518158 --mojo-platform-channel-handle=1552 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
3216 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11237000499309248717,7375385973831036528,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15654935972903057129 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3660 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11237000499309248717,7375385973831036528,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11580616586299605076 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3972 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11237000499309248717,7375385973831036528,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12424500933574824503 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2468 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3348 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
3348 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Q07L9Y5O\H6cTmonUKo[1].txt | — | |
MD5:— | SHA256:— | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Q07L9Y5O\server6[1].php | — | |
MD5:— | SHA256:— | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Q07L9Y5O\H6cTmonUKo[1].htm | html | |
MD5:625FF5B2D82173D2EA4CFCE8F30D075F | SHA256:371FD71B1937A391278B34A2A2E989BBA59C0635DD7A9089863C82990C9DD4B7 | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\Q07L9Y5O\server6[1].htm | html | |
MD5:DF01E74BFD60862A4D5E83357738E005 | SHA256:C3955C1E5FBE075C696CCC8E0C1E34A5B22A5D8826E02DA828AD22B6549BEA0D | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat | dat | |
MD5:4D1E07C9E9A9598E153B962FF1FDC641 | SHA256:06B3BCFD8D3F17E36A5A35DAB3352212A7921261A70AACE87F07B995EB6135DB | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat | dat | |
MD5:BBF0B31505F0C0D523694D6DDE3B2107 | SHA256:152DB542FD1AC443B4620726840FEEB7682A6F4183AB1E1DB3473570BF752F10 | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QLAERR6O\desktop.ini | ini | |
MD5:4A3DEB274BB5F0212C2419D3D8D08612 | SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38 | |||
3692 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MX8C86JG\desktop.ini | ini | |
MD5:4A3DEB274BB5F0212C2419D3D8D08612 | SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3692 | iexplore.exe | GET | 301 | 94.156.175.181:80 | http://unlimitedmedia.top/server6.php?asin=1607649241 | BG | — | — | suspicious |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/comment/fed.js | BG | text | 5.84 Kb | suspicious |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/comment/font-awesome.css | BG | text | 5.25 Kb | suspicious |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/flags/nl.png | BG | image | 108 b | suspicious |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/comment/jquery_004.js | BG | text | 32.4 Kb | suspicious |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/comment/jquery.js | BG | text | 677 b | suspicious |
3692 | iexplore.exe | GET | 200 | 209.197.3.15:80 | http://maxcdn.bootstrapcdn.com/font-awesome/4.2.0/fonts/fontawesome-webfont.eot? | US | eot | 54.6 Kb | whitelisted |
3692 | iexplore.exe | GET | 200 | 104.19.198.151:80 | http://cdnjs.cloudflare.com/ajax/libs/jquery-cookie/1.4.1/jquery.cookie.min.js | US | text | 697 b | whitelisted |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/server6.php?asin=1607649241 | BG | html | 4.87 Kb | suspicious |
3692 | iexplore.exe | GET | 200 | 94.156.175.181:80 | http://sevabook.com/comment/jquery_002.js | BG | text | 890 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3348 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3692 | iexplore.exe | 23.111.8.154:443 | oss.maxcdn.com | netDNA | US | unknown |
3692 | iexplore.exe | 209.197.3.15:443 | maxcdn.bootstrapcdn.com | Highwinds Network Group, Inc. | US | whitelisted |
3692 | iexplore.exe | 205.185.208.52:443 | code.jquery.com | Highwinds Network Group, Inc. | US | unknown |
3692 | iexplore.exe | 45.63.87.82:80 | — | Choopa, LLC | US | unknown |
3692 | iexplore.exe | 104.244.42.5:443 | t.co | Twitter Inc. | US | suspicious |
3692 | iexplore.exe | 104.19.198.151:80 | cdnjs.cloudflare.com | Cloudflare Inc | US | shared |
3692 | iexplore.exe | 94.156.175.181:80 | unlimitedmedia.top | Histate Global Corp. | BG | suspicious |
3692 | iexplore.exe | 209.197.3.15:80 | maxcdn.bootstrapcdn.com | Highwinds Network Group, Inc. | US | whitelisted |
3692 | iexplore.exe | 205.185.208.52:80 | code.jquery.com | Highwinds Network Group, Inc. | US | unknown |
Domain | IP | Reputation |
---|---|---|
www.bing.com |
| whitelisted |
t.co |
| shared |
unlimitedmedia.top |
| suspicious |
sevabook.com |
| suspicious |
maxcdn.bootstrapcdn.com |
| whitelisted |
oss.maxcdn.com |
| whitelisted |
code.jquery.com |
| whitelisted |
cdnjs.cloudflare.com |
| whitelisted |
images.amazon.com |
| whitelisted |
hackgameandroid.mobi |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
3692 | iexplore.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
3716 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request) |
3716 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request) |
3716 | chrome.exe | Attempted User Privilege Gain | ET INFO Session Traversal Utilities for NAT (STUN Binding Request) |