analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://sportsstats.xyz/www.sportsstats.me/mlb1/dodgers.php

Full analysis: https://app.any.run/tasks/077e5cd7-fd70-4412-821b-f9766c4ba23b
Verdict: Malicious activity
Analysis date: September 18, 2019, 22:07:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MD5:

8DC381DE3A9987D1B215C06FD164533D

SHA1:

E538691E0BA799469F1442C363963D7BBEC2B9A9

SHA256:

417DB390D4728189DA82C484844D709F1E0F032AA538372C2D31E8723DDB178E

SSDEEP:

3:N1KNV6FSUJAK00KQ8:CBUJzKz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2800)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2800)
      • chrome.exe (PID: 2540)
    • Application launched itself

      • chrome.exe (PID: 2800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
21
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2800"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://sportsstats.xyz/www.sportsstats.me/mlb1/dodgers.php"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3604"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6fdea9d0,0x6fdea9e0,0x6fdea9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2992"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2804 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2300"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=13565164167011531498 --mojo-platform-channel-handle=1056 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2540"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=6417445854060374250 --mojo-platform-channel-handle=1652 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2364"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3850269200208884740 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3248"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13186446503556512977 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3816"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14235609943328746132 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2456 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2848"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=51577734191340189 --mojo-platform-channel-handle=3340 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,1840935340863291732,2480978056589915272,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10321334135728163066 --mojo-platform-channel-handle=3488 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
625
Read events
537
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
55
Text files
201
Unknown types
4

Dropped files

PID
Process
Filename
Type
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF16a0c9.TMP
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1de2674e-94a6-436d-a90d-5327fe2e826f.tmp
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old~RF16a2bd.TMP
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old
MD5:
SHA256:
2800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
64
TCP/UDP connections
34
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/master_tablet.m3u8
unknown
text
213 b
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/2400K/22/07/43.ts
unknown
binary
1.49 Mb
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/2400K/2400_slide.m3u8
unknown
text
369 b
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/1200K/22/07/23.ts
unknown
binary
795 Kb
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/1200K/22/07/28.ts
unknown
binary
772 Kb
suspicious
2540
chrome.exe
GET
200
104.27.168.84:80
http://sportsstats.xyz/www.sportsstats.me/mlb1/dodgers.php
US
html
1.48 Kb
suspicious
2540
chrome.exe
GET
404
104.27.168.84:80
http://sportsstats.xyz/favicon.ico
US
html
240 b
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/1200K/1200_slide.m3u8
unknown
text
372 b
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/2400K/22/07/38.ts
unknown
binary
1.38 Mb
suspicious
2540
chrome.exe
GET
200
2.16.181.208:80
http://mlblive-akc.mlb.com/ls01/mlbam/mlb_network/NETWORK_LINEAR_1/MLB_VIDEO_MLBN_FAUX_LINEAR_STREAM_1_MLBN_Linear_Stream_Tuesday_20190917_1568701268474/2400K/2400_slide.m3u8
unknown
text
367 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2540
chrome.exe
151.101.112.193:443
i.imgur.com
Fastly
US
malicious
2540
chrome.exe
151.101.2.109:443
cdn.jsdelivr.net
Fastly
US
suspicious
2540
chrome.exe
172.217.21.196:443
www.google.com
Google Inc.
US
whitelisted
2540
chrome.exe
151.101.16.193:443
imgur.com
Fastly
US
suspicious
2540
chrome.exe
104.27.168.84:80
sportsstats.xyz
Cloudflare Inc
US
shared
2540
chrome.exe
172.217.18.163:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2540
chrome.exe
172.217.22.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2540
chrome.exe
216.58.210.14:443
clients2.google.com
Google Inc.
US
whitelisted
2540
chrome.exe
151.101.66.109:443
cdn.jsdelivr.net
Fastly
US
unknown
2540
chrome.exe
209.102.208.52:80
mlbnetwork-ws-key.media.mlb.com
Major League Baseball Advanced Media, LP
US
suspicious

DNS requests

Domain
IP
Reputation
sportsstats.xyz
  • 104.27.168.84
  • 104.27.169.84
suspicious
clientservices.googleapis.com
  • 172.217.22.3
whitelisted
accounts.google.com
  • 216.58.207.45
shared
www.google.com
  • 172.217.21.196
whitelisted
cdn.jsdelivr.net
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
www.googletagmanager.com
  • 172.217.18.168
whitelisted
www.gstatic.com
  • 216.58.206.3
whitelisted
imgur.com
  • 151.101.16.193
whitelisted
ssl.gstatic.com
  • 172.217.18.163
whitelisted
www.sportsstats.me
  • 198.54.126.143
malicious

Threats

PID
Process
Class
Message
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
2540
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info