analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://couponbug.xyz/?pKBnStwkB7Bg

Full analysis: https://app.any.run/tasks/97569def-47c5-4a0f-a524-f146970f06a0
Verdict: Suspicious activity
Analysis date: October 01, 2019, 18:03:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

8564A228CC4FDCF985B2C0A3567BB61C

SHA1:

138DD970A44E6D78DE67B09C26539D3B36E176E4

SHA256:

439ACF8064207ECF15FA19622655A8259E1EE3265D101083448D44B5B7F0B291

SSDEEP:

3:N1KdKQeefjxL:CIQTxL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2356)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 1880)
      • chrome.exe (PID: 2356)
    • Application launched itself

      • chrome.exe (PID: 2356)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
20
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2356"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://couponbug.xyz/?pKBnStwkB7Bg"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3804"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6fb2a9d0,0x6fb2a9e0,0x6fb2a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2972"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3172 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2100"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=18117414098863284834 --mojo-platform-channel-handle=1000 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
1880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=3896840599526546592 --mojo-platform-channel-handle=1600 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3584"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9619761173099422548 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2784"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14092350474773737246 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3260"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15911910402913238226 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2528 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2432"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=16566805018900534509 --mojo-platform-channel-handle=3280 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2492"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,13882282357020559152,5378298326926916686,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=6417210102435379944 --mojo-platform-channel-handle=3448 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
604
Read events
520
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
14
Text files
138
Unknown types
7

Dropped files

PID
Process
Filename
Type
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\47df0409-131d-42c7-9b1a-3e07885609fa.tmp
MD5:
SHA256:
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old
MD5:
SHA256:
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF100f82.TMPtext
MD5:DC32343F45B01764B6267AD36548102A
SHA256:A250F5AD57D4BD58AAE92810D50278E3BE2DBF869F126A3A3519691BCDFC2075
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF100f44.TMPtext
MD5:C4D6CBB269C626168A5D6D0D8CCE6C30
SHA256:B62CDBB758278A0C2E50593357390119441D8DE09428EB29027F3DFD1332E348
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:3D551B6E929CF62F7AA66091E718704B
SHA256:1698A1B1BC3E86676392FB8BD4C712438302A5A2220503C08F290ED4B1790404
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:213AE3DA120D7862D60B5763B6C9D466
SHA256:5736534D6EE654C1BF1A8E79E73330AF58F622E8657285330D2C7189A55604F4
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:C4D6CBB269C626168A5D6D0D8CCE6C30
SHA256:B62CDBB758278A0C2E50593357390119441D8DE09428EB29027F3DFD1332E348
2356chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:DC32343F45B01764B6267AD36548102A
SHA256:A250F5AD57D4BD58AAE92810D50278E3BE2DBF869F126A3A3519691BCDFC2075
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
24
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/TK3hWkUHHAIjg75-ohoTus9EAZek1w.woff
US
woff
12.3 Kb
suspicious
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/css.css?family=Oswald:700
US
text
162 b
suspicious
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/plugins.js
US
text
14.2 Kb
suspicious
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/assets/js/h.js
US
text
268 b
suspicious
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/?pKBnStwkB7Bg
US
html
26.6 Kb
suspicious
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/css_9v3lNV.css?family=Open+Sans:400,600
US
text
209 b
suspicious
1880
chrome.exe
GET
200
198.27.69.19:80
http://s4.histats.com/stats/0.php?4273030&@f16&@g1&@h1&@i1&@j1569953057372&@k0&@l1&@mFree%20Gift%20Cards&@n0&@o1000&@q0&@r0&@s0&@ten-US&@u1280&@b1:151753363&@b3:1569953057&@b4:js15_as.js&@b5:60&@a-_0.2.1&@vhttp%3A%2F%2Fcouponbug.xyz%2F%3FpKBnStwkB7Bg&@w
CA
text
51 b
whitelisted
1880
chrome.exe
GET
200
46.105.201.240:80
http://s10.histats.com/js15_as.js
FR
html
4.42 Kb
whitelisted
1880
chrome.exe
GET
302
172.217.22.14:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
534 b
whitelisted
1880
chrome.exe
GET
200
104.31.90.193:80
http://couponbug.xyz/mem8YaGs126MiZpBA-UFVZ0df8pkAg.woff
US
woff
11.7 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1880
chrome.exe
46.105.201.240:80
s10.histats.com
OVH SAS
FR
suspicious
151.101.112.193:443
i.imgur.com
Fastly
US
malicious
1880
chrome.exe
104.31.90.193:80
couponbug.xyz
Cloudflare Inc
US
suspicious
1880
chrome.exe
198.27.69.19:80
s4.histats.com
OVH SAS
CA
suspicious
1880
chrome.exe
151.101.2.109:443
cdn.jsdelivr.net
Fastly
US
suspicious
1880
chrome.exe
172.217.22.1:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted
1880
chrome.exe
172.217.16.132:443
www.google.com
Google Inc.
US
whitelisted
1880
chrome.exe
172.217.21.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
1880
chrome.exe
172.217.16.131:443
ssl.gstatic.com
Google Inc.
US
whitelisted
1880
chrome.exe
172.217.16.142:443
clients2.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
couponbug.xyz
  • 104.31.90.193
  • 104.31.91.193
suspicious
clientservices.googleapis.com
  • 172.217.21.195
whitelisted
accounts.google.com
  • 172.217.22.13
shared
cdn.jsdelivr.net
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
s10.histats.com
  • 46.105.201.240
whitelisted
s4.histats.com
  • 198.27.69.19
  • 192.99.8.27
  • 198.27.67.211
  • 192.99.8.34
  • 192.99.8.28
  • 198.27.67.198
  • 198.27.80.143
  • 158.69.252.241
whitelisted
i.imgur.com
  • 151.101.112.193
shared
www.google.com
  • 172.217.16.132
whitelisted
clients2.google.com
  • 172.217.16.142
whitelisted
clients2.googleusercontent.com
  • 172.217.22.1
whitelisted

Threats

PID
Process
Class
Message
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1880
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
No debug info