URL:

http://www.mediafire.com/file/21e6a7cd60v0dfi/117_Winter_Snow_4k_Wallpapers.rar/file

Full analysis: https://app.any.run/tasks/9785f381-a175-4400-a0a2-8f0895857710
Verdict: Malicious activity
Analysis date: September 16, 2019, 09:00:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

6B5D2B8B1C30419534D884A82D783134

SHA1:

DB1B448AB9A239A2EB67487CCAB40C11195C85DE

SHA256:

468DFCEFDBF716F4ED2F6C7E02CB5A221C250A8E99E7112E0694F1708E93DD97

SSDEEP:

3:N1KJS4w3eGUoXtESUVtJjg6tnlxDIIA:Cc4w3eGz2SUfJF3PA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Internet Cache Settings

      • opera.exe (PID: 3520)
    • Dropped object may contain Bitcoin addresses

      • opera.exe (PID: 3520)
    • Creates files in the user directory

      • opera.exe (PID: 3520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
3520"C:\Program Files\Opera\opera.exe" "http://www.mediafire.com/file/21e6a7cd60v0dfi/117_Winter_Snow_4k_Wallpapers.rar/file"C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
Total events
700
Read events
577
Write events
121
Delete events
2

Modification events

(PID) Process:(3520) opera.exeKey:HKEY_CURRENT_USER\Software\Opera Software
Operation:writeName:Last CommandLine v2
Value:
C:\Program Files\Opera\opera.exe "http://www.mediafire.com/file/21e6a7cd60v0dfi/117_Winter_Snow_4k_Wallpapers.rar/file"
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0200000001000000000000000700000006000000030000000500000004000000FFFFFFFF
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_FolderType
Value:
{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_TopViewID
Value:
{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_TopViewVersion
Value:
0
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:Mode
Value:
4
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:LogicalViewMode
Value:
1
(PID) Process:(3520) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:FFlags
Value:
1092616257
Executable files
0
Suspicious files
50
Text files
72
Unknown types
0

Dropped files

PID
Process
Filename
Type
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\opr9F42.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr9F43.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr9FA2.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5AXZ0M89UIP74KIRHDTL.temp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprAD30.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprD28B.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprE077.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprE375.tmp
MD5:
SHA256:
3520opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16ec093b8f51508f.customDestinations-ms~RF16aabc.TMPbinary
MD5:309173A3D7AC96E52CA7BB6E941C2CF1
SHA256:D0DE40593BCE48BB74D7DF605809BEAA2C8DC578294215278DCEB978D10B4C6F
3520opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\tasks.xmlxml
MD5:8554193DC4AC206C50FB99C1FB110E9D
SHA256:E1D973AD0C25E3BCD6263B85D251A26346BCD100F1E1391E6D4638913E3938BF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
301
TCP/UDP connections
474
DNS requests
61
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3520
opera.exe
GET
200
104.19.194.29:80
http://www.mediafire.com/js/prebid1.30.0.js
US
text
35.6 Kb
shared
3520
opera.exe
GET
200
104.19.195.29:80
http://static.mediafire.com/images/backgrounds/header/mf_logo_full_color.svg
US
image
1.51 Kb
shared
3520
opera.exe
GET
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEEanTyVp9ezcCAAAAAARu4s%3D
US
der
471 b
whitelisted
3520
opera.exe
GET
200
185.33.223.80:80
http://ib.adnxs.com/async_usersync?cbfn=AN_async_load
unknown
text
655 b
whitelisted
3520
opera.exe
POST
185.33.223.80:80
http://ib.adnxs.com/ut/v3/prebid
unknown
whitelisted
3520
opera.exe
GET
200
2.18.232.130:80
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
unknown
html
506 b
whitelisted
3520
opera.exe
GET
200
178.250.2.151:80
http://dis.criteo.com/dis/usersync.aspx?r=7&p=148&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fsetuid%3Fentity%3D52%26code%3D%40%40CRITEO_USERID%40%40%26seg%3D5311899%0A
FR
image
43 b
whitelisted
3520
opera.exe
GET
302
204.79.197.200:80
http://c.bing.com/c.gif?anx_uid=4696305997544361187&Red3=MSAN_pd
US
whitelisted
3520
opera.exe
GET
302
172.217.21.226:80
http://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_cm&google_sc&uid=4696305997544361187
US
html
337 b
whitelisted
3520
opera.exe
GET
302
66.155.71.149:80
http://pixel-sync.sitescout.com/dmp/pixelSync?nid=84
CA
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3520
opera.exe
172.217.18.104:443
www.googletagmanager.com
Google Inc.
US
suspicious
3520
opera.exe
104.19.194.29:80
www.mediafire.com
Cloudflare Inc
US
shared
3520
opera.exe
185.26.182.112:80
sitecheck2.opera.com
Opera Software AS
malicious
3520
opera.exe
185.26.182.93:443
sitecheck2.opera.com
Opera Software AS
whitelisted
3520
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3520
opera.exe
104.19.195.29:80
www.mediafire.com
Cloudflare Inc
US
shared
3520
opera.exe
172.217.22.78:80
translate.google.com
Google Inc.
US
whitelisted
3520
opera.exe
104.16.68.69:443
dmx.districtm.io
Cloudflare Inc
US
shared
3520
opera.exe
34.95.120.147:80
mediafire-d.openx.net
US
unknown
3520
opera.exe
172.217.16.131:80
crl.pki.goog
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.mediafire.com
  • 104.19.194.29
  • 104.19.195.29
shared
sitecheck2.opera.com
  • 185.26.182.112
  • 185.26.182.93
  • 185.26.182.94
  • 185.26.182.111
whitelisted
certs.opera.com
  • 185.26.182.93
  • 185.26.182.94
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted
www.googletagservices.com
  • 172.217.16.130
whitelisted
securepubads.g.doubleclick.net
  • 172.217.22.2
whitelisted
www.googletagmanager.com
  • 172.217.18.104
whitelisted
static.mediafire.com
  • 104.19.195.29
  • 104.19.194.29
shared
translate.google.com
  • 172.217.22.78
whitelisted
mediafire-d.openx.net
  • 34.95.120.147
whitelisted

Threats

No threats detected
No debug info