analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://trigunaintisolusi.com/lgcf-W8HakXX2m7CMqZ_OJnhWXwK-CHP/InvoiceCodeChanges/scan/EN_en/Past-Due-Invoices

Full analysis: https://app.any.run/tasks/f16b0c7a-6c6b-4027-af6b-054a27f00196
Verdict: Malicious activity
Analysis date: December 18, 2018, 12:36:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MD5:

DD4ACD3B96466267488D4067B11F5369

SHA1:

E3C50F805700E47B05B4DF29C33448FF584FDE4B

SHA256:

56D1D0F859DF0D6D86F0137696776E3C6E4037D69A3C1CAE0473509A5764562C

SSDEEP:

3:N1KKXMCiSQLGGDXU5vsbbH3nWAjoRWGELKuKWIoHW:CKXDi3GmXUkDnWAjpHKnIW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2960)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3108)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2960)
      • iexplore.exe (PID: 3108)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2960)
    • Creates files in the user directory

      • iexplore.exe (PID: 3108)
    • Application launched itself

      • iexplore.exe (PID: 2960)
      • chrome.exe (PID: 3220)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3108)
      • iexplore.exe (PID: 2960)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
10
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2960"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3108"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2960 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3220"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
2188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x6cf500b0,0x6cf500c0,0x6cf500ccC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
3608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3244 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
2968"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=916,4974558090564079742,1667303585134418299,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=F31377B19EA4A2C435180C51271A15D3 --mojo-platform-channel-handle=992 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
2052"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=916,4974558090564079742,1667303585134418299,131072 --enable-features=PasswordImport --service-pipe-token=FE1353E0737E7AAEACD9895E0CBF33D6 --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=FE1353E0737E7AAEACD9895E0CBF33D6 --renderer-client-id=5 --mojo-platform-channel-handle=1920 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
2480"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=916,4974558090564079742,1667303585134418299,131072 --enable-features=PasswordImport --service-pipe-token=E537554AB21132A62ACF62614EE05139 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=E537554AB21132A62ACF62614EE05139 --renderer-client-id=3 --mojo-platform-channel-handle=2096 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
3440"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=916,4974558090564079742,1667303585134418299,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=80FC81ECB0C0B1612D6235CF70E8A5FE --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=80FC81ECB0C0B1612D6235CF70E8A5FE --renderer-client-id=6 --mojo-platform-channel-handle=3572 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
3568"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=916,4974558090564079742,1667303585134418299,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=2C11289B51580F995AF81FCA6F9A051A --mojo-platform-channel-handle=3788 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
Total events
626
Read events
508
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
36
Text files
75
Unknown types
13

Dropped files

PID
Process
Filename
Type
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\main[1].jstext
MD5:EC38AEC4A3AC30FA978A0B2D06D25B5F
SHA256:DBA0CE130C66A62E10D1BD6DB8E4DADCE9E4080970806BC18FBAFD260B563DB2
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\main.min[1].jstext
MD5:339AFF387FD204D0D6C018F0846A447E
SHA256:B7589ED96AA13BAC0CB666DC1E38D46E9F95929195F69CBECC0D950F76F327BE
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\css[1].txttext
MD5:FE131365FE44CD7405BDCF22A9288343
SHA256:BFF53226D344068B23C9761E349F6CFA78282C3231A1EFDB91B78DE4412264C2
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\styles[1].csstext
MD5:5AD1CFA3F5175F627385651790ED0BBD
SHA256:3AD2FCB328295F1199D593ADABA909F3EEA790F695554AC3C1DA7AA009FC0E0D
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\6283888[1].txt
MD5:
SHA256:
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\style[1].csstext
MD5:4D86CB14973930AD14AA8D3FDDF6F8BC
SHA256:6D893D2E3E7F12E1EB413118E28B0AC2ED4AD43CD7761B972F6DD9CB85730A4C
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\Meter-gas-orifice-1[1].jpgimage
MD5:D888373D29BB56ACFC525ADC3CD79995
SHA256:54FC4ACD4868A190C7E67060E829D6A308734ED023F78B1DAFCEAC988210FC0A
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\jquery[1].jstext
MD5:8610F03FE77640DEE8C4CC924E060F12
SHA256:FC48D1D80ECE71A79A7B39877F4104D49D3DA6C3665CF6DC203000FB7DF4447E
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\wp-emoji-release.min[1].jstext
MD5:15D0C302DC74FD87BD9CFEAB513E13E4
SHA256:D2458B9FD9089FDCB9DE317093E004EF3A65597DC68B9ADFDEB15A7C9968D0D5
3108iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\style.min[1].csstext
MD5:B9D4015AD4738655273DE5AB3738E09E
SHA256:57A96EB1CCACAE26E452D6E147FB29CA8CA20CE183970A3A4FB5FEBF8662FCC7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
42
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3108
iexplore.exe
GET
301
103.233.102.18:80
http://trigunaintisolusi.com/lgcf-W8HakXX2m7CMqZ_OJnhWXwK-CHP/InvoiceCodeChanges/scan/EN_en/Past-Due-Invoices
ID
malicious
3108
iexplore.exe
GET
404
103.233.102.18:80
http://www.trigunaintisolusi.com/lgcf-W8HakXX2m7CMqZ_OJnhWXwK-CHP/InvoiceCodeChanges/scan/EN_en/Past-Due-Invoices
ID
html
15.9 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
ID
text
94.9 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1
ID
text
1.65 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-includes/js/wp-embed.min.js?ver=5.0.1
ID
text
1.37 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-content/plugins/bizworx-tools/js/main.js?ver=20180228
ID
text
1.61 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-content/themes/bizworx/js/main.min.js?ver=20180213
ID
text
2.86 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-includes/css/dist/block-library/style.min.css?ver=5.0.1
ID
text
24.9 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-content/themes/bizworx/css/bootstrap/bootstrap.min.css?ver=1
ID
text
16.2 Kb
malicious
3108
iexplore.exe
GET
200
103.233.102.18:80
http://www.trigunaintisolusi.com/wp-content/themes/bizworx/fonts/font-awesome.min.css?ver=5.0.1
ID
text
30.2 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3108
iexplore.exe
172.217.18.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2960
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3108
iexplore.exe
103.233.102.18:80
trigunaintisolusi.com
PT MITRA VISIONER PRATAMA
ID
malicious
3108
iexplore.exe
172.217.18.99:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3108
iexplore.exe
103.233.102.18:443
trigunaintisolusi.com
PT MITRA VISIONER PRATAMA
ID
malicious
3108
iexplore.exe
172.217.16.142:443
support.google.com
Google Inc.
US
whitelisted
3108
iexplore.exe
108.177.15.194:443
drive.google.com
Google Inc.
US
unknown
3108
iexplore.exe
216.58.207.35:443
www.gstatic.com
Google Inc.
US
whitelisted
3108
iexplore.exe
64.233.166.196:443
apis.google.com
Google Inc.
US
unknown
2960
iexplore.exe
172.217.16.142:443
support.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
trigunaintisolusi.com
  • 103.233.102.18
malicious
www.trigunaintisolusi.com
  • 103.233.102.18
malicious
fonts.googleapis.com
  • 172.217.18.106
whitelisted
fonts.gstatic.com
  • 172.217.18.99
whitelisted
drive.google.com
  • 108.177.15.194
shared
support.google.com
  • 172.217.16.142
whitelisted
www.gstatic.com
  • 216.58.207.35
whitelisted
apis.google.com
  • 64.233.166.196
whitelisted
lh3.googleusercontent.com
  • 172.217.22.1
whitelisted

Threats

PID
Process
Class
Message
3108
iexplore.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious request with 'invoice' in http uri
3108
iexplore.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious request with 'invoice' in http uri
No debug info