URL:

https://dstormer6em3i4km.onion.ly

Full analysis: https://app.any.run/tasks/85c045ea-79dc-46f1-9e92-0cb56638313f
Verdict: Malicious activity
Analysis date: July 14, 2020, 16:38:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

44AB7B48430927D0438AE940E1F0F643

SHA1:

30F6C8384792946027663E8795AADFF1E8BB4256

SHA256:

5CD5230263DF1B32BB6F1C5947741BEC565414A67FF94BFCCA87E159CB9BA219

SSDEEP:

3:N8O2IyJLo5/LS:2O2IyJLoV+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • opera.exe (PID: 3292)
    • Dropped object may contain TOR URL's

      • opera.exe (PID: 3292)
    • Dropped object may contain URL to Tor Browser

      • opera.exe (PID: 3292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
3292"C:\Program Files\Opera\opera.exe" "https://dstormer6em3i4km.onion.ly"C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
Total events
296
Read events
236
Write events
60
Delete events
0

Modification events

(PID) Process:(3292) opera.exeKey:HKEY_CURRENT_USER\Software\Opera Software
Operation:writeName:Last CommandLine v2
Value:
C:\Program Files\Opera\opera.exe "https://dstormer6em3i4km.onion.ly"
(PID) Process:(3292) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
0
Suspicious files
26
Text files
22
Unknown types
43

Dropped files

PID
Process
Filename
Type
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprD062.tmp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprD072.tmp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprD0B2.tmp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\sesn\opr00001.tmp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NXJDBL028S8R7AEUWDFE.temp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprDF49.tmp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprF320.tmp
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\tasks.xmlxml
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opssl6.datbinary
MD5:
SHA256:
3292opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16ec093b8f51508f.customDestinations-msbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
47
DNS requests
15
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3292
opera.exe
GET
200
93.184.220.29:80
http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl
US
der
564 b
whitelisted
3292
opera.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEFGtmnyVBCtiCAAAAABH7pw%3D
US
der
471 b
whitelisted
3292
opera.exe
GET
200
172.217.18.99:80
http://crl.pki.goog/gsr2/gsr2.crl
US
der
950 b
whitelisted
3292
opera.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/gsalphasha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSE1Wv4CYvTB7dm2OHrrWWWqmtnYQQU9c3VPAhQ%2BWpPOreX2laD5mnSaPcCDGZy55F5L7JpDaOe%2FA%3D%3D
US
der
1.49 Kb
whitelisted
3292
opera.exe
GET
200
104.18.21.226:80
http://crl.globalsign.net/root.crl
US
der
1.07 Kb
whitelisted
3292
opera.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEGZTHFgrDzuBAgAAAABvBR8%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3292
opera.exe
172.217.18.99:80
crl.pki.goog
Google Inc.
US
whitelisted
3292
opera.exe
172.217.22.67:443
fonts.gstatic.com
Google Inc.
US
whitelisted
3292
opera.exe
82.145.216.16:443
sitecheck2.opera.com
Opera Software AS
suspicious
3292
opera.exe
185.26.182.93:443
certs.opera.com
Opera Software AS
whitelisted
3292
opera.exe
198.251.89.118:443
dstormer6em3i4km.onion.ly
FranTech Solutions
US
malicious
3292
opera.exe
104.18.21.226:80
ocsp2.globalsign.com
Cloudflare Inc
US
shared
3292
opera.exe
104.18.20.226:80
ocsp2.globalsign.com
Cloudflare Inc
US
shared
3292
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3292
opera.exe
185.26.182.94:443
certs.opera.com
Opera Software AS
whitelisted
3292
opera.exe
82.145.216.15:443
sitecheck2.opera.com
Opera Software AS
suspicious

DNS requests

Domain
IP
Reputation
dstormer6em3i4km.onion.ly
  • 198.251.89.118
malicious
sitecheck2.opera.com
  • 82.145.216.16
  • 82.145.216.15
whitelisted
certs.opera.com
  • 185.26.182.93
  • 185.26.182.94
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
crl.globalsign.net
  • 104.18.21.226
  • 104.18.20.226
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted
fonts.googleapis.com
  • 216.58.210.10
whitelisted
www.googletagmanager.com
  • 172.217.23.168
whitelisted
crl.pki.goog
  • 172.217.18.99
whitelisted
ocsp.pki.goog
  • 172.217.18.99
whitelisted

Threats

PID
Process
Class
Message
1056
svchost.exe
Potential Corporate Privacy Violation
ET POLICY DNS Query to .onion proxy Domain (onion . ly)
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
3292
opera.exe
Potential Corporate Privacy Violation
ET POLICY .onion.ly Proxy domain in SNI
No debug info