analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://k6j.pw:8080/GE4aTj1XXXI/USMUMRSANJAYP1k6j.pw

Full analysis: https://app.any.run/tasks/66c40348-7f3b-45ce-8631-38005e1426e5
Verdict: Malicious activity
Analysis date: June 27, 2022, 08:08:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

6BF603C9FBB34ACEA0BE5FF1ADC5C0CB

SHA1:

0C8A06B4CDF8510BE8A57B25622CC8A8664868D8

SHA256:

6990B2740F2FCE99B7C278DC54DB0BCE99C04E10622A3418783C8336B08F710E

SSDEEP:

3:N1KVXV8VpdxPUyIq3v11TE:CnE1PUu9e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • cmd.exe (PID: 304)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3572)
  • INFO

    • Reads the computer name

      • chrome.exe (PID: 3572)
      • chrome.exe (PID: 2512)
      • chrome.exe (PID: 2120)
      • chrome.exe (PID: 2368)
      • PING.EXE (PID: 3436)
      • chrome.exe (PID: 1992)
      • chrome.exe (PID: 2208)
    • Checks supported languages

      • chrome.exe (PID: 3572)
      • chrome.exe (PID: 2512)
      • chrome.exe (PID: 3864)
      • chrome.exe (PID: 2120)
      • chrome.exe (PID: 1804)
      • chrome.exe (PID: 1968)
      • chrome.exe (PID: 3180)
      • chrome.exe (PID: 2368)
      • PING.EXE (PID: 3884)
      • PING.EXE (PID: 3436)
      • chrome.exe (PID: 3260)
      • chrome.exe (PID: 2764)
      • chrome.exe (PID: 1992)
      • chrome.exe (PID: 2032)
      • chrome.exe (PID: 2208)
      • chrome.exe (PID: 1432)
    • Reads the hosts file

      • chrome.exe (PID: 3572)
      • chrome.exe (PID: 2120)
    • Application launched itself

      • chrome.exe (PID: 3572)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2120)
    • Manual execution by user

      • cmd.exe (PID: 304)
    • Reads the date of Windows installation

      • chrome.exe (PID: 1992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
17
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs cmd.exe no specs ping.exe no specs ping.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3572"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "http://k6j.pw:8080/GE4aTj1XXXI/USMUMRSANJAYP1k6j.pw"C:\Program Files\Google\Chrome\Application\chrome.exe
Explorer.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3864"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6eb3d988,0x6eb3d998,0x6eb3d9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
2512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,16933822728430100572,8404475255173115073,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgACAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1044 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
2120"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1032,16933822728430100572,8404475255173115073,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1240 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
1804"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,16933822728430100572,8404475255173115073,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
1968"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,16933822728430100572,8404475255173115073,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
3180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,16933822728430100572,8404475255173115073,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
2368"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,16933822728430100572,8404475255173115073,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgACAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1068 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
86.0.4240.198
304"C:\Windows\system32\cmd.exe" C:\Windows\system32\cmd.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3884ping http://k6j.pw/C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
8 482
Read events
8 406
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
9
Text files
68
Unknown types
0

Dropped files

PID
Process
Filename
Type
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-62B9659F-DF4.pma
MD5:
SHA256:
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\4afe7020-499c-42a2-8b6b-23776f71cf90.tmptext
MD5:9ED37CA5E208C69411DF482B4A0F05B6
SHA256:CF02CD69DAFA60EF739904E6DA39D36C64DF503982DB894A3B5ED8E876FAEA51
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:5BD3C311F2136A7A88D3E197E55CF902
SHA256:FA331915E1797E59979A3E4BCC2BD0D3DEAA039B94D4DB992BE251FD02A224B9
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old~RFf9a81.TMPtext
MD5:D0BA19096D6C8F8DE58312E8D938E893
SHA256:AADE90A7B0984F3C719D528E4E6FAE3854E28B30363BDD4DF65037E69784A078
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFf97b3.TMPtext
MD5:64AD8ED3E666540337BA541C549F72F7
SHA256:BECBDB08B5B37D203A85F2E974407334053BB1D2270F0B3C9A4DB963896F2206
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.oldtext
MD5:995C92837E4775CAFFE387D51ADBA520
SHA256:51247C3464FD988B72670002D01A57FBFF1348704D325DC8FF8817ED2459D0D9
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferencestext
MD5:9ED37CA5E208C69411DF482B4A0F05B6
SHA256:CF02CD69DAFA60EF739904E6DA39D36C64DF503982DB894A3B5ED8E876FAEA51
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Local Statetext
MD5:C4330146C1A4FB8D39D74A1BA604CEAB
SHA256:1789656DB4EA0CF9E25D6C92DB86E91AA745031CC4EDD87B0170B803119A1D70
3572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\be613102-240f-4203-a89a-4f0932429166.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
19
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
chrome.exe
GET
77.56.224.7:8080
http://k6j.pw:8080/GE4aTj1XXXI/USMUMRSANJAYP1k6j.pw
CH
malicious
2120
chrome.exe
GET
77.56.224.7:8080
http://77.56.224.7:8080/GE4aTj1XXXI/USMUMRSANJAYP1k6j.pw
CH
malicious
2120
chrome.exe
GET
204
142.251.36.67:80
http://www.gstatic.com/generate_204
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2120
chrome.exe
142.250.185.174:443
clients2.google.com
Google Inc.
US
whitelisted
2120
chrome.exe
216.58.212.173:443
accounts.google.com
Google Inc.
US
whitelisted
2120
chrome.exe
216.58.212.163:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2120
chrome.exe
142.250.186.131:443
update.googleapis.com
Google Inc.
US
whitelisted
2120
chrome.exe
142.251.36.78:443
clients1.google.com
Google Inc.
US
whitelisted
2120
chrome.exe
142.251.36.65:443
clients2.googleusercontent.com
Google Inc.
US
unknown
2120
chrome.exe
77.56.224.7:8080
k6j.pw
Liberty Global Operations B.V.
CH
malicious
142.251.36.67:80
www.gstatic.com
Google Inc.
US
unknown

DNS requests

Domain
IP
Reputation
k6j.pw
  • 77.56.224.7
malicious
clients2.google.com
  • 142.250.185.174
whitelisted
accounts.google.com
  • 216.58.212.173
shared
clients2.googleusercontent.com
  • 142.251.36.65
whitelisted
ssl.gstatic.com
  • 216.58.212.163
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
www.gstatic.com
  • 142.251.36.67
whitelisted
update.googleapis.com
  • 142.250.186.131
whitelisted
clients1.google.com
  • 142.251.36.78
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
2120
chrome.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.pw domain
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
2120
chrome.exe
Generic Protocol Command Decode
SURICATA STREAM CLOSEWAIT FIN out of window
No debug info