URL:

http://akamai.la

Full analysis: https://app.any.run/tasks/9070ac62-211c-4229-83b1-8d6e9fc60f07
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: February 26, 2019, 07:46:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MD5:

57172DA2F327D1D3AF5B938B0AC7376A

SHA1:

D333C6F305AE15268A46625356055187A185CF97

SHA256:

70455B47148FA6905CEF577C18A1B7778C1E1D6B71B508C8874B0203B1671BC7

SSDEEP:

3:N1KfJ:CR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • firefox.exe (PID: 3516)
    • Application launched itself

      • firefox.exe (PID: 3516)
    • Reads CPU info

      • firefox.exe (PID: 3516)
      • firefox.exe (PID: 3404)
      • firefox.exe (PID: 2964)
      • firefox.exe (PID: 3428)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 3516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe firefox.exe firefox.exe firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
2964"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3516.0.546080884\413739282" -childID 1 -isForBrowser -prefsHandle 1440 -prefsLen 8310 -schedulerPrefs 0001,2 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3516 "\\.\pipe\gecko-crash-server-pipe.3516" 1488 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
61.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3404"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3516.6.812698062\1980912987" -childID 2 -isForBrowser -prefsHandle 2472 -prefsLen 11442 -schedulerPrefs 0001,2 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3516 "\\.\pipe\gecko-crash-server-pipe.3516" 2440 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
61.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3428"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3516.12.1193435502\768024621" -childID 3 -isForBrowser -prefsHandle 2976 -prefsLen 12017 -schedulerPrefs 0001,2 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3516 "\\.\pipe\gecko-crash-server-pipe.3516" 3004 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
61.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3516"C:\Program Files\Mozilla Firefox\firefox.exe" http://akamai.laC:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
61.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
499
Read events
497
Write events
2
Delete events
0

Modification events

(PID) Process:(3516) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3516) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
0
Suspicious files
261
Text files
88
Unknown types
90

Dropped files

PID
Process
Filename
Type
3516firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\83B0332F0981AE86CBB44F5C84B5E1717A668FE8der
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\doomed\9394binary
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\55F3A8141B0F01292545EBF09A1E053D6C64205Bbinary
MD5:
SHA256:
3516firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
121
DNS requests
275
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3516
firefox.exe
POST
200
216.58.211.99:80
http://ocsp.pki.goog/GTSGIAG3
US
der
463 b
whitelisted
3516
firefox.exe
POST
200
195.138.255.16:80
http://ocsp.int-x3.letsencrypt.org/
DE
der
527 b
whitelisted
3516
firefox.exe
POST
200
52.222.163.121:80
http://ocsp.sca1b.amazontrust.com/
US
der
471 b
whitelisted
3516
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3516
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3516
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3516
firefox.exe
POST
200
216.58.211.99:80
http://ocsp.pki.goog/GTSGIAG3
US
der
463 b
whitelisted
3516
firefox.exe
POST
200
216.58.211.99:80
http://ocsp.pki.goog/GTSGIAG3
US
der
463 b
whitelisted
3516
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3516
firefox.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.74 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3516
firefox.exe
185.185.25.56:80
akamai.la
First Colo GmbH
DE
malicious
3516
firefox.exe
52.88.150.81:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3516
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3516
firefox.exe
52.43.40.243:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
3516
firefox.exe
216.58.207.72:443
www.googletagmanager.com
Google Inc.
US
whitelisted
3516
firefox.exe
68.67.153.60:443
s.ml-attr.com
AppNexus, Inc
US
suspicious
3516
firefox.exe
104.244.46.48:443
static.ads-twitter.com
Twitter Inc.
US
unknown
3516
firefox.exe
204.79.197.200:443
bat.bing.com
Microsoft Corporation
US
whitelisted
3516
firefox.exe
172.217.16.130:443
www.googleadservices.com
Google Inc.
US
whitelisted
3516
firefox.exe
195.138.255.16:80
ocsp.int-x3.letsencrypt.org
AS33891 Netzbetrieb GmbH
DE
suspicious

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 104.107.216.169
  • 104.107.216.187
whitelisted
akamai.la
  • 185.185.25.56
malicious
a1089.dscd.akamai.net
  • 104.107.216.187
  • 104.107.216.169
whitelisted
search.services.mozilla.com
  • 52.88.150.81
  • 35.166.112.39
  • 34.213.175.109
whitelisted
search.r53-2.services.mozilla.com
  • 34.213.175.109
  • 35.166.112.39
  • 52.88.150.81
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cs9.wac.phicdn.net
  • 93.184.220.29
whitelisted
tiles.services.mozilla.com
  • 52.43.40.243
  • 52.43.91.152
  • 52.34.107.172
  • 52.41.78.152
  • 34.208.103.195
  • 52.39.131.77
  • 54.186.163.246
  • 54.68.149.88
whitelisted
tiles.r53-2.services.mozilla.com
  • 54.68.149.88
  • 54.186.163.246
  • 52.39.131.77
  • 34.208.103.195
  • 52.41.78.152
  • 52.34.107.172
  • 52.43.91.152
  • 52.43.40.243
whitelisted
www.akamai.com
  • 104.111.252.237
whitelisted

Threats

PID
Process
Class
Message
1064
svchost.exe
A Network Trojan was detected
ET TROJAN DarkGate Domain in DNS Lookup (akamai .la)
1064
svchost.exe
A Network Trojan was detected
ET TROJAN DarkGate Domain in DNS Lookup (akamai .la)
1064
svchost.exe
A Network Trojan was detected
ET TROJAN DarkGate Domain in DNS Lookup (akamai .la)
3516
firefox.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
No debug info