| URL: | http://d1y4n9nucfv665.cloudfront.net/nr4hq&iaa9r83/microsoft_word_setup7277.exe |
| Full analysis: | https://app.any.run/tasks/5adb2fbc-3c94-44ca-8c4a-b4d9f4fb3bb4 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | February 16, 2019, 10:31:27 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 76AEA162723FE28901A201C77A129635 |
| SHA1: | 6155F58E97BBA3B5B24ECD5AB155AF2E349CC48B |
| SHA256: | 7870FEC0726E1AC35E9C6D8B8A410B33FC4E380F6EF4252CB0BC2871E78F1DD5 |
| SSDEEP: | 3:N1KaUcEQUT4Le1+l/0+a+qWrKWYcSKcxQ4XS4:CaFuSqnXYrKRcSKcBS4 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | "C:\Program Files\Opera\58.0.3135.65\opera.exe" --type=renderer --field-trial-handle=980,10943966073443350652,2644556140490173822,131072 --service-pipe-token=3231176211313081267 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --with-feature:installer-experiment-test=off --with-feature:installer-use-minimal-package=off --ab_tests="booking.com appender enabled:Add bookingCom speeddial" --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3231176211313081267 --renderer-client-id=6 --mojo-platform-channel-handle=2200 /prefetch:1 | C:\Program Files\Opera\58.0.3135.65\opera.exe | — | opera.exe | |||||||||||
User: admin Company: Opera Software Integrity Level: LOW Description: Opera Internet Browser Exit code: 0 Version: 58.0.3135.65 Modules
| |||||||||||||||
| 1008 | "C:\Program Files\Opera\58.0.3135.65\opera.exe" --type=gpu-process --field-trial-handle=980,10943966073443350652,2644556140490173822,131072 --with-feature:installer-experiment-test=off --with-feature:installer-use-minimal-package=off --ab_tests="booking.com appender enabled:Add bookingCom speeddial" --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --with-feature:installer-experiment-test=off --with-feature:installer-use-minimal-package=off --ab_tests="booking.com appender enabled:Add bookingCom speeddial" --service-request-channel-token=10062355724133337657 --mojo-platform-channel-handle=1056 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Opera\58.0.3135.65\opera.exe | — | opera.exe | |||||||||||
User: admin Company: Opera Software Integrity Level: LOW Description: Opera Internet Browser Exit code: 0 Version: 58.0.3135.65 Modules
| |||||||||||||||
| 1140 | "C:\Program Files\AVAST Software\Avast\RegSvr.exe" "C:\Program Files\AVAST Software\Avast\aswAMSI.dll" | C:\Program Files\AVAST Software\Avast\RegSvr.exe | — | instup.exe | |||||||||||
User: admin Company: AVAST Software Integrity Level: HIGH Description: Avast Antivirus Installer Exit code: 0 Version: 19.2.4186.0 Modules
| |||||||||||||||
| 1164 | "C:\Program Files\AVAST Software\Avast\wsc_proxy.exe" /svc /register /ppl_svc | C:\Program Files\AVAST Software\Avast\wsc_proxy.exe | — | instup.exe | |||||||||||
User: SYSTEM Company: AVAST Software Integrity Level: SYSTEM Description: Avast remediation exe Exit code: 0 Version: 19.2.4186.0 Modules
| |||||||||||||||
| 1200 | "C:\Program Files\AVAST Software\Avast\setup\instup.exe" /instop:complete_update /wait | C:\Program Files\AVAST Software\Avast\setup\instup.exe | AvastSvc.exe | ||||||||||||
User: SYSTEM Company: AVAST Software Integrity Level: SYSTEM Description: Avast Antivirus Installer Exit code: 0 Version: 19.2.4186.0 Modules
| |||||||||||||||
| 1216 | "C:\Program Files\AVAST Software\Avast\defs\19021509\engsup.exe" /get_download_cookie /get_latest_ga_client_id /get_latest_gclid | C:\Program Files\AVAST Software\Avast\defs\19021509\engsup.exe | — | instup.exe | |||||||||||
User: admin Company: AVAST Software Integrity Level: HIGH Description: Avast Antivirus vps tool Exit code: 2 Version: 18.0.476.0 Modules
| |||||||||||||||
| 1248 | "C:\Program Files\Opera\58.0.3135.65\opera_autoupdate.exe" --host=https://autoupdate.geo.opera.com/ --pipeid --version=58.0.3135.65 --edition --lang=en-US --producttype --requesttype=start --operadir="C:\Program Files\Opera\58.0.3135.65" --installdir="C:\Program Files\Opera" --profile="C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable" --installationdatadir="C:\Program Files\Opera" --firstrunver=58.0.3135.65 --consent-info=eyJzdGFydHBhZ2VfbmV3c19jb25zZW50X2dpdmVuIjpmYWxzZSwic3RhdGlzdGljc19jb2xsZWN0aW9uX2VuYWJsZWQiOnRydWUsInVzZXJfZXhwZXJpZW5jZV9tZXRyaWNzX3JlcG9ydGluZ19lbmFibGVkIjp0cnVlfQ== --firstrunts=1550313197 | C:\Program Files\Opera\58.0.3135.65\opera_autoupdate.exe | opera.exe | ||||||||||||
User: admin Company: Opera Software Integrity Level: MEDIUM Description: Opera auto-updater Exit code: 0 Version: 58.0.3135.65 Modules
| |||||||||||||||
| 1252 | "C:\Program Files\Common Files\AVAST Software\Overseer\overseer.exe" /skip_update /skip_uptime /skip_remediations | C:\Program Files\Common Files\AVAST Software\Overseer\overseer.exe | instup.exe | ||||||||||||
User: admin Company: AVAST Software Integrity Level: HIGH Description: Avast Overseer Exit code: 0 Version: 1.0.350.0 Modules
| |||||||||||||||
| 1324 | "C:\Users\admin\AppData\Local\Temp\opera autoupdate\installer.exe" --version | C:\Users\admin\AppData\Local\Temp\opera autoupdate\installer.exe | launcher.exe | ||||||||||||
User: admin Company: Opera Software Integrity Level: HIGH Description: Opera Installer Exit code: 0 Version: 58.0.3135.65 Modules
| |||||||||||||||
| 1728 | "C:\Program Files\Opera\58.0.3135.65\installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=58.0.3135.65 --initial-client-data=0xd8,0xe0,0xe4,0xdc,0xe8,0x6b66b900,0x6b66b910,0x6b66b91c | C:\Program Files\Opera\58.0.3135.65\installer.exe | installer.exe | ||||||||||||
User: admin Company: Opera Software Integrity Level: HIGH Description: Opera Installer Exit code: 0 Version: 58.0.3135.65 Modules
| |||||||||||||||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2808) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2708-13194786713435375 |
Value: 259 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 3516-13180984670829101 |
Value: 0 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 2708-13194786713435375 |
Value: 259 | |||
| (PID) Process: | (2708) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1f26b8eb-87d5-4a32-b245-296b04b7c2a1.tmp | — | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\f3fcdd3c-291a-47bb-ab51-eac67863f63f.tmp | — | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\f151354e-5409-48f0-8194-d10884c9ddb9.tmp | — | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version | text | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2708 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\in_progress_download_metadata_store~RF199531.TMP | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3276 | microsoft_word_setup7277_3893486326.exe | HEAD | 200 | 185.132.177.115:80 | http://fs7.softfamous.com/downloads/tname-281015ada8226/software/WordRetail2013.img | AE | — | — | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | HEAD | 200 | 185.26.182.112:80 | http://net.geo.opera.com/opera/stable?utm_medium=pbc&utm_source=ais&utm_campaign=_TXT_nc&utm_id=MmyPZXI33mx3Nd8ZdzGqHnQz329hdo8sejfbaX412WlxNNtrdTTZbn41zTchY44qekqbPTVkqSoocpg9NSOIKiQ22WV0MN5vcjHbaXI0%2Fk4AAABHBetY | unknown | — | — | whitelisted |
3276 | microsoft_word_setup7277_3893486326.exe | HEAD | 200 | 146.185.27.45:80 | http://bbs.telertut.com/ofr/Tavasat/Tavasat_18Jan19_m.cis | GB | — | — | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | GET | — | 185.132.177.115:80 | http://fs7.softfamous.com/downloads/tname-281015ada8226/software/WordRetail2013.img | AE | — | — | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | GET | — | 185.132.177.115:80 | http://fs7.softfamous.com/downloads/tname-281015ada8226/software/WordRetail2013.img | AE | — | — | malicious |
2708 | chrome.exe | GET | 200 | 52.222.146.167:80 | http://d1y4n9nucfv665.cloudfront.net/nr4hq&iaa9r83/microsoft_word_setup7277.exe | US | executable | 2.32 Mb | whitelisted |
3276 | microsoft_word_setup7277_3893486326.exe | POST | 200 | 54.194.149.175:80 | http://api.telertut.com/ | IE | — | — | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | GET | 200 | 146.185.27.45:80 | http://img.telertut.com/img/Rowabobeso/bg_custom_TB.png | GB | image | 11.7 Kb | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | POST | 200 | 54.194.149.175:80 | http://api.telertut.com/ | IE | — | — | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | POST | 200 | 18.203.190.76:80 | http://cloud.telertut.com/?shefoco=0 | US | text | 1.21 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2708 | chrome.exe | 172.217.21.195:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
2708 | chrome.exe | 172.217.18.3:443 | www.gstatic.com | Google Inc. | US | whitelisted |
2708 | chrome.exe | 172.217.18.14:443 | sb-ssl.google.com | Google Inc. | US | whitelisted |
2708 | chrome.exe | 52.222.146.167:80 | d1y4n9nucfv665.cloudfront.net | Amazon.com, Inc. | US | whitelisted |
2708 | chrome.exe | 172.217.18.99:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
3276 | microsoft_word_setup7277_3893486326.exe | 54.194.149.175:80 | api.telertut.com | Amazon.com, Inc. | IE | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | 18.203.190.76:80 | cloud.telertut.com | — | US | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | 104.27.205.88:443 | softfamous.com | Cloudflare Inc | US | shared |
3276 | microsoft_word_setup7277_3893486326.exe | 52.212.98.136:80 | server.telertut.com | Amazon.com, Inc. | IE | malicious |
3276 | microsoft_word_setup7277_3893486326.exe | 146.185.27.45:80 | img.telertut.com | UK-2 Limited | GB | malicious |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
d1y4n9nucfv665.cloudfront.net |
| whitelisted |
accounts.google.com |
| shared |
sb-ssl.google.com |
| whitelisted |
ssl.gstatic.com |
| whitelisted |
api.telertut.com |
| malicious |
cloud.telertut.com |
| malicious |
softfamous.com |
| whitelisted |
server.telertut.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2708 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2708 | chrome.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3276 | microsoft_word_setup7277_3893486326.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2 |
3276 | microsoft_word_setup7277_3893486326.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1 |
3276 | microsoft_word_setup7277_3893486326.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4 |
3276 | microsoft_word_setup7277_3893486326.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3 |
3276 | microsoft_word_setup7277_3893486326.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3276 | microsoft_word_setup7277_3893486326.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2348 | avastfreeantivirussetuponline.m.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2352 | AvEmUpdate.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
AvastSvc.exe | [2019-02-16 10:35:10.019] [error ] [ffl2 ] [ 3148: 768] failed to load key 0 (error 2)
|
AvastSvc.exe | [2019-02-16 10:35:11.191] [error ] [av_pp_prov ] [ 3148: 3092] Exception: Request 'app.pam.GetBrowserLeakedPassword' was not processed. Routing parameters:
|
AvastSvc.exe | [2019-02-16 10:35:11.284] [error ] [aavm ] [ 3148: 768] OnPushNotification failed. Native Messaging host process ID is 0.
Exception: Native Messaging host process ID is 0.
|
AvastSvc.exe | [2019-02-16 10:35:11.378] [error ] [aavm ] [ 3148: 768] OnPushNotification failed. Native Messaging host process ID is 0.
Exception: Native Messaging host process ID is 0.
|
AvastSvc.exe | [2019-02-16 10:35:11.409] [error ] [aavm ] [ 3148: 1840] OnPushNotification failed. Native Messaging host process ID is 0.
Exception: Native Messaging host process ID is 0.
|
AvastSvc.exe | [2019-02-16 10:35:11.409] [error ] [aavm ] [ 3148: 768] OnPushNotification failed. Native Messaging host process ID is 0.
Exception: Native Messaging host process ID is 0.
|
AvastSvc.exe | [2019-02-16 10:35:12.738] [error ] [av_pp_prov ] [ 3148: 2832] Exception: Request 'app.pam.GetBrowserLeakedPassword' was not processed. Routing parameters:
|
AvastSvc.exe | [2019-02-16 10:35:13.735] [error ] [av_pp_prov ] [ 3148: 3976] Exception: Request 'app.pam.GetBrowserLeakedPassword' was not processed. Routing parameters:
|
AvastSvc.exe | [2019-02-16 10:35:16.805] [info ] [nsf_urlinfo] [ 3148: 2180] Init UrlInfo
|
AvastSvc.exe | [2019-02-16 10:35:17.571] [error ] [av_pp_prov ] [ 3148: 2832] Exception: Request 'app.pam.GetBrowserLeakedPassword' was not processed. Routing parameters:
|