URL:

https://github.com/x8BitRain/BonziRogue/releases/download/1/BonziKill.exe

Full analysis: https://app.any.run/tasks/36cf006e-88f1-4f4a-ba11-67122e185cb5
Verdict: Malicious activity
Analysis date: March 08, 2021, 13:06:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E60DBA73E9D0F50C90BC8B4DAEB98DA6

SHA1:

04661DEAD2D96C8D1E771F1C3C23FB440CBD1028

SHA256:

796F3E6602F62ECCCE12EF671A5C512D1150B4501048DF2FF8011EEA6783ED86

SSDEEP:

3:N8tEdtdnMR0RK2KCgtkCUHv0J:2ujZgt6HcJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • BonziKill.exe (PID: 1768)
      • BonziKill.exe (PID: 3092)
      • BonziKill.exe (PID: 3604)
      • BonziBuddy_original.exe (PID: 3668)
      • BonziBuddy_original.exe (PID: 2400)
      • BonziKill.exe (PID: 2436)
      • BonziKill.exe (PID: 2192)
      • BonziKill.exe (PID: 3944)
      • BonziBuddy_original.exe (PID: 1460)
    • Drops executable file immediately after starts

      • BonziKill.exe (PID: 3092)
      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 2192)
    • Loads the Task Scheduler COM API

      • CCleaner.exe (PID: 3488)
    • Steals credentials from Web Browsers

      • CCleaner.exe (PID: 1488)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 1488)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • chrome.exe (PID: 2720)
      • BonziKill.exe (PID: 3092)
      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 2192)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2720)
      • BonziKill.exe (PID: 3092)
      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 2192)
    • Creates files in the Windows directory

      • BonziKill.exe (PID: 3092)
      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 2192)
    • Drops a file with too old compile date

      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 3092)
      • BonziKill.exe (PID: 2192)
    • Removes files from Windows directory

      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 2192)
    • Creates files in the user directory

      • filezilla.exe (PID: 4072)
      • CCleaner.exe (PID: 1488)
    • Executed via Task Scheduler

      • CCleaner.exe (PID: 1488)
    • Reads internet explorer settings

      • CCleaner.exe (PID: 1488)
    • Low-level read access rights to disk partition

      • CCleaner.exe (PID: 1488)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2720)
    • Reads the hosts file

      • chrome.exe (PID: 2720)
      • chrome.exe (PID: 992)
    • Reads settings of System Certificates

      • chrome.exe (PID: 992)
      • CCleaner.exe (PID: 1488)
    • Manual execution by user

      • BonziKill.exe (PID: 3944)
      • BonziKill.exe (PID: 3604)
      • BonziKill.exe (PID: 2436)
      • BonziKill.exe (PID: 2192)
      • CCleaner.exe (PID: 3488)
      • filezilla.exe (PID: 4072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
75
Monitored processes
24
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs bonzikill.exe no specs bonzikill.exe bonzibuddy_original.exe no specs bonzikill.exe no specs bonzikill.exe bonzibuddy_original.exe no specs bonzikill.exe no specs bonzikill.exe bonzibuddy_original.exe no specs filezilla.exe no specs ccleaner.exe no specs ccleaner.exe

Process information

PID
CMD
Path
Indicators
Parent process
896"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,15106852856973557697,10830305289614288988,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=15041611347185805946 --mojo-platform-channel-handle=1068 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
992"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,15106852856973557697,10830305289614288988,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=14281860970927284615 --mojo-platform-channel-handle=1536 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1460"C:\bonzi\BonziBuddy_original.exe" C:\bonzi\BonziBuddy_original.exeBonziKill.exe
User:
admin
Company:
BellCraft Technologies
Integrity Level:
HIGH
Exit code:
3221225547
Version:
7.05
Modules
Images
c:\bonzi\bonzibuddy_original.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
1488"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
taskeng.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5, 35, 0, 6210
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1768"C:\Users\admin\Downloads\BonziKill.exe" C:\Users\admin\Downloads\BonziKill.exechrome.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\bonzikill.exe
c:\systemroot\system32\ntdll.dll
2180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,15106852856973557697,10830305289614288988,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=9086468322943507671 --mojo-platform-channel-handle=1052 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2192"C:\Users\admin\Downloads\BonziKill.exe" C:\Users\admin\Downloads\BonziKill.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1000
Modules
Images
c:\users\admin\downloads\bonzikill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\sfc_os.dll
2400"C:\bonzi\BonziBuddy_original.exe" C:\bonzi\BonziBuddy_original.exeBonziKill.exe
User:
admin
Company:
BellCraft Technologies
Integrity Level:
HIGH
Exit code:
3221225547
Version:
7.05
Modules
Images
c:\bonzi\bonzibuddy_original.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2436"C:\Users\admin\Downloads\BonziKill.exe" C:\Users\admin\Downloads\BonziKill.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\bonzikill.exe
c:\systemroot\system32\ntdll.dll
2704"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,15106852856973557697,10830305289614288988,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5527894116507598712 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
2 215
Read events
1 937
Write events
275
Delete events
3

Modification events

(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3068) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2720-13259682429077750
Value:
259
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(2720) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
188
Suspicious files
67
Text files
568
Unknown types
34

Dropped files

PID
Process
Filename
Type
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6046217D-AA0.pma
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\e2e61903-8e3b-495a-8bf2-5ccab3710160.tmp
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF1d4fd8.TMPtext
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF1d4f7a.TMPtext
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF1d519d.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
17
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1488
CCleaner.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCCwQAAAAAAURO8EJH
US
der
1.48 Kb
whitelisted
1488
CCleaner.exe
GET
200
151.101.2.109:80
http://license.piriform.com/verify/?p=ccpro&c=cc&cv=5.35.6210&l=1033&lk=CJ9T-J7CU-SPNV-GWMB-WBEC&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VAKU&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=00000000-0000-4000-8000-d6f7f2be5127
US
text
14 b
whitelisted
1488
CCleaner.exe
GET
301
151.101.0.64:80
http://www.piriform.com/auto?a=0&p=cc&v=5.35.6210&l=1033&lk=&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VAKU&o=6.1W3&au=1&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gu=00000000-0000-4000-8000-d6f7f2be5127
US
whitelisted
1488
CCleaner.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDkbwjNvPLFRm7zMB3V80
US
der
1.49 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
992
chrome.exe
172.217.18.109:443
accounts.google.com
Google Inc.
US
suspicious
992
chrome.exe
140.82.121.4:443
github.com
US
malicious
992
chrome.exe
185.199.108.154:443
github-releases.githubusercontent.com
GitHub, Inc.
NL
suspicious
992
chrome.exe
142.250.185.99:443
ssl.gstatic.com
Google Inc.
US
whitelisted
992
chrome.exe
172.217.16.142:443
sb-ssl.google.com
Google Inc.
US
whitelisted
992
chrome.exe
172.217.18.110:443
clients4.google.com
Google Inc.
US
whitelisted
1488
CCleaner.exe
151.101.0.64:443
www.piriform.com
Fastly
US
whitelisted
1488
CCleaner.exe
151.101.0.64:80
www.piriform.com
Fastly
US
whitelisted
1488
CCleaner.exe
151.101.2.202:443
www.ccleaner.com
Fastly
US
suspicious
1488
CCleaner.exe
104.18.21.226:80
ocsp.globalsign.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.121.4
malicious
accounts.google.com
  • 172.217.18.109
shared
github-releases.githubusercontent.com
  • 185.199.108.154
  • 185.199.109.154
  • 185.199.110.154
  • 185.199.111.154
whitelisted
ssl.gstatic.com
  • 142.250.185.99
whitelisted
sb-ssl.google.com
  • 172.217.16.142
whitelisted
clients4.google.com
  • 172.217.18.110
whitelisted
clients1.google.com
  • 172.217.18.110
whitelisted
www.piriform.com
  • 151.101.0.64
  • 151.101.64.64
  • 151.101.128.64
  • 151.101.192.64
whitelisted
www.ccleaner.com
  • 151.101.2.202
  • 151.101.66.202
  • 151.101.130.202
  • 151.101.194.202
whitelisted
ocsp.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted

Threats

No threats detected
No debug info