analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://ya.ru

Full analysis: https://app.any.run/tasks/096c849f-104d-464c-bb22-6b47e638dc38
Verdict: Malicious activity
Analysis date: September 30, 2020, 14:02:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E98192E19505472476A49F10388428AB

SHA1:

74704CB525C8F310FDC5C822782D20D60EAADADE

SHA256:

7E90A4F9C30B4E7E98C42791942D4B45E9656D5C6B20198A0E913BF3AFBE59CE

SSDEEP:

3:N8zQ:28

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • gamejoltclientsetup.exe (PID: 2444)
      • ink - fixed - again - andagain.exe (PID: 560)
      • ink - fixed - again - andagain.exe (PID: 2320)
      • ink - fixed - again - andagain.exe (PID: 1328)
      • ink - fixed - again - andagain.exe (PID: 1900)
    • Loads dropped or rewritten executable

      • ink - fixed - again - andagain.exe (PID: 560)
      • ink - fixed - again - andagain.exe (PID: 2320)
      • ink - fixed - again - andagain.exe (PID: 1328)
      • ink - fixed - again - andagain.exe (PID: 1900)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2536)
      • gamejoltclientsetup.exe (PID: 2444)
      • WinRAR.exe (PID: 3644)
      • ink - fixed - again - andagain.exe (PID: 560)
      • ink - fixed - again - andagain.exe (PID: 2320)
      • ink - fixed - again - andagain.exe (PID: 1900)
      • ink - fixed - again - andagain.exe (PID: 1328)
    • Reads Windows owner or organization settings

      • gamejoltclientsetup.tmp (PID: 692)
    • Reads the Windows organization settings

      • gamejoltclientsetup.tmp (PID: 692)
    • Reads Internet Cache Settings

      • ink - fixed - again - andagain.exe (PID: 560)
      • ink - fixed - again - andagain.exe (PID: 2320)
      • ink - fixed - again - andagain.exe (PID: 1900)
      • ink - fixed - again - andagain.exe (PID: 1328)
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 2332)
    • Manual execution by user

      • wmplayer.exe (PID: 3848)
      • ink - fixed - again - andagain.exe (PID: 560)
      • NOTEPAD.EXE (PID: 3476)
      • ink - fixed - again - andagain.exe (PID: 2320)
      • ink - fixed - again - andagain.exe (PID: 1900)
      • mmc.exe (PID: 2204)
      • mmc.exe (PID: 1524)
      • ink - fixed - again - andagain.exe (PID: 1328)
    • Reads the hosts file

      • chrome.exe (PID: 2332)
      • chrome.exe (PID: 2536)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2536)
    • Dropped object may contain Bitcoin addresses

      • chrome.exe (PID: 2536)
      • chrome.exe (PID: 2332)
    • Application launched itself

      • chrome.exe (PID: 2536)
    • Application was dropped or rewritten from another process

      • gamejoltclientsetup.tmp (PID: 692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
101
Monitored processes
59
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmplayer.exe no specs setup_wm.exe no specs winrar.exe chrome.exe no specs chrome.exe no specs gamejoltclientsetup.exe gamejoltclientsetup.tmp no specs ink - fixed - again - andagain.exe notepad.exe no specs ink - fixed - again - andagain.exe ink - fixed - again - andagain.exe ink - fixed - again - andagain.exe mmc.exe no specs mmc.exe

Process information

PID
CMD
Path
Indicators
Parent process
2536"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ya.ru"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2876"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6edca9d0,0x6edca9e0,0x6edca9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2524"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2516 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1712"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6124113258503265034 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2332"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=1767776592562140029 --mojo-platform-channel-handle=1556 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
964"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16842054562849567794 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6037151757525163646 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3252"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=651389916166424721 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2508 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2824"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=16139096916383707462 --mojo-platform-channel-handle=3344 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1264"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,8861616644576428224,685759571768710156,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=4393892412586993202 --mojo-platform-channel-handle=3420 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
2 032
Read events
1 793
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
1 010
Text files
219
Unknown types
62

Dropped files

PID
Process
Filename
Type
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F74900C-9E8.pma
MD5:
SHA256:
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
MD5:
SHA256:
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\252c57f8-9f49-448a-8e64-e71406362d8a.tmp
MD5:
SHA256:
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000046.dbtmp
MD5:
SHA256:
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF19b0b8.TMPtext
MD5:D55489ED6031D8B188E37B0B59F5CED3
SHA256:365B01D1B3333E366EEA50106551AAC8721156CB2572C173E2F501D8255093F4
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF19b0e7.TMPtext
MD5:699EFDF0430A67FAE57BBFDBE2B6F608
SHA256:BDE6A80A3099628E8D86CBB4EFF94A8A0A1070C14C191C5935FFC4406BBF7F1B
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:D55489ED6031D8B188E37B0B59F5CED3
SHA256:365B01D1B3333E366EEA50106551AAC8721156CB2572C173E2F501D8255093F4
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:D33038DC70A58F2AC0EA1823980691AE
SHA256:6EE5DB5588EB879D13CE5A0DB3CA1744079C1BE3F73959A3B900684C56061D97
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG.oldtext
MD5:3401B14F6B2624E5E44EB20FB8735443
SHA256:E32F20AE6528B8952EE2FF112DACEE4E9005868B7DAF85D3533B6F0135403875
2536chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:4AFC066387D33D5264F8E796393B223B
SHA256:BB3E0F925E883318FB09FC498CACEA57F0F71548C9D42FF07634DC30D87F2D86
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
129
DNS requests
157
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2332
chrome.exe
77.88.55.70:443
yandex.ru
YANDEX LLC
RU
whitelisted
2332
chrome.exe
87.250.250.242:443
ya.ru
YANDEX LLC
RU
whitelisted
2332
chrome.exe
172.217.16.142:443
clients2.google.com
Google Inc.
US
whitelisted
2332
chrome.exe
172.217.23.173:443
accounts.google.com
Google Inc.
US
whitelisted
2332
chrome.exe
172.217.23.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2332
chrome.exe
172.217.22.67:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2332
chrome.exe
87.250.250.36:443
favicon.yandex.net
YANDEX LLC
RU
whitelisted
2332
chrome.exe
87.250.250.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted
2332
chrome.exe
178.154.131.216:443
yastatic.net
YANDEX LLC
RU
whitelisted
2332
chrome.exe
213.180.193.60:443
im0-tub-ru.yandex.net
YANDEX LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
ya.ru
  • 87.250.250.242
whitelisted
clientservices.googleapis.com
  • 172.217.23.99
whitelisted
accounts.google.com
  • 172.217.23.173
shared
yastatic.net
  • 178.154.131.216
  • 178.154.131.215
  • 178.154.131.217
whitelisted
yandex.ru
  • 77.88.55.70
  • 5.255.255.70
  • 5.255.255.77
  • 77.88.55.77
whitelisted
mc.yandex.ru
  • 87.250.250.119
  • 87.250.251.119
  • 93.158.134.119
  • 77.88.21.119
whitelisted
clients2.google.com
  • 172.217.16.142
whitelisted
ssl.gstatic.com
  • 172.217.22.67
whitelisted
favicon.yandex.net
  • 87.250.250.36
  • 213.180.204.36
  • 77.88.21.36
  • 93.158.134.36
whitelisted
avatars.mds.yandex.net
  • 87.250.247.184
  • 87.250.247.181
  • 87.250.247.182
  • 87.250.247.183
whitelisted

Threats

No threats detected
No debug info