analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.kakaocorp.com/service/KakaoTalk

Full analysis: https://app.any.run/tasks/82204c2e-2ded-4d73-ae4d-f467f342dea0
Verdict: Malicious activity
Analysis date: May 11, 2021, 05:44:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

33F95C04A5A98C60F6A73EB9EC912EA9

SHA1:

2A140010D2DB479654328CBB3F13B40E880FE81F

SHA256:

7FC2B93EC4448D0B0383AAB96870C26C5CDF4FEA730F7E5297E863DCE30970E9

SSDEEP:

3:N8DSLVMgSXAGXqgO:2OLSvAG6gO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • KakaoTalk_Setup.exe (PID: 2896)
      • KakaoTalk_Setup.exe (PID: 1032)
      • KakaoTalk.exe (PID: 3936)
      • KakaoTalk.exe (PID: 1704)
    • Loads dropped or rewritten executable

      • KakaoTalk_Setup.exe (PID: 1032)
      • KakaoTalk.exe (PID: 3936)
    • Changes the autorun value in the registry

      • KakaoTalk_Setup.exe (PID: 1032)
      • KakaoTalk.exe (PID: 1704)
  • SUSPICIOUS

    • Drops a file with too old compile date

      • KakaoTalk_Setup.exe (PID: 1032)
    • Creates a software uninstall entry

      • KakaoTalk_Setup.exe (PID: 1032)
    • Drops a file with a compile date too recent

      • KakaoTalk_Setup.exe (PID: 1032)
    • Changes default file association

      • KakaoTalk_Setup.exe (PID: 1032)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 1720)
      • KakaoTalk_Setup.exe (PID: 1032)
    • Drops a file that was compiled in debug mode

      • KakaoTalk_Setup.exe (PID: 1032)
    • Creates a directory in Program Files

      • KakaoTalk_Setup.exe (PID: 1032)
    • Application launched itself

      • KakaoTalk.exe (PID: 3936)
    • Creates files in the user directory

      • KakaoTalk_Setup.exe (PID: 1032)
    • Changes the started page of IE

      • KakaoTalk_Setup.exe (PID: 1032)
    • Creates files in the program directory

      • KakaoTalk_Setup.exe (PID: 1032)
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 1720)
    • Reads the hosts file

      • chrome.exe (PID: 1720)
      • chrome.exe (PID: 3136)
    • Dropped object may contain Bitcoin addresses

      • KakaoTalk_Setup.exe (PID: 1032)
    • Application launched itself

      • chrome.exe (PID: 1720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
15
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs kakaotalk_setup.exe no specs kakaotalk_setup.exe kakaotalk.exe no specs kakaotalk.exe

Process information

PID
CMD
Path
Indicators
Parent process
1720"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://www.kakaocorp.com/service/KakaoTalk"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2372"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6eb8a9d0,0x6eb8a9e0,0x6eb8a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
4020"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1488 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2632"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=731419326454321619 --mojo-platform-channel-handle=968 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3136"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=1858615551119766045 --mojo-platform-channel-handle=1564 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1228"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17850760862379752608 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3932"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6422396318838774119 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2516"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12125114694710454792 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2424 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
4084"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7166646960335620659 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3440"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1044,15920962969759892034,12650038701552680529,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5425264278300079868 --mojo-platform-channel-handle=2992 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
1 346
Read events
1 241
Write events
102
Delete events
3

Modification events

(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:Key:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:1720-13265185489656000
Value:
259
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(1720) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:1720-13265185489656000
Value:
259
Executable files
13
Suspicious files
695
Text files
6 160
Unknown types
51

Dropped files

PID
Process
Filename
Type
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-609A19D2-6B8.pma
MD5:
SHA256:
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\2a52e3a4-2864-474c-83ec-e2d19db3a3f6.tmp
MD5:
SHA256:
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabsbinary
MD5:E815400F953EA8DB8A98D52737C9A50D
SHA256:E9F064927A191500B7365F51C9CD0763A6A8E68A8B866ACED39AA0E72C3EAD85
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF1dea24.TMPtext
MD5:67F45CAA18C889645F50CD6216C81E65
SHA256:33ED82CDDDFFD55A5059C147C6CD20F66C6712314F890A39576D3C10914D0029
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF1de9d6.TMPtext
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE
SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF1dea05.TMPtext
MD5:FB5B20517A0D1F7DAD485989565BEE5E
SHA256:99405F66EDBEB2306F4D0B4469DCADFF5293B5E1549C588CCFACEA439BB3B101
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE
SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:67F45CAA18C889645F50CD6216C81E65
SHA256:33ED82CDDDFFD55A5059C147C6CD20F66C6712314F890A39576D3C10914D0029
1720chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:D4322EEBAC92D1B8F7A6F5E39F6264B7
SHA256:A3EEDF21B850DCC7CE5AE04395ECDD2D29DA4EA549C8A185DD9E8B552A87B8C2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
21
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1704
KakaoTalk.exe
GET
200
203.238.180.28:80
http://app.pc.kakao.com/talk/win32/patch/patch.txt
KR
text
623 b
malicious
1032
KakaoTalk_Setup.exe
GET
200
211.231.108.75:80
http://start.www.daum.net/startpage/?hcode=D_KAKAOTALK
KR
html
32 b
whitelisted
1032
KakaoTalk_Setup.exe
GET
302
211.231.108.75:80
http://start.tiara.daum.net/startpage/index.html?hcode=D_KAKAOTALK
KR
image
35 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3136
chrome.exe
172.217.18.109:443
accounts.google.com
Google Inc.
US
suspicious
3136
chrome.exe
142.250.185.142:443
sb-ssl.google.com
Google Inc.
US
whitelisted
142.250.184.227:443
ssl.gstatic.com
Google Inc.
US
whitelisted
3136
chrome.exe
104.16.18.94:443
cdnjs.cloudflare.com
Cloudflare Inc
US
unknown
3136
chrome.exe
211.249.221.246:443
developers.kakao.com
DREAMLINE CO.
KR
suspicious
3136
chrome.exe
211.249.221.27:443
www.kakaocorp.com
DREAMLINE CO.
KR
unknown
3136
chrome.exe
121.53.104.76:443
webid.ad.daum.net
DREAMLINE CO.
KR
unknown
1032
KakaoTalk_Setup.exe
211.231.108.75:80
start.tiara.daum.net
Kakao Corp
KR
unknown
3136
chrome.exe
211.249.220.83:443
stat.tiara.kakaocorp.com
DREAMLINE CO.
KR
unknown
3136
chrome.exe
113.29.189.143:443
app-pc.kakaocdn.net
Kakao Corp
KR
suspicious

DNS requests

Domain
IP
Reputation
www.kakaocorp.com
  • 211.249.221.27
unknown
accounts.google.com
  • 172.217.18.109
shared
tv.kakao.com
  • 121.53.216.28
unknown
developers.kakao.com
  • 211.249.221.246
suspicious
t1.daumcdn.net
  • 2.17.121.88
  • 2.17.123.112
whitelisted
t1.kakaocdn.net
  • 2.17.120.104
  • 2.17.120.25
whitelisted
stat.tiara.kakaocorp.com
  • 211.249.220.83
unknown
cdnjs.cloudflare.com
  • 104.16.18.94
  • 104.16.19.94
whitelisted
webid.ad.daum.net
  • 121.53.104.76
whitelisted
ssl.gstatic.com
  • 142.250.184.227
whitelisted

Threats

No threats detected
No debug info