| URL: | http://demo.printsolv.com.au/FmaCentral/DownloadOnsite?AccountID=5481&auth=a9aac3d6ae854acba33918c81653173b |
| Full analysis: | https://app.any.run/tasks/d8b830da-e996-4fad-b91a-643fde65b275 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | March 03, 2020, 22:22:51 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 873850D6F548108332A9FF233185841D |
| SHA1: | 1582BA4FB60E9201B1E7906F6EAB4F9175A11FBE |
| SHA256: | 899A60A1BD7F08F24CDBCF04C09CF9A2B19856E78D9AB5572DB924927710060B |
| SSDEEP: | 3:N1KaAIKmGH5FGQCcvRsD9EtMEGEEAdE3bdNn:CatKmTesmuE4AwbdNn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 440 | C:\Windows\system32\cmd.exe /S /D /c" echo Microsoft Windows 7 Professional " | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 576 | "C:\Windows\system32\sc.exe" failure FMAuditOnSite actions= restart/900000/restart/900000/restart/900000 reset= 86400 | C:\Windows\system32\sc.exe | — | LaunchUI.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 608 | find "XP" | C:\Windows\system32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (grep) Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 856 | "C:\Users\admin\AppData\Local\Temp\FMAudit.Installer_85190777\FMAOnsiteSetup.exe" /is=OnsiteInitialSettings_85190777.xml | C:\Users\admin\AppData\Local\Temp\FMAudit.Installer_85190777\FMAOnsiteSetup.exe | — | cmd.exe | |||||||||||
User: admin Company: FMAudit (ECi) Integrity Level: MEDIUM Description: Onsite Setup Application Exit code: 3221226540 Version: 4.0.2.1170 Modules
| |||||||||||||||
| 1380 | "C:\Program Files\FMAuditOnsite\LaunchUI.exe" /fips | C:\Program Files\FMAuditOnsite\LaunchUI.exe | — | irsetup.exe | |||||||||||
User: admin Company: ECi FMAudit Integrity Level: HIGH Description: UI Launcher Exit code: 0 Version: 4.0.2.01170 Modules
| |||||||||||||||
| 1492 | "C:\Program Files\FMAuditOnsite\LaunchUI.exe" /is="C:\Users\admin\AppData\Local\Temp\FMAudit.Installer_85190777\OnsiteInitialSettings_85190777.xml" | C:\Program Files\FMAuditOnsite\LaunchUI.exe | irsetup.exe | ||||||||||||
User: admin Company: ECi FMAudit Integrity Level: HIGH Description: UI Launcher Exit code: 0 Version: 4.0.2.01170 Modules
| |||||||||||||||
| 1812 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6fa8a9d0,0x6fa8a9e0,0x6fa8a9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1900 | cmd /c ""C:\Users\admin\AppData\Local\Temp\FMAudit.Installer_85190777\install_85190777.cmd" " | C:\Windows\system32\cmd.exe | — | FMAudit.Installer_5481_85190777.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2072 | "C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" /is=OnsiteInitialSettings_85190777.xml __IRAOFF:1765890 "__IRAFN:C:\Users\admin\AppData\Local\Temp\FMAudit.Installer_85190777\FMAOnsiteSetup.exe" "__IRCT:3" "__IRTSS:10130228" "__IRSID:S-1-5-21-1302019708-1500728564-335382590-1000" | C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe | FMAOnsiteSetup.exe | ||||||||||||
User: admin Company: Indigo Rose Corporation Integrity Level: HIGH Description: Setup Application Exit code: 0 Version: 9.0.3.0 Modules
| |||||||||||||||
| 2128 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1048,8622454726989532119,1493498682214405385,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=18375416681476953874 --mojo-platform-channel-handle=4336 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (3232) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2804-13227747785477750 |
Value: 259 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 3120-13213713943555664 |
Value: 0 | |||
| (PID) Process: | (2804) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5E5ED8C9-AF4.pma | — | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\84c2bb88-b839-4f7f-b9a1-34376bbb0e80.tmp | — | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000028.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFa66c8d.TMP | text | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFa66cac.TMP | text | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2804 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RFa66ea0.TMP | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3056 | chrome.exe | GET | 302 | 223.27.16.156:80 | http://demo.printsolv.com.au/FmaCentral/DownloadOnsite?AccountID=5481&auth=a9aac3d6ae854acba33918c81653173b | AU | html | 297 b | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/FmaCentral/DownloadOnsite?AccountID=5481&auth=a9aac3d6ae854acba33918c81653173b | AU | html | 16.3 Kb | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/Content/centralui?v=0LXbwow2w_D1DSNqEgPVCU5XzxFh4qlBk-kShyVAv8Q1 | AU | text | 10.7 Kb | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/Content/central?v=IP-UvaDonL6Bv9cHNtHzqm8IqA9DeqD8KJ94BHVxAyI1 | AU | text | 42.5 Kb | suspicious |
3056 | chrome.exe | GET | 302 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/Login?ReturnUrl=%2fFmaCentral%2fDownloadOnsite%3fAccountID%3d5481%26auth%3da9aac3d6ae854acba33918c81653173b&AccountID=5481&auth=a9aac3d6ae854acba33918c81653173b | AU | html | 200 b | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/signalr/js | AU | text | 3.62 Kb | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/bundles/centralui?v=dLRD756fEuG-gprPKLoHD070h_QtB4WCSN0Ju2YS1vs1 | AU | text | 224 Kb | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/bundles/signalrLib?v=-nhJTO5XXHuy3UulvBip6628WomKdSxS6m3PeBkt24o1 | AU | text | 14.4 Kb | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/UploadedImages/header_390.jpg | AU | image | 12.3 Kb | suspicious |
3056 | chrome.exe | GET | 200 | 223.27.16.156:80 | http://demo.printsolv.com.au/fmacentral/Help/EN/Tutorial/01v4Tutorial.html?v=4.4.84.16264 | AU | xml | 1.70 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3056 | chrome.exe | 172.217.16.195:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 223.27.16.156:80 | demo.printsolv.com.au | Web24 Virtual & Dedicated hosting service provider, Melb, Australia | AU | suspicious |
3056 | chrome.exe | 172.217.21.205:443 | accounts.google.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 172.217.22.100:443 | www.google.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 216.58.207.78:443 | clients1.google.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 172.217.22.99:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 216.58.207.46:443 | clients2.google.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 172.217.22.110:80 | redirector.gvt1.com | Google Inc. | US | whitelisted |
3056 | chrome.exe | 173.194.182.232:80 | r3---sn-4g5e6nsz.gvt1.com | Google Inc. | US | whitelisted |
1492 | LaunchUI.exe | 223.27.16.156:80 | demo.printsolv.com.au | Web24 Virtual & Dedicated hosting service provider, Melb, Australia | AU | suspicious |
Domain | IP | Reputation |
|---|---|---|
demo.printsolv.com.au |
| suspicious |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
www.google.com |
| malicious |
www.fmaudit.com |
| unknown |
clients1.google.com |
| whitelisted |
fmaudit.ecisolutions.com |
| unknown |
ssl.gstatic.com |
| whitelisted |
clients2.google.com |
| whitelisted |
redirector.gvt1.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3056 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3056 | chrome.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3552 | fmaonsite.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
3552 | fmaonsite.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |