URL:

http://173.82.129.204/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin

Full analysis: https://app.any.run/tasks/51b84e8f-35ac-4e46-90b6-a800ee714630
Verdict: Malicious activity
Analysis date: November 27, 2020, 02:19:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
Indicators:
MD5:

514B8A43F42FFECA51E8E31DB037A484

SHA1:

7ACB7B4B91E8E854A5D1B849B069C94FAC8C0005

SHA256:

943DD557857365BEAFC2873CFD3BE661F01EEF0B2BA81314F41D2F69F1B5BD1F

SSDEEP:

12:ZW4nt3Oc8Q2LKS4HsQupmokihAtUs3QxysQupmokihAtUVdsQupmokihoOW6n:o4tr8Q5SU6oilsP6oilD6oiqUn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops a file with a compile date too recent

      • firefox.exe (PID: 3320)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3604)
      • firefox.exe (PID: 3320)
    • Reads the computer name

      • firefox.exe (PID: 3320)
      • firefox.exe (PID: 2540)
      • firefox.exe (PID: 3248)
      • firefox.exe (PID: 3996)
      • firefox.exe (PID: 2960)
    • Reads CPU info

      • firefox.exe (PID: 3320)
    • Reads the date of Windows installation

      • firefox.exe (PID: 3320)
    • Checks supported languages

      • firefox.exe (PID: 3320)
      • firefox.exe (PID: 3248)
      • firefox.exe (PID: 3996)
      • firefox.exe (PID: 2960)
    • Creates files in the user directory

      • firefox.exe (PID: 3320)
    • Creates files in the program directory

      • firefox.exe (PID: 3320)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2540"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3320.0.226564742\1661217146" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3320 "\\.\pipe\gecko-crash-server-pipe.3320" 1152 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\msctf.dll
c:\windows\system32\imm32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
2960"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3320.20.1442094340\1786965704" -childID 3 -isForBrowser -prefsHandle 3648 -prefMapHandle 3660 -prefsLen 6718 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3320 "\\.\pipe\gecko-crash-server-pipe.3320" 3672 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\program files\mozilla firefox\firefox.exe
c:\program files\mozilla firefox\api-ms-win-crt-string-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-core-synch-l1-2-0.dll
3248"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3320.3.1558401152\785905379" -childID 1 -isForBrowser -prefsHandle 1716 -prefMapHandle 1712 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3320 "\\.\pipe\gecko-crash-server-pipe.3320" 1736 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\windows\system32\dbghelp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\program files\mozilla firefox\firefox.exe
3320"C:\Program Files\Mozilla Firefox\firefox.exe" http://173.82.129.204/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signinC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\program files\mozilla firefox\api-ms-win-crt-multibyte-l1-1-0.dll
c:\windows\system32\msctf.dll
c:\windows\system32\imm32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\program files\mozilla firefox\api-ms-win-crt-utility-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-environment-l1-1-0.dll
3604"C:\Program Files\Mozilla Firefox\firefox.exe" "http://173.82.129.204/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin"C:\Program Files\Mozilla Firefox\firefox.exeExplorer.EXE
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\msvcp140.dll
c:\windows\system32\version.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
3996"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3320.13.872561746\2046136149" -childID 2 -isForBrowser -prefsHandle 2780 -prefMapHandle 2864 -prefsLen 5996 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3320 "\\.\pipe\gecko-crash-server-pipe.3320" 2920 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\api-ms-win-crt-environment-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-filesystem-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-math-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-time-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-locale-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-convert-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-stdio-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-heap-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-core-timezone-l1-1-0.dll
c:\program files\mozilla firefox\api-ms-win-crt-string-l1-1-0.dll
Total events
6 135
Read events
6 130
Write events
5
Delete events
0

Modification events

(PID) Process:(3604) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
E7E6A30300000000
(PID) Process:(3320) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
EDE6A30300000000
(PID) Process:(3320) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(3320) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3320) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
0
Suspicious files
178
Text files
41
Unknown types
58

Dropped files

PID
Process
Filename
Type
3320firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache.bin
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache.binbinary
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child.binbinary
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmpjsonlz4
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3320firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3320firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\5EAB7360F6E662B871F8238FB97975A1F6A5E273compressed
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\29169603C7FE35DCC7C2ED49AA013283F3DD9161compressed
MD5:
SHA256:
3320firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-walsqlite-wal
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
72
TCP/UDP connections
36
DNS requests
87
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3320
firefox.exe
GET
200
173.82.129.204:80
http://173.82.129.204/ap/uedata?ld&v=0.207204.0&id=8HSX8GW2CMQHB2HJV2G6&sw=1280&sh=720&vw=1280&vh=587&m=1&sc=8HSX8GW2CMQHB2HJV2G6&ue=0&bb=436&cf=436&be=436&pc=796&tc=-507&na_=-507&ul_=-1606443578990&_ul=-1606443578990&rd_=-1606443578990&_rd=-1606443578990&fe_=-507&lk_=-413&_lk=-413&co_=-413&_co=-398&sc_=-1606443578990&rq_=-398&rs_=-101&_rs=-101&dl_=-38&di_=462&de_=587&_de=587&_dc=774&ld_=774&_ld=-1606443578990&ntd=10&ty=0&rc=0&hob=0&hoe=0&ld=796&t=1606443579786&ctb=1&rt=cf:3-0-3-0-1-0-0__ld:8-5-3-0-1-0-0&csmtags=aui|aui:aui_build_date:3.19.8-2020-01-19|www-amazon-co-jp-2sc54kya23e65bcefd2kynmpjecdb2b5-com&viz=visible:0&pty=AuthenticationPortal&spty=SignInClaimCollect&pti=undefined&tid=8HSX8GW2CMQHB2HJV2G6&aftb=1
US
compressed
2.42 Kb
suspicious
3320
firefox.exe
GET
200
173.82.129.204:80
http://173.82.129.204/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
US
html
35.1 Kb
suspicious
3320
firefox.exe
GET
200
173.82.129.204:80
http://173.82.129.204/ap/uedata?at&v=0.207204.0&id=8HSX8GW2CMQHB2HJV2G6&ctb=1&m=1&sc=8HSX8GW2CMQHB2HJV2G6&pc=1271&at=1271&t=1606443580261&csmtags=csm-feature-touch-enabled:false&pty=AuthenticationPortal&spty=SignInClaimCollect&pti=undefined&tid=8HSX8GW2CMQHB2HJV2G6&aftb=1
US
compressed
2.42 Kb
suspicious
3320
firefox.exe
GET
200
173.82.129.204:80
http://173.82.129.204/ap/uedata?at&v=0.207204.0&id=8HSX8GW2CMQHB2HJV2G6&m=1&sc=adblk_no&pc=1320&at=1320&t=1606443580310&csmtags=adblk_no&pty=AuthenticationPortal&spty=SignInClaimCollect&pti=undefined&tid=8HSX8GW2CMQHB2HJV2G6&aftb=1
US
compressed
2.42 Kb
suspicious
3320
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3320
firefox.exe
GET
200
173.82.129.204:80
http://173.82.129.204/ap/uedata?at&v=0.207204.0&id=8HSX8GW2CMQHB2HJV2G6&ctb=1&m=1&sc=8HSX8GW2CMQHB2HJV2G6&pc=1368&at=1368&t=1606443580358&pty=AuthenticationPortal&spty=SignInClaimCollect&pti=undefined&tid=8HSX8GW2CMQHB2HJV2G6&aftb=1&ui=2
US
compressed
35.1 Kb
suspicious
3320
firefox.exe
POST
200
172.217.23.99:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
3320
firefox.exe
POST
302
173.82.129.204:80
http://173.82.129.204/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
US
html
267 b
suspicious
3320
firefox.exe
GET
200
173.82.129.204:80
http://173.82.129.204/ap/signin/135-7905436-2439587
US
html
26.2 Kb
suspicious
3320
firefox.exe
POST
302
173.82.129.204:80
http://173.82.129.204/ap/signin/135-7905436-2439587
US
html
223 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3320
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
3320
firefox.exe
34.218.9.172:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3320
firefox.exe
99.86.5.42:443
images-na.ssl-images-amazon.com
AT&T Services, Inc.
US
unknown
99.86.5.42:443
images-na.ssl-images-amazon.com
AT&T Services, Inc.
US
unknown
3320
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3320
firefox.exe
100.20.6.188:443
push.services.mozilla.com
US
unknown
3320
firefox.exe
143.204.215.74:443
snippets.cdn.mozilla.net
US
malicious
3320
firefox.exe
151.101.1.16:443
images-fe.ssl-images-amazon.com
Fastly
US
suspicious
3320
firefox.exe
143.204.209.99:443
images-cn.ssl-images-amazon.com
US
unknown
3320
firefox.exe
143.204.215.75:443
firefox.settings.services.mozilla.com
US
suspicious

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
whitelisted
search.services.mozilla.com
  • 34.218.9.172
  • 44.238.74.153
  • 52.41.230.109
whitelisted
search.r53-2.services.mozilla.com
  • 52.41.230.109
  • 44.238.74.153
  • 34.218.9.172
whitelisted
images-na.ssl-images-amazon.com
  • 99.86.5.42
shared
c.media-amazon.com
  • 99.86.5.42
whitelisted
push.services.mozilla.com
  • 100.20.6.188
whitelisted
autopush.prod.mozaws.net
  • 100.20.6.188
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cs9.wac.phicdn.net
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
3 ETPRO signatures available at the full report
No debug info