analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://www.walterbistro.com/

Full analysis: https://app.any.run/tasks/5a85072d-6608-46cd-ae34-6a76e687feb4
Verdict: Malicious activity
Analysis date: December 02, 2019, 16:41:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

871BCBEEACD8BF0CEAE1D8718325A720

SHA1:

518A0C9A9C7F0ADB49306E12F0C696AA6AEA0C7B

SHA256:

A5601408B6131CB7950781BF2DDC2894EB2D466FD496C9FC45A55AAF64B7E72A

SSDEEP:

3:N1KJS4aHcyTK:Cc4Mw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 3116)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 3116)
    • Application launched itself

      • firefox.exe (PID: 1940)
      • firefox.exe (PID: 3116)
    • Creates files in the user directory

      • firefox.exe (PID: 3116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
1940"C:\Program Files\Mozilla Firefox\firefox.exe" "http://www.walterbistro.com/"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
3116"C:\Program Files\Mozilla Firefox\firefox.exe" http://www.walterbistro.com/C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
2432"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3116.0.1412143891\2133892851" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3116 "\\.\pipe\gecko-crash-server-pipe.3116" 1128 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
284"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3116.3.359807676\427198039" -childID 1 -isForBrowser -prefsHandle 1300 -prefMapHandle 1628 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3116 "\\.\pipe\gecko-crash-server-pipe.3116" 1692 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
2752"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3116.13.1885360026\2107142397" -childID 2 -isForBrowser -prefsHandle 2832 -prefMapHandle 2836 -prefsLen 5997 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3116 "\\.\pipe\gecko-crash-server-pipe.3116" 2840 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
2148"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3116.20.528962691\2097408404" -childID 3 -isForBrowser -prefsHandle 3672 -prefMapHandle 3684 -prefsLen 7298 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3116 "\\.\pipe\gecko-crash-server-pipe.3116" 3708 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Total events
119
Read events
114
Write events
5
Delete events
0

Modification events

(PID) Process:(1940) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
064EEB1803000000
(PID) Process:(3116) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
9732FE1803000000
(PID) Process:(3116) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(3116) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3116) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
0
Suspicious files
121
Text files
41
Unknown types
75

Dropped files

PID
Process
Filename
Type
3116firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shm
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm
MD5:
SHA256:
3116firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:354459382F30B8994109C88659DFA1F3
SHA256:E3E8E2B7E7EECA231620D83C70FA5A926E8B9CE74C51F595F71191DC0B50527E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
50
DNS requests
120
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/
US
html
9.16 Kb
suspicious
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/wp-content/plugins/revslider/public/assets/js/jquery.themepunch.revolution.min.js?ver=5.4.8
US
text
17.6 Kb
suspicious
3116
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/wp-includes/css/dist/block-library/style.min.css?ver=5.3
US
text
6.02 Kb
suspicious
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/wp-content/themes/x/framework/dist/css/site/stacks/ethos.css?ver=6.1.6
US
text
26.3 Kb
suspicious
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/wp-content/themes/x/framework/legacy/cranium/dist/css/site/ethos.css?ver=6.1.6
US
text
2.36 Kb
suspicious
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/wp-content/plugins/revslider/public/assets/css/settings.css?ver=5.4.8
US
text
9.32 Kb
suspicious
3116
firefox.exe
GET
200
216.58.210.10:80
http://fonts.googleapis.com/css?family=Lato:700,700i|Pontano+Sans:400&subset=latin,latin-ext
US
text
488 b
whitelisted
3116
firefox.exe
GET
200
166.62.108.43:80
http://www.walterbistro.com/wp-content/themes/x/framework/dist/js/site/x.js?ver=6.1.6
US
text
16.5 Kb
suspicious
3116
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3116
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3116
firefox.exe
2.16.186.50:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
3116
firefox.exe
166.62.108.43:80
www.walterbistro.com
GoDaddy.com, LLC
US
malicious
3116
firefox.exe
52.89.51.22:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
3116
firefox.exe
35.164.109.147:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3116
firefox.exe
52.222.158.124:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
unknown
3116
firefox.exe
52.35.244.72:443
push.services.mozilla.com
Amazon.com, Inc.
US
malicious
3116
firefox.exe
216.58.210.10:80
fonts.googleapis.com
Google Inc.
US
whitelisted
3116
firefox.exe
143.204.214.68:443
firefox.settings.services.mozilla.com
US
unknown
3116
firefox.exe
35.167.176.126:443
shavar.services.mozilla.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
www.walterbistro.com
  • 166.62.108.43
suspicious
detectportal.firefox.com
  • 2.16.186.50
  • 2.16.186.112
whitelisted
walterbistro.com
  • 166.62.108.43
suspicious
a1089.dscd.akamai.net
  • 2.16.186.112
  • 2.16.186.50
whitelisted
search.services.mozilla.com
  • 35.164.109.147
  • 52.89.218.39
  • 52.35.182.58
whitelisted
search.r53-2.services.mozilla.com
  • 52.35.182.58
  • 52.89.218.39
  • 35.164.109.147
whitelisted
push.services.mozilla.com
  • 52.35.244.72
whitelisted
autopush.prod.mozaws.net
  • 52.35.244.72
whitelisted
tiles.services.mozilla.com
  • 52.89.51.22
  • 34.223.160.244
  • 52.39.224.180
  • 34.212.11.156
  • 54.149.128.76
  • 54.186.225.209
  • 54.68.132.173
  • 54.69.207.70
whitelisted
tiles.r53-2.services.mozilla.com
  • 54.69.207.70
  • 54.68.132.173
  • 54.186.225.209
  • 54.149.128.76
  • 34.212.11.156
  • 52.39.224.180
  • 34.223.160.244
  • 52.89.51.22
whitelisted

Threats

PID
Process
Class
Message
3116
firefox.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
No debug info