File name: | INVOICE NO MS02419-20_SHIPPING_DOCUMENTS_(PDF).html |
Full analysis: | https://app.any.run/tasks/43ac53ee-7920-4f6e-bbb9-2154d2b4ba64 |
Verdict: | Malicious activity |
Analysis date: | September 10, 2019, 21:24:05 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/html |
File info: | HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators |
MD5: | C559CFDEF2D9E195DF5BBA79DDD85379 |
SHA1: | EA22DC48CC0033D6F24084F33E1F9A3DD76CDA15 |
SHA256: | A5763AA4C1B42A5303E0329D227FCE3849CBBF13C20593003CE2215D2DAEA31A |
SSDEEP: | 48:cp6XXke5V5AParZcOG1xqcGBHL4ouLaCHqe9+e0+MjH7tdmJzRbZaMJV9Fgm9JUi:hkUnAMD+xwULZUxdmJVZv1gUJ5vkZex |
.html | | | HyperText Markup Language (100) |
---|
ContentType: | text/html; charset=utf-8 |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3504 | "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\Desktop\INVOICE NO MS02419-20_SHIPPING_DOCUMENTS_(PDF).html | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2212 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3504 CREDAT:79873 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2936 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3504 CREDAT:203009 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2836 | "C:\Program Files\Google\Chrome\Application\chrome.exe" -- "C:\Users\admin\Desktop\INVOICE NO MS02419-20_SHIPPING_DOCUMENTS_(PDF).html" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
4080 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6f4da9d0,0x6f4da9e0,0x6f4da9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
3400 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2832 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
2632 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,3006190079655156984,9017127740796800537,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=4826921260252039521 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Version: 75.0.3770.100 | ||||
2748 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,3006190079655156984,9017127740796800537,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=7325574879679439793 --mojo-platform-channel-handle=1528 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
2756 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,3006190079655156984,9017127740796800537,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14734778195678780128 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
3592 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,3006190079655156984,9017127740796800537,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12379241322724490962 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3504 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
3504 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
2936 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@google[1].txt | — | |
MD5:— | SHA256:— | |||
2936 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\1MZWFM2Z\google_com[1].txt | — | |
MD5:— | SHA256:— | |||
3504 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF119735BE7CC0E258.TMP | — | |
MD5:— | SHA256:— | |||
2936 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.dat | dat | |
MD5:E8DA2A3D3890B30D57A167FBB7F6956A | SHA256:4BA3D2184DC69225CF5D9388AF1EDE08C6F0CD3C6108E3CFF8A909BE4B5FF449 | |||
2212 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\0[1].jpg | image | |
MD5:737F7643912B8749D9629494FD2E0A7F | SHA256:E0A9BDDD5E499CFAEB151E94A0FB84ECA884BA98CD56BD76E07DFE4278079A9E | |||
3504 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF9DAA09360EA76A58.TMP | — | |
MD5:— | SHA256:— | |||
2212 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019091020190911\index.dat | dat | |
MD5:D0470A4D3A036C267FCCC7704A8D63C3 | SHA256:C7E8A2D561B714FF6631EFCA8CF057DF108ED6804A2DD379FD683518E175BCE4 | |||
2936 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@google[2].txt | text | |
MD5:D75AAB98A9ECDB5213C9C711B8D1448D | SHA256:941C8BA9EAC4BA4962946E00D5066414D1E2725E68EC4072896913366BCB4C3F |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2748 | chrome.exe | GET | 302 | 172.217.22.110:80 | http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx | US | html | 516 b | whitelisted |
2748 | chrome.exe | GET | 200 | 68.65.122.52:80 | http://tunlcha.cf/a/files/0-small.jpg?x=12f4b8b543125cc986c79cd85320812f | US | image | 1.00 Kb | malicious |
2748 | chrome.exe | GET | 200 | 68.65.122.52:80 | http://tunlcha.cf/a/files/0.jpg?x=f5a9a9531b8f4bcc86eabb19472d15d5 | US | image | 190 Kb | malicious |
2748 | chrome.exe | POST | 302 | 68.65.122.52:80 | http://nastribrlzzolari.cf/a/a.php | US | — | — | malicious |
2748 | chrome.exe | GET | 200 | 84.15.64.141:80 | http://r2---sn-cpux-8ov6.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=85.206.166.82&mm=28&mn=sn-cpux-8ov6&ms=nvh&mt=1568150599&mv=m&mvi=1&pl=20&shardbypass=yes | LT | crx | 862 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3504 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2936 | iexplore.exe | 216.58.205.228:443 | www.google.com | Google Inc. | US | whitelisted |
2748 | chrome.exe | 172.217.21.227:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3504 | iexplore.exe | 216.58.205.228:443 | www.google.com | Google Inc. | US | whitelisted |
2936 | iexplore.exe | 68.65.122.52:80 | tunlcha.cf | Namecheap, Inc. | US | malicious |
2936 | iexplore.exe | 172.217.18.174:443 | google.com | Google Inc. | US | whitelisted |
2212 | iexplore.exe | 68.65.122.52:80 | tunlcha.cf | Namecheap, Inc. | US | malicious |
2748 | chrome.exe | 68.65.122.52:80 | tunlcha.cf | Namecheap, Inc. | US | malicious |
2748 | chrome.exe | 172.217.22.45:443 | accounts.google.com | Google Inc. | US | whitelisted |
2748 | chrome.exe | 216.58.206.4:443 | www.google.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
tunlcha.cf |
| malicious |
www.bing.com |
| whitelisted |
nastribrlzzolari.cf |
| malicious |
google.com |
| whitelisted |
www.google.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
ssl.gstatic.com |
| whitelisted |
clients2.google.com |
| whitelisted |
clients2.googleusercontent.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .cf Domain |
2936 | iexplore.exe | A Network Trojan was detected | ET CURRENT_EVENTS Possible Successful Generic Phish to .cf Domain 2018-10-23 |
2936 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY Http Client Body contains passwd= in cleartext |
2936 | iexplore.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.cf Domain |
2936 | iexplore.exe | A Network Trojan was detected | ET CURRENT_EVENTS Possible Successful Generic Phish Jan 14 2016 |
2748 | chrome.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .cf Domain |
2748 | chrome.exe | A Network Trojan was detected | ET CURRENT_EVENTS Possible Successful Generic Phish to .cf Domain 2018-10-23 |
2748 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY Http Client Body contains passwd= in cleartext |
2748 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.cf Domain |