analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://cdn.torrents-time.com/torrentsTime-setup-single-1.1.9.8.exe

Full analysis: https://app.any.run/tasks/bb84d22a-dbf3-4ffd-b71e-6f187ae89b4e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 17, 2020, 19:40:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

A0504050D6A0D5AE429A401C78020609

SHA1:

512DCF26FCF2C15C0C1E9B8B7EECC6DC671A10CD

SHA256:

B1F853B590352F63BC9E8E9A0E8F6B89BF1CC7E462D03F63A51B84B49D4D0AB8

SSDEEP:

3:N1KdBLQ+WIsyGKHeWQZULUoLd0C:CXbU2He+TOC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • chrome.exe (PID: 856)
      • iexplore.exe (PID: 1504)
    • Application was dropped or rewritten from another process

      • torrentsTime-setup-single-1.1.9.8.exe (PID: 956)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 1024)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 3184)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 820)
      • TTService.exe (PID: 1724)
      • TTService.exe (PID: 2584)
    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 656)
      • TTService.exe (PID: 1724)
      • regsvr32.exe (PID: 3832)
      • TTService.exe (PID: 2584)
    • Registers / Runs the DLL via REGSVR32.EXE

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 856)
      • chrome.exe (PID: 2644)
      • iexplore.exe (PID: 1504)
      • iexplore.exe (PID: 3992)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 956)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 1024)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 820)
      • torrentsTime-setup-single-1.1.9.8.exe (PID: 3184)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Reads the Windows organization settings

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Uses TASKKILL.EXE to kill Browsers

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
    • Reads Windows owner or organization settings

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 656)
      • regsvr32.exe (PID: 3832)
    • Executed as Windows Service

      • TTService.exe (PID: 1724)
      • TTService.exe (PID: 2584)
    • Starts SC.EXE for service management

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2644)
    • Searches for installed software

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2644)
      • chrome.exe (PID: 856)
    • Changes internet zones settings

      • iexplore.exe (PID: 3992)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1504)
    • Manual execution by user

      • iexplore.exe (PID: 3992)
    • Application launched itself

      • iexplore.exe (PID: 3992)
      • chrome.exe (PID: 2644)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1504)
      • chrome.exe (PID: 2644)
      • iexplore.exe (PID: 3992)
    • Creates files in the user directory

      • iexplore.exe (PID: 1504)
      • iexplore.exe (PID: 3992)
    • Application was dropped or rewritten from another process

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3392)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3412)
    • Dropped object may contain Bitcoin addresses

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Creates a software uninstall entry

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Loads dropped or rewritten executable

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
    • Creates files in the program directory

      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3592)
      • torrentsTime-setup-single-1.1.9.8.tmp (PID: 3400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
114
Monitored processes
58
Malicious processes
10
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs iexplore.exe iexplore.exe chrome.exe no specs chrome.exe no specs torrentstime-setup-single-1.1.9.8.exe torrentstime-setup-single-1.1.9.8.tmp no specs torrentstime-setup-single-1.1.9.8.exe torrentstime-setup-single-1.1.9.8.tmp taskkill.exe no specs regsvr32.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs ttservice.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs torrentstime-setup-single-1.1.9.8.exe torrentstime-setup-single-1.1.9.8.tmp no specs torrentstime-setup-single-1.1.9.8.exe torrentstime-setup-single-1.1.9.8.tmp sc.exe no specs sc.exe no specs regsvr32.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs ttservice.exe

Process information

PID
CMD
Path
Indicators
Parent process
2644"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://cdn.torrents-time.com/torrentsTime-setup-single-1.1.9.8.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3908"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6ed2a9d0,0x6ed2a9e0,0x6ed2a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2580"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2380 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=964,15409135591501864597,14892492253133790197,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5462975631569426254 --mojo-platform-channel-handle=992 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
856"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=964,15409135591501864597,14892492253133790197,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=14090839916010581675 --mojo-platform-channel-handle=1524 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
4068"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=964,15409135591501864597,14892492253133790197,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13821184473704883137 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2432"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=964,15409135591501864597,14892492253133790197,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11270965222010795069 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3344"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=964,15409135591501864597,14892492253133790197,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7533524412902566601 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=964,15409135591501864597,14892492253133790197,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=151654704114956520 --mojo-platform-channel-handle=3472 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
3992"C:\Program Files\Internet Explorer\iexplore.exe" C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
3 148
Read events
2 778
Write events
0
Delete events
0

Modification events

No data
Executable files
65
Suspicious files
198
Text files
2 865
Unknown types
35

Dropped files

PID
Process
Filename
Type
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\612ef409-dc83-48f7-855c-79d70cb0af90.tmp
MD5:
SHA256:
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT
MD5:
SHA256:
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39a9e6.TMPtext
MD5:DC32343F45B01764B6267AD36548102A
SHA256:A250F5AD57D4BD58AAE92810D50278E3BE2DBF869F126A3A3519691BCDFC2075
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF39a9f6.TMPtext
MD5:213AE3DA120D7862D60B5763B6C9D466
SHA256:5736534D6EE654C1BF1A8E79E73330AF58F622E8657285330D2C7189A55604F4
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:DC32343F45B01764B6267AD36548102A
SHA256:A250F5AD57D4BD58AAE92810D50278E3BE2DBF869F126A3A3519691BCDFC2075
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF39aa35.TMPtext
MD5:A519780ED0A2F4336DB4F5651D79C369
SHA256:DA5B71BD0075B55757BF757BF5F4D4A1DCBCF0762CDA5B31B28680963E068C75
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF39a9e6.TMPtext
MD5:C4D6CBB269C626168A5D6D0D8CCE6C30
SHA256:B62CDBB758278A0C2E50593357390119441D8DE09428EB29027F3DFD1332E348
2644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\MANIFEST-000001
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
32
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1724
TTService.exe
GET
200
104.27.188.171:80
http://ttconf.pw/?e=KXDKe4bcSpnnvcdefAHfXJDoTSdrqvxo4TFjbpdyhjSHeQBwzDb0PC7p1wY8fR5KKJWJeCq1opPH8pA5SFVpNCovkVohbCKl6cGbeyZM26QnmJehCpMuS
US
text
87 b
malicious
856
chrome.exe
GET
200
104.31.76.72:80
http://cdn.torrents-time.com/torrentsTime-setup-single-1.1.9.8.exe
US
executable
29.6 Mb
suspicious
1504
iexplore.exe
GET
200
104.31.77.72:80
http://cdn.torrents-time.com/torrentsTime-setup-single-1.1.9.8.exe
US
executable
29.6 Mb
suspicious
856
chrome.exe
GET
302
216.58.206.14:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
515 b
whitelisted
856
chrome.exe
GET
200
74.125.173.168:80
http://r3---sn-1gieen7e.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=185.212.170.89&mm=28&mn=sn-1gieen7e&ms=nvh&mt=1579290141&mv=m&mvi=2&pl=24&shardbypass=yes
US
crx
293 Kb
whitelisted
856
chrome.exe
GET
302
216.58.206.14:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
510 b
whitelisted
2644
chrome.exe
GET
200
91.199.212.52:80
http://crt.comodoca.com/COMODORSAAddTrustCA.crt
GB
der
1.37 Kb
whitelisted
3400
torrentsTime-setup-single-1.1.9.8.tmp
POST
200
172.217.16.206:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
3992
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3592
torrentsTime-setup-single-1.1.9.8.tmp
POST
200
172.217.16.206:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
856
chrome.exe
172.217.18.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
856
chrome.exe
216.58.208.35:443
ssl.gstatic.com
Google Inc.
US
whitelisted
856
chrome.exe
172.217.21.227:443
www.google.ch
Google Inc.
US
whitelisted
856
chrome.exe
216.58.206.4:443
www.google.com
Google Inc.
US
whitelisted
856
chrome.exe
172.217.16.141:443
accounts.google.com
Google Inc.
US
suspicious
856
chrome.exe
104.31.76.72:80
cdn.torrents-time.com
Cloudflare Inc
US
suspicious
856
chrome.exe
172.217.18.174:443
sb-ssl.google.com
Google Inc.
US
whitelisted
3992
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
856
chrome.exe
172.217.22.46:443
clients1.google.com
Google Inc.
US
whitelisted
3592
torrentsTime-setup-single-1.1.9.8.tmp
172.217.16.206:80
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.18.3
whitelisted
cdn.torrents-time.com
  • 104.31.76.72
  • 104.31.77.72
suspicious
accounts.google.com
  • 172.217.16.141
shared
www.google.com
  • 216.58.206.4
whitelisted
www.google.ch
  • 172.217.21.227
whitelisted
ssl.gstatic.com
  • 216.58.208.35
whitelisted
sb-ssl.google.com
  • 172.217.18.174
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.gstatic.com
  • 216.58.210.3
whitelisted
www.google-analytics.com
  • 172.217.16.206
whitelisted

Threats

PID
Process
Class
Message
856
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1504
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
1724
TTService.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.pw domain
Process
Message
TTService.exe
UPDATER: Registry Key SOFTWARE\TorrentsTimeConfig NOT Opened 234!
TTService.exe
UPDATER: WorkerThread: Start
TTService.exe
UPDATER: --- STARTING ITERATION ---
TTService.exe
UPDATER: tryInterval 86400
TTService.exe
UPDATER: tryJitterRange 8640
TTService.exe
UPDATER: curJitter 206
TTService.exe
UPDATER: lastTry 0
TTService.exe
UPDATER: time 1579290133
TTService.exe
UPDATER: nexTry 86400
TTService.exe
UPDATER: Fresh run, install_delay 60