analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://Nolkbacteria.info/js/main.js?_=

Full analysis: https://app.any.run/tasks/c9693f69-91a7-474f-8b6d-1f13fdb0fa88
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: March 21, 2019, 14:20:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MD5:

8B18F1C4B0D545C51667857511D6F959

SHA1:

3A408E0B68CBFC83E2E711E67D7D9CCACBBB018D

SHA256:

B95A0EE551FA764231A126CA695B3B15E224D3428559F285050FDD229D16AE6F

SSDEEP:

3:N1K/JOB6PKItVzn:CS6yIjzn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • firefox.exe (PID: 572)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 572)
    • Application launched itself

      • firefox.exe (PID: 572)
    • Creates files in the user directory

      • firefox.exe (PID: 572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
6
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
572"C:\Program Files\Mozilla Firefox\firefox.exe" http://Nolkbacteria.info/js/main.js?_=C:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
2996"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="572.0.1292492323\1803422725" -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - "C:\Users\admin\AppData\LocalLow\Mozilla\Temp-{ce348e4c-7d33-445e-89f9-60108c51bcaf}" 572 "\\.\pipe\gecko-crash-server-pipe.572" 1120 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
2104"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="572.6.1141797179\1754645412" -childID 1 -isForBrowser -prefsHandle 820 -prefMapHandle 1624 -prefsLen 1 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 572 "\\.\pipe\gecko-crash-server-pipe.572" 896 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
720"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="572.13.847359172\470608579" -childID 2 -isForBrowser -prefsHandle 2720 -prefMapHandle 3004 -prefsLen 5094 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 572 "\\.\pipe\gecko-crash-server-pipe.572" 3052 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
3752"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="572.20.912606864\329740108" -childID 3 -isForBrowser -prefsHandle 3268 -prefMapHandle 2852 -prefsLen 5824 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 572 "\\.\pipe\gecko-crash-server-pipe.572" 3420 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
65.0.2
648"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="572.27.28442384\1652891648" -childID 4 -isForBrowser -prefsHandle 3540 -prefMapHandle 3552 -prefsLen 5824 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 572 "\\.\pipe\gecko-crash-server-pipe.572" 3564 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
Total events
600
Read events
598
Write events
2
Delete events
0

Modification events

(PID) Process:(572) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(572) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
1
Suspicious files
65
Text files
27
Unknown types
49

Dropped files

PID
Process
Filename
Type
572firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
572firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
572firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
572firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
MD5:
SHA256:
572firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.binbinary
MD5:AC883E1540054B6B75B0229FD8CF8BB3
SHA256:1298683E48691721E36AD37EA14504B4EE025A0317B58AD259704FFD088F0625
572firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:C3A9989BA17002377D139ECE64F6989F
SHA256:783A90DE10044CC155212243ED346C2AB51BFF1FF3B50232CABFD9DF8EB0091A
572firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.binbinary
MD5:C8C881CB2BCDAE33DA6F19BB200BC4BF
SHA256:BF7A738A7F98D25531E0CE0DA229B9031C1040795AC30BC3D341759B6083EFAC
572firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\25BA3EDB202B69CA9EB335846711B3539ED15605compressed
MD5:910433DAC5666AC6BEDDAE5945125C13
SHA256:B6AA3BB7788A7EB201F3CD2B4809BAF4DC0631BB1CBDA568FE3A2D714BC30B3E
572firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:95802314368804DC02B0983737400430
SHA256:792AF4DB39ACE4FCD52AB3512769B6F2BA508C541A62D4E137A2BA91314ECF55
572firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cert9.db-journal
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
29
DNS requests
76
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
572
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
572
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
572
firefox.exe
POST
200
216.58.205.227:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
572
firefox.exe
GET
404
104.27.146.61:80
http://nolkbacteria.info/js/main.js?_=
US
html
148 b
suspicious
572
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
572
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
572
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
572
firefox.exe
POST
200
216.58.205.227:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
572
firefox.exe
GET
200
104.27.147.61:80
http://nolkbacteria.info/.well-known/http-opportunistic
US
text
98 b
suspicious
572
firefox.exe
POST
200
216.58.205.227:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
572
firefox.exe
2.16.186.112:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
572
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
572
firefox.exe
52.88.150.81:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
572
firefox.exe
13.32.159.37:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
unknown
572
firefox.exe
104.27.146.61:80
nolkbacteria.info
Cloudflare Inc
US
shared
572
firefox.exe
104.27.146.61:443
nolkbacteria.info
Cloudflare Inc
US
shared
572
firefox.exe
35.160.41.125:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
572
firefox.exe
104.27.147.61:80
nolkbacteria.info
Cloudflare Inc
US
shared
572
firefox.exe
172.217.23.138:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
572
firefox.exe
216.58.205.227:80
ocsp.pki.goog
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
nolkbacteria.info
  • 104.27.146.61
  • 104.27.147.61
suspicious
detectportal.firefox.com
  • 2.16.186.112
  • 2.16.186.50
whitelisted
a1089.dscd.akamai.net
  • 2.16.186.50
  • 2.16.186.112
whitelisted
search.services.mozilla.com
  • 52.88.150.81
  • 35.166.112.39
  • 34.213.175.109
whitelisted
search.r53-2.services.mozilla.com
  • 34.213.175.109
  • 35.166.112.39
  • 52.88.150.81
whitelisted
snippets.cdn.mozilla.net
  • 13.32.159.37
whitelisted
tiles.services.mozilla.com
  • 35.160.41.125
  • 52.35.250.5
  • 34.214.20.242
  • 35.165.22.140
  • 35.164.197.9
  • 52.25.148.139
  • 52.26.103.165
  • 35.164.130.113
whitelisted
drcwo519tnci7.cloudfront.net
  • 13.32.159.37
shared
tiles.r53-2.services.mozilla.com
  • 35.164.130.113
  • 52.26.103.165
  • 52.25.148.139
  • 35.164.197.9
  • 35.165.22.140
  • 34.214.20.242
  • 52.35.250.5
  • 35.160.41.125
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
A Network Trojan was detected
ET TROJAN W32.Razy Inject Domain in DNS Lookup
No debug info