analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/settings/settings.php?action=paymentAction

Full analysis: https://app.any.run/tasks/7650626a-2e12-4d08-8b1f-c6d1466da1e6
Verdict: Malicious activity
Analysis date: August 08, 2020, 22:16:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
phishing
phish-paypal
Indicators:
MD5:

E61A92D58A104E18C29D0A910C18120D

SHA1:

B64DC558BD491D113820D5EACB67C466CA33D4E9

SHA256:

C1C64987D1E68B840A5FD73C4C256F5FE4273F7B5A1D1630ACA127606E7F5612

SSDEEP:

3:N1KJS4iWtdzLKHFITEJMPK3BQQyuadlAc2RTABjfVraiwVS3KV1BN:Cc4iAzUAgsg4aKNVuSYvN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads PayPal favicon from HTTP

      • chrome.exe (PID: 2420)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2108)
      • chrome.exe (PID: 2420)
    • Application launched itself

      • chrome.exe (PID: 2108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
13
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2108"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/settings/settings.php?action=paymentAction"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3380"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6e0ea9d0,0x6e0ea9e0,0x6e0ea9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
544"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2092 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2312"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=2793481022809374633 --mojo-platform-channel-handle=952 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2420"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=9126393851313634952 --mojo-platform-channel-handle=1632 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3200"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15686103518333544387 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
1780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2657108589200448134 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8560395573041083897 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2600"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=6831079447758717819 --mojo-platform-channel-handle=3460 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1028,16121811948467995897,2014774517726347313,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=16119959526495361168 --mojo-platform-channel-handle=3456 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
618
Read events
533
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
18
Text files
62
Unknown types
2

Dropped files

PID
Process
Filename
Type
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\11f08392-3be3-48f4-80b1-956b7ce6cba5.tmp
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF14e79f.TMPtext
MD5:D11C35B3D5258F594933332C11C6F0F2
SHA256:DC2EB16E16FA3FB258AC31A481F817208CF0C917AF4224F2832588D3A64ADD05
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.oldtext
MD5:93AD58B08432FE2A935E1CEF40067A30
SHA256:8C0A6636BDB4ACD83D99E0BD78A484710121D5410459F27DEE24A0EB5B2877A2
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:D11C35B3D5258F594933332C11C6F0F2
SHA256:DC2EB16E16FA3FB258AC31A481F817208CF0C917AF4224F2832588D3A64ADD05
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:AFDDC99E148FD40EED8086EE532B61C4
SHA256:3F1C412561D08C113C1561C9D273FBA00DAB5481B4AC1428FCC91D9285BA7E1E
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:1B8E44CB8872BF26BC5219E37A700F8A
SHA256:FD3D4BC8A7D28A05D1321F1D175FB59FC2BCC3532B92274A50133C22F0A0480A
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF14e751.TMPtext
MD5:1B8E44CB8872BF26BC5219E37A700F8A
SHA256:FD3D4BC8A7D28A05D1321F1D175FB59FC2BCC3532B92274A50133C22F0A0480A
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RF14e7ed.TMPtext
MD5:AFDDC99E148FD40EED8086EE532B61C4
SHA256:3F1C412561D08C113C1561C9D273FBA00DAB5481B4AC1428FCC91D9285BA7E1E
2108chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000001.dbtmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
17
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2420
chrome.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/Meightx.css
US
text
2.54 Kb
suspicious
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/settings/settings.php?action=paymentAction
US
html
41.2 Kb
suspicious
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/Mnine.css
US
text
4.24 Kb
suspicious
2420
chrome.exe
GET
404
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/PayPalSansBig-Regular.woff2
US
html
379 b
suspicious
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/Mfour.js
US
text
44.6 Kb
suspicious
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/Mone.js
US
text
59.0 Kb
suspicious
2420
chrome.exe
GET
404
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/PayPalSansBig-Regular.woff
US
html
379 b
suspicious
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mfiles/Mthree.js
US
text
18.0 Kb
suspicious
2420
chrome.exe
GET
200
162.144.199.234:80
http://www.zohard.com/.well-known/pki-validation/mod/unblockverification/customer_center/customer-IDPP00C963/Mpic/Mten.png
US
image
23.6 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2420
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2420
chrome.exe
162.144.199.234:80
www.zohard.com
Unified Layer
US
suspicious
2420
chrome.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
172.217.21.195:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2420
chrome.exe
104.111.228.123:443
www.paypalobjects.com
Akamai International B.V.
NL
unknown
2420
chrome.exe
216.58.207.42:443
ajax.googleapis.com
Google Inc.
US
whitelisted
216.58.208.46:443
clients2.google.com
Google Inc.
US
whitelisted
2420
chrome.exe
172.217.18.110:443
clients1.google.com
Google Inc.
US
whitelisted
2420
chrome.exe
216.58.206.13:443
accounts.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
www.zohard.com
  • 162.144.199.234
suspicious
accounts.google.com
  • 216.58.206.13
shared
www.paypalobjects.com
  • 104.111.228.123
whitelisted
ajax.googleapis.com
  • 216.58.207.42
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
clients1.google.com
  • 172.217.18.110
whitelisted
clients2.google.com
  • 216.58.208.46
whitelisted
ssl.gstatic.com
  • 172.217.21.195
whitelisted

Threats

PID
Process
Class
Message
2420
chrome.exe
A Network Trojan was detected
ET INFO Suspicious HTML Hex Obfuscated Title - Possible Phishing Landing Jun 28 2017
2420
chrome.exe
A Network Trojan was detected
ET CURRENT_EVENTS Paypal Phishing Landing Jun 28 2017
1 ETPRO signatures available at the full report
No debug info