URL:

https://cdn.articulate.com/products/uploads/oN3GCRdY_Jm0XTkO/storyline-stable-release-3-24-17733-0.exe

Full analysis: https://app.any.run/tasks/aa7945e5-702a-43ab-9af5-ee8205280008
Verdict: Malicious activity
Analysis date: January 23, 2019, 07:46:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

441E5B3C74C7B40323C9BD8361458E4D

SHA1:

2A231E1E1CD40A92E32731480510FDC1B1197D9F

SHA256:

C2C73D194BEC8B28D638D55C1CDAC89EEFDBA98CD27F694360E9D38B83385D52

SSDEEP:

3:N8cWHkyCXaQGRWLzpB86vgXWX4Kpnx1OSRWNn:2c6FRWLzpB86YXWX4KpzOSg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • storyline-stable-release-3-24-17733-0.exe (PID: 2916)
      • csrss.exe (PID: 400)
      • vc_redist.x86.exe (PID: 3300)
      • Storyline.exe (PID: 3748)
      • csrss.exe (PID: 344)
    • Application was dropped or rewritten from another process

      • storyline-stable-release-3-24-17733-0.exe (PID: 2916)
      • Articulate.Storyline.Bundle.exe (PID: 2748)
      • Storyline.exe (PID: 3748)
      • vc_redist.x86.exe (PID: 2132)
      • vc_redist.x86.exe (PID: 3300)
    • Changes the autorun value in the registry

      • vc_redist.x86.exe (PID: 2132)
      • Articulate.Storyline.Bundle.exe (PID: 2748)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • storyline-stable-release-3-24-17733-0.exe (PID: 3912)
      • storyline-stable-release-3-24-17733-0.exe (PID: 2916)
      • Articulate.Storyline.Bundle.exe (PID: 2748)
      • vc_redist.x86.exe (PID: 3300)
      • msiexec.exe (PID: 3224)
    • Searches for installed software

      • Articulate.Storyline.Bundle.exe (PID: 2748)
      • vc_redist.x86.exe (PID: 2132)
    • Starts itself from another location

      • storyline-stable-release-3-24-17733-0.exe (PID: 2916)
    • Creates files in the program directory

      • Articulate.Storyline.Bundle.exe (PID: 2748)
      • Storyline.exe (PID: 3748)
    • Creates a software uninstall entry

      • Articulate.Storyline.Bundle.exe (PID: 2748)
      • vc_redist.x86.exe (PID: 2132)
    • Creates files in the Windows directory

      • msiexec.exe (PID: 3224)
    • Creates COM task schedule object

      • msiexec.exe (PID: 3224)
    • Modifies the open verb of a shell class

      • msiexec.exe (PID: 3224)
    • Reads Environment values

      • Storyline.exe (PID: 3748)
    • Starts Internet Explorer

      • Storyline.exe (PID: 3748)
    • Creates files in the user directory

      • Storyline.exe (PID: 3748)
    • Application launched itself

      • vc_redist.x86.exe (PID: 2132)
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 3652)
      • Storyline.exe (PID: 3748)
    • Application launched itself

      • chrome.exe (PID: 3652)
      • iexplore.exe (PID: 1656)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 3652)
      • iexplore.exe (PID: 1740)
    • Changes settings of System certificates

      • DrvInst.exe (PID: 2328)
    • Adds / modifies Windows certificates

      • DrvInst.exe (PID: 2328)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2152)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3224)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 3224)
    • Changes internet zones settings

      • iexplore.exe (PID: 1656)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1740)
    • Creates files in the program directory

      • msiexec.exe (PID: 3224)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
24
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs storyline-stable-release-3-24-17733-0.exe storyline-stable-release-3-24-17733-0.exe articulate.storyline.bundle.exe vssvc.exe no specs drvinst.exe no specs vc_redist.x86.exe vc_redist.x86.exe drvinst.exe no specs msiexec.exe storyline.exe csrss.exe no specs csrss.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,242606157672125368,8062065844879851193,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=E71961EDDA9308F393280807069FE95F --mojo-platform-channel-handle=796 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
344%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
400%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
1656"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
Storyline.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1728DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "00000000" "00000390" "000005C4"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1740"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1656 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2132"C:\ProgramData\Package Cache\0164F835D549FF03296DD615CF13CEFC042CC495\vc_redist.x86.exe" /quiet /norestartC:\ProgramData\Package Cache\0164F835D549FF03296DD615CF13CEFC042CC495\vc_redist.x86.exe
Articulate.Storyline.Bundle.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706
Exit code:
0
Version:
14.15.26706.0
Modules
Images
c:\programdata\package cache\0164f835d549ff03296dd615cf13cefc042cc495\vc_redist.x86.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2152C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2160"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,242606157672125368,8062065844879851193,131072 --enable-features=PasswordImport --service-pipe-token=17B6551D34E6DD072F91D6ADBA1871ED --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17B6551D34E6DD072F91D6ADBA1871ED --renderer-client-id=3 --mojo-platform-channel-handle=2144 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2328DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot18" "" "" "6792c44eb" "00000000" "000005BC" "00000390"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
4 250
Read events
2 176
Write events
2 042
Delete events
32

Modification events

(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3604) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:3652-13192703200266750
Value:
259
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3516-13180984670829101
Value:
0
(PID) Process:(3652) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3652-13192703200266750
Value:
259
(PID) Process:(3652) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
287
Suspicious files
139
Text files
745
Unknown types
243

Dropped files

PID
Process
Filename
Type
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1f26b8eb-87d5-4a32-b245-296b04b7c2a1.tmp
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\CURRENT
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\CURRENT~RF198d90.TMP
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\d1f09d95-e09a-4e48-b0ca-069bc53c1e54.tmp
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF198ce4.TMPtext
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Translate Ranker Model~RF199149.TMPbinary
MD5:
SHA256:
3652chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Translate Ranker Modelbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
18
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3652
chrome.exe
GET
200
205.185.216.10:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
55.2 Kb
whitelisted
3652
chrome.exe
GET
200
52.85.188.155:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3652
chrome.exe
172.217.16.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.23.163:443
www.gstatic.com
Google Inc.
US
whitelisted
3652
chrome.exe
54.230.93.15:443
cdn.articulate.com
Amazon.com, Inc.
US
malicious
3652
chrome.exe
205.185.216.10:80
www.download.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3652
chrome.exe
172.217.22.46:443
clients4.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.22.78:443
clients1.google.com
Google Inc.
US
whitelisted
3652
chrome.exe
172.217.22.42:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3652
chrome.exe
216.58.205.238:443
sb-ssl.google.com
Google Inc.
US
whitelisted
3748
Storyline.exe
54.230.93.203:443
Amazon.com, Inc.
US
unknown
1740
iexplore.exe
34.199.180.87:443
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.16.195
whitelisted
www.gstatic.com
  • 172.217.23.163
whitelisted
cdn.articulate.com
  • 54.230.93.15
  • 54.230.93.6
  • 54.230.93.16
  • 54.230.93.24
whitelisted
x.ss2.us
  • 52.85.188.155
  • 52.85.188.165
  • 52.85.188.247
  • 52.85.188.131
whitelisted
www.download.windowsupdate.com
  • 205.185.216.10
  • 205.185.216.10
  • 205.185.216.42
  • 205.185.216.10
whitelisted
accounts.google.com
  • 172.217.16.141
shared
ssl.gstatic.com
  • 216.58.207.67
whitelisted
clients4.google.com
  • 172.217.22.46
whitelisted
clients1.google.com
  • 172.217.22.78
whitelisted
safebrowsing.googleapis.com
  • 172.217.22.42
whitelisted

Threats

No threats detected
Process
Message
Storyline.exe
ThreeSixtyRemoting Error: 0 :
Storyline.exe
[2019-01-23T07:51:18.0245625+00:00][00000ea4:00000e78:00000001] ServiceProcess.IsAlive the service process is not currently running
Storyline.exe
ThreeSixtyRemoting Error: 0 :
Storyline.exe
[2019-01-23T07:51:18.0245625+00:00][00000ea4:00000e78:00000001] ServiceProcess.IsAlive the service process is not currently running
Storyline.exe
ThreeSixtyRemoting Error: 0 :
Storyline.exe
[2019-01-23T07:51:18.0245625+00:00][00000ea4:00000e78:00000001] ServiceProcess.IsAlive the service process is not currently running
Storyline.exe
ThreeSixtyRemoting Error: 0 :
Storyline.exe
[2019-01-23T07:51:18.0245625+00:00][00000ea4:00000e78:00000001] ServiceProcess.IsAlive the service process is not currently running
Storyline.exe
[2019-01-23T07:51:18.0401875+00:00][00000ea4:00000e78:00000001] ServiceProcess.Start() unable to find the service process on the user's system
Storyline.exe
[2019-01-23T07:51:18.0401875+00:00][00000ea4:00000e78:00000001] ServiceProcess.Start() unable to find the service process on the user's system