analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.slimjetbrowser.com/release/sjtsetup_x86.exe

Full analysis: https://app.any.run/tasks/b75e9731-91f4-447d-86ee-238706aad2fa
Verdict: Malicious activity
Analysis date: December 02, 2019, 16:34:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E91E2DB7F63DAE1B404C18C8F482E072

SHA1:

E397CDC889E79227CDCD78FAD78EC0F0F6D8DD88

SHA256:

C6B048696D61AF71EE9A0129597533C7BAA33EE6CEECF7CE7270DA91241E0B5A

SSDEEP:

3:N8DSL0c3YyyKBr6ft:2OLGKBO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • sjtsetup_x86.exe (PID: 3924)
      • slimjet.exe (PID: 4008)
      • slimjet.exe (PID: 2140)
      • slimjet.exe (PID: 3988)
      • slimjet.exe (PID: 1776)
      • slimjet.exe (PID: 1648)
      • slimjet.exe (PID: 1516)
      • slimjet.exe (PID: 436)
      • slimjet.exe (PID: 1484)
      • slimjet.exe (PID: 1744)
      • slimjet.exe (PID: 3632)
      • slimjet.exe (PID: 3576)
      • slimjet.exe (PID: 3892)
      • slimjet.exe (PID: 3520)
      • slimjet.exe (PID: 3736)
      • slimjet.exe (PID: 2080)
      • slimjet.exe (PID: 2448)
      • slimjet.exe (PID: 3116)
      • slimjet.exe (PID: 3196)
      • slimjet.exe (PID: 3120)
      • slimjet.exe (PID: 1244)
      • slimjet.exe (PID: 2116)
      • slimjet.exe (PID: 3468)
      • slimjet.exe (PID: 736)
      • slimjet.exe (PID: 1876)
      • slimjet.exe (PID: 2400)
      • slimjet.exe (PID: 3312)
      • slimjet.exe (PID: 2232)
      • slimjet.exe (PID: 3964)
      • slimjet.exe (PID: 2796)
      • slimjet.exe (PID: 4072)
      • slimjet.exe (PID: 1576)
      • slimjet.exe (PID: 1504)
      • slimjet.exe (PID: 3868)
      • slimjet.exe (PID: 2588)
      • slimjet.exe (PID: 1216)
      • slimjet.exe (PID: 2336)
      • slimjet.exe (PID: 892)
      • slimjet.exe (PID: 2120)
      • slimjet.exe (PID: 2416)
      • slimjet.exe (PID: 4024)
      • slimjet.exe (PID: 3796)
      • slimjet.exe (PID: 2436)
      • slimjet.exe (PID: 3512)
      • slimjet.exe (PID: 3292)
      • slimjet.exe (PID: 2308)
    • Application was dropped or rewritten from another process

      • sjtsetup_x86.exe (PID: 4000)
      • sjtsetup_x86.exe (PID: 3924)
      • ns5826.tmp (PID: 2860)
      • slimjet.exe (PID: 4008)
      • slimjet.exe (PID: 2140)
      • slimjet.exe (PID: 1776)
      • slimjet.exe (PID: 3988)
      • slimjet.exe (PID: 3576)
      • slimjet.exe (PID: 1648)
      • slimjet.exe (PID: 1516)
      • slimjet.exe (PID: 1744)
      • slimjet.exe (PID: 3632)
      • slimjet.exe (PID: 436)
      • slimjet.exe (PID: 3892)
      • slimjet.exe (PID: 2448)
      • slimjet.exe (PID: 1484)
      • slimjet.exe (PID: 3736)
      • slimjet.exe (PID: 3520)
      • slimjet.exe (PID: 2080)
      • slimjet.exe (PID: 3116)
      • slimjet.exe (PID: 3196)
      • slimjet.exe (PID: 3120)
      • slimjet.exe (PID: 2116)
      • slimjet.exe (PID: 3468)
      • slimjet.exe (PID: 1244)
      • slimjet.exe (PID: 2400)
      • slimjet.exe (PID: 736)
      • slimjet.exe (PID: 1876)
      • slimjet.exe (PID: 3312)
      • slimjet.exe (PID: 2232)
      • slimjet.exe (PID: 1576)
      • slimjet.exe (PID: 2796)
      • slimjet.exe (PID: 4072)
      • slimjet.exe (PID: 1504)
      • slimjet.exe (PID: 3964)
      • slimjet.exe (PID: 3868)
      • slimjet.exe (PID: 892)
      • slimjet.exe (PID: 4024)
      • slimjet.exe (PID: 2588)
      • slimjet.exe (PID: 2336)
      • slimjet.exe (PID: 1216)
      • slimjet.exe (PID: 3796)
      • slimjet.exe (PID: 2120)
      • slimjet.exe (PID: 3292)
      • slimjet.exe (PID: 2436)
      • slimjet.exe (PID: 2416)
      • slimjet.exe (PID: 3512)
      • slimjet.exe (PID: 2308)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • firefox.exe (PID: 3140)
      • sjtsetup_x86.exe (PID: 3924)
      • sjt7z_x86_console.exe (PID: 3016)
    • Creates files in the program directory

      • firefox.exe (PID: 3140)
      • sjtsetup_x86.exe (PID: 3924)
      • sjt7z_x86_console.exe (PID: 3016)
    • Starts application with an unusual extension

      • sjtsetup_x86.exe (PID: 3924)
    • Creates files in the user directory

      • sjtsetup_x86.exe (PID: 3924)
    • Creates a software uninstall entry

      • sjtsetup_x86.exe (PID: 3924)
    • Executed via COM

      • explorer.exe (PID: 3168)
    • Application launched itself

      • slimjet.exe (PID: 4008)
      • slimjet.exe (PID: 1776)
    • Modifies the open verb of a shell class

      • slimjet.exe (PID: 4008)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 3140)
    • Application launched itself

      • firefox.exe (PID: 3340)
      • firefox.exe (PID: 3140)
    • Reads settings of System Certificates

      • firefox.exe (PID: 3140)
    • Creates files in the user directory

      • firefox.exe (PID: 3140)
    • Dropped object may contain Bitcoin addresses

      • sjt7z_x86_console.exe (PID: 3016)
      • slimjet.exe (PID: 1776)
    • Reads the hosts file

      • slimjet.exe (PID: 4008)
      • slimjet.exe (PID: 1776)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
104
Monitored processes
58
Malicious processes
10
Suspicious processes
21

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe sjtsetup_x86.exe no specs sjtsetup_x86.exe pingsender.exe ns5826.tmp no specs sjt7z_x86_console.exe slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs explorer.exe no specs explorer.exe no specs slimjet.exe slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs slimjet.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3340"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.slimjetbrowser.com/release/sjtsetup_x86.exe"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
3140"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.slimjetbrowser.com/release/sjtsetup_x86.exeC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
2372"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3140.0.948578205\2003081460" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3140 "\\.\pipe\gecko-crash-server-pipe.3140" 1168 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
1
Version:
68.0.1
3932"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3140.3.818885202\1431381812" -childID 1 -isForBrowser -prefsHandle 824 -prefMapHandle 1620 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3140 "\\.\pipe\gecko-crash-server-pipe.3140" 1704 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
1928"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3140.13.815133544\852165200" -childID 2 -isForBrowser -prefsHandle 2812 -prefMapHandle 2816 -prefsLen 5997 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3140 "\\.\pipe\gecko-crash-server-pipe.3140" 2808 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
2352"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3140.20.342463021\81396118" -childID 3 -isForBrowser -prefsHandle 3708 -prefMapHandle 3720 -prefsLen 7298 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3140 "\\.\pipe\gecko-crash-server-pipe.3140" 3740 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
4000"C:\Users\admin\Downloads\sjtsetup_x86.exe" C:\Users\admin\Downloads\sjtsetup_x86.exefirefox.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
3924"C:\Users\admin\Downloads\sjtsetup_x86.exe" C:\Users\admin\Downloads\sjtsetup_x86.exe
firefox.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
3724"C:\Program Files\Mozilla Firefox\pingsender.exe" https://incoming.telemetry.mozilla.org/submit/telemetry/20912966-bcbd-4b61-ba54-293c11744ec5/main/Firefox/68.0.1/release/20190717172542?v=4 C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\saved-telemetry-pings\20912966-bcbd-4b61-ba54-293c11744ec5C:\Program Files\Mozilla Firefox\pingsender.exe
firefox.exe
User:
admin
Company:
Mozilla Foundation
Integrity Level:
MEDIUM
Version:
68.0.1
2860"C:\Users\admin\AppData\Local\Temp\nstE7C7.tmp\ns5826.tmp" "C:\Users\admin\AppData\Local\Temp\sjt7z_x86_console.exe" -o"C:\Program Files\Slimjet" -yC:\Users\admin\AppData\Local\Temp\nstE7C7.tmp\ns5826.tmpsjtsetup_x86.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Total events
2 072
Read events
1 571
Write events
0
Delete events
0

Modification events

No data
Executable files
23
Suspicious files
191
Text files
711
Unknown types
131

Dropped files

PID
Process
Filename
Type
3140firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\doomed\8727
MD5:
SHA256:
3140firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_UpwRmQEMRJdQgcd
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
67
TCP/UDP connections
127
DNS requests
124
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
sjtsetup_x86.exe
GET
50.62.135.162:80
http://www.slimjet.com/getcountry.php
US
suspicious
1776
slimjet.exe
GET
200
104.31.67.198:80
http://www.slimjetbrowser.com/version.txt
US
text
102 b
malicious
3140
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3140
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3140
firefox.exe
POST
200
172.217.18.163:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
1776
slimjet.exe
GET
301
50.62.135.162:80
http://www.slimjet.com/postinst.php?flag=1&ver=24.0.6.0&os=win&tag=
US
html
288 b
suspicious
3140
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3140
firefox.exe
POST
200
172.217.18.163:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3924
sjtsetup_x86.exe
GET
301
50.62.135.162:80
http://www.slimjet.com/getcountry.php
US
html
246 b
suspicious
1776
slimjet.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3140
firefox.exe
2.16.186.50:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
3140
firefox.exe
13.35.253.117:443
firefox.settings.services.mozilla.com
US
suspicious
3140
firefox.exe
2.16.186.112:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
3140
firefox.exe
54.149.210.11:443
push.services.mozilla.com
Amazon.com, Inc.
US
malicious
3140
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3140
firefox.exe
54.186.225.209:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
3140
firefox.exe
172.217.16.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3140
firefox.exe
104.31.66.198:443
www.slimjetbrowser.com
Cloudflare Inc
US
shared
3140
firefox.exe
143.204.214.76:443
content-signature-2.cdn.mozilla.net
US
suspicious
3140
firefox.exe
52.222.158.66:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 2.16.186.112
  • 2.16.186.50
whitelisted
a1089.dscd.akamai.net
  • 2.16.186.50
  • 2.16.186.112
whitelisted
search.services.mozilla.com
  • 52.89.218.39
  • 52.35.182.58
  • 35.164.109.147
whitelisted
search.r53-2.services.mozilla.com
  • 35.164.109.147
  • 52.35.182.58
  • 52.89.218.39
whitelisted
push.services.mozilla.com
  • 54.149.210.11
whitelisted
autopush.prod.mozaws.net
  • 54.149.210.11
whitelisted
snippets.cdn.mozilla.net
  • 52.222.158.66
  • 52.222.158.80
  • 52.222.158.131
  • 52.222.158.124
whitelisted
tiles.services.mozilla.com
  • 54.186.225.209
  • 52.33.184.165
  • 52.33.13.207
  • 52.39.224.180
  • 52.39.125.254
  • 52.24.113.72
  • 52.89.51.22
  • 54.149.128.76
whitelisted
d228z91au11ukj.cloudfront.net
  • 52.222.158.124
  • 52.222.158.131
  • 52.222.158.80
  • 52.222.158.66
whitelisted
tiles.r53-2.services.mozilla.com
  • 54.149.128.76
  • 52.89.51.22
  • 52.24.113.72
  • 52.39.125.254
  • 52.39.224.180
  • 52.33.13.207
  • 52.33.184.165
  • 54.186.225.209
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
6 ETPRO signatures available at the full report
No debug info