analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://google.com/

Full analysis: https://app.any.run/tasks/e2f25eed-fcf1-43eb-93f0-18ea1d493856
Verdict: Malicious activity
Analysis date: November 29, 2020, 19:45:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
Indicators:
MD5:

6AB016B2DAD7BA49A992BA0213A91CF8

SHA1:

AC4CBE16220C61319D192BF9078F01DE42E383E3

SHA256:

CF4B367E49BF0B22041C6F065F4AA19F3CFE39C8D5ABC0617343D1A66C6A26F5

SSDEEP:

3:N1KZK3uR:C03uR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • dmr_72.exe (PID: 2100)
      • BonziBuddy - CHIP-Installer.exe (PID: 2808)
      • BonziBuddy - CHIP-Installer.exe (PID: 1596)
    • Drops executable file immediately after starts

      • BonziBuddy - CHIP-Installer.exe (PID: 2808)
    • Changes settings of System certificates

      • dmr_72.exe (PID: 2100)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • BonziBuddy - CHIP-Installer.exe (PID: 2808)
      • chrome.exe (PID: 2372)
    • Drops a file that was compiled in debug mode

      • BonziBuddy - CHIP-Installer.exe (PID: 2808)
    • Adds / modifies Windows certificates

      • dmr_72.exe (PID: 2100)
    • Reads internet explorer settings

      • dmr_72.exe (PID: 2100)
    • Searches for installed software

      • dmr_72.exe (PID: 2100)
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 1176)
      • chrome.exe (PID: 2372)
      • dmr_72.exe (PID: 2100)
    • Reads the hosts file

      • chrome.exe (PID: 1176)
      • chrome.exe (PID: 2372)
    • Application launched itself

      • chrome.exe (PID: 2372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
75
Monitored processes
36
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs bonzibuddy - chip-installer.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs bonzibuddy - chip-installer.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs dmr_72.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2372"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "http://google.com/"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2908"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6edaa9d0,0x6edaa9e0,0x6edaa9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1892"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2496 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3992"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=7619270231329191163 --mojo-platform-channel-handle=1016 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
1176"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=17855507862018610207 --mojo-platform-channel-handle=1480 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1636"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15002720020529202324 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2176 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2952257230349058446 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2188 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17804445556001936646 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2352 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2424"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8702736100835343124 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
628"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=956,11619048383992955301,7832476983620630255,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=17306717482081263559 --mojo-platform-channel-handle=2912 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
13 280
Read events
13 156
Write events
121
Delete events
3

Modification events

(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:Key:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2372-13251152733359750
Value:
259
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(2372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2372-13251152733359750
Value:
259
Executable files
4
Suspicious files
129
Text files
96
Unknown types
3

Dropped files

PID
Process
Filename
Type
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5FC3FA5E-944.pma
MD5:
SHA256:
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\041335f5-4a81-4abf-8f70-b85237c75bc8.tmp
MD5:
SHA256:
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF1437d7.TMPtext
MD5:D4322EEBAC92D1B8F7A6F5E39F6264B7
SHA256:A3EEDF21B850DCC7CE5AE04395ECDD2D29DA4EA549C8A185DD9E8B552A87B8C2
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:67F45CAA18C889645F50CD6216C81E65
SHA256:33ED82CDDDFFD55A5059C147C6CD20F66C6712314F890A39576D3C10914D0029
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE
SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF143883.TMPtext
MD5:67F45CAA18C889645F50CD6216C81E65
SHA256:33ED82CDDDFFD55A5059C147C6CD20F66C6712314F890A39576D3C10914D0029
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabsbinary
MD5:E815400F953EA8DB8A98D52737C9A50D
SHA256:E9F064927A191500B7365F51C9CD0763A6A8E68A8B866ACED39AA0E72C3EAD85
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.oldtext
MD5:F1220A80653B6B89B42DFD1B2E8155C3
SHA256:36BBBC13CC1901CF269B4CE36E2EE08946806DFA58474AE88287CA8E9DA9725D
2372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RF1438f0.TMPtext
MD5:74D4DB05A4D3E7263E8AE314DEDD8DF1
SHA256:67BF9950E818713E054268D40BED61A22D324385CE98E89DDF406A405B870802
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
345
DNS requests
187
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/newbrandmachine/chipderedesign?cid=54374103&scid=&headline1=426F6E7A694275646479&headline2=434849502D444F574E4C4F4144&euid=316234633837643134376461636433316361333233306538&icon=&screenshot=68747470733A2F2F7777772E636869702E64652F69692F3138333130333734375F666662356563333861392E676966&MetaRating=33&lang=en
DE
binary
114 Kb
malicious
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/geoip/geoip.php?ip=34352e38362e3230322e35&givezip=true
DE
malicious
2100
dmr_72.exe
GET
200
5.9.198.84:80
http://static.chip-secured-download.de/gfx/pagead/Lavasoft/2020/DES-77-003-2.png
DE
image
169 Kb
suspicious
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/downloaderContent/img/bg-progressbar.jpg
DE
image
17.3 Kb
malicious
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/progresspagead?source=BLUB2&pid=chipderedesign&Camplist=38643339626665323263656135316561653463656137333532306234653633393B39353236356165373862303365653035346331323630376532333234346435643B36636362363333656265363135336266643864386338303237663661653962303B6438663531333838363832333635626139356261643432646332393330383866&cid=54374103
DE
html
495 b
malicious
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/downloaderContent/img/background%20progressad.gif
DE
image
1.81 Kb
malicious
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/downloaderContent/img/bg-icon-speedometer.png
DE
image
5.35 Kb
malicious
2100
dmr_72.exe
GET
200
148.251.213.132:80
http://api2.chip-secured-download.de/downloaderContent/main.js?v=12
DE
text
8.74 Kb
malicious
1176
chrome.exe
GET
301
172.217.18.110:80
http://google.com/
US
html
219 b
whitelisted
2100
dmr_72.exe
GET
200
5.9.198.84:80
http://static.chip-secured-download.de/gfx/pagead/AVAST/CMA-5524_Avast-PPI-Banner-for-Chip_700x290-revisions.png
DE
image
225 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1176
chrome.exe
172.217.18.110:80
Google Inc.
US
whitelisted
1176
chrome.exe
172.217.16.142:443
apis.google.com
Google Inc.
US
whitelisted
1176
chrome.exe
216.58.212.164:443
www.google.com
Google Inc.
US
whitelisted
1176
chrome.exe
172.217.23.131:443
ssl.gstatic.com
Google Inc.
US
whitelisted
1176
chrome.exe
216.58.212.131:443
fonts.gstatic.com
Google Inc.
US
whitelisted
1176
chrome.exe
216.58.207.46:443
clients1.google.com
Google Inc.
US
whitelisted
1176
chrome.exe
172.217.22.14:443
consent.google.com
Google Inc.
US
whitelisted
1176
chrome.exe
172.217.175.99:443
id.google.com
Google Inc.
US
whitelisted
1176
chrome.exe
172.217.18.173:443
accounts.google.com
Google Inc.
US
whitelisted
1176
chrome.exe
172.217.23.110:443
play.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
accounts.google.com
  • 172.217.18.173
shared
www.google.com
  • 216.58.212.164
whitelisted
ssl.gstatic.com
  • 172.217.23.131
whitelisted
consent.google.com
  • 172.217.22.14
shared
id.google.com
  • 172.217.175.99
whitelisted
clients1.google.com
  • 216.58.207.46
whitelisted
www.gstatic.com
  • 172.217.23.131
whitelisted
fonts.gstatic.com
  • 216.58.212.131
whitelisted
apis.google.com
  • 172.217.16.142
whitelisted
ogs.google.com
  • 172.217.16.142
whitelisted

Threats

PID
Process
Class
Message
2100
dmr_72.exe
Misc activity
ADWARE [PTsecurity] DownloadSponsor inbound artifact m1
2100
dmr_72.exe
Misc activity
ADWARE [PTsecurity] DownloadSponsor inbound artifact m1
2100
dmr_72.exe
A Network Trojan was detected
MALWARE [PTsecurity] DownloadSponsor img_welcome PNG artifact
2100
dmr_72.exe
Misc activity
ADWARE [PTsecurity] DownloadSponsor inbound artifact m1
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
Misc activity
ET INFO EXE - Served Attached HTTP
2100
dmr_72.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
2100
dmr_72.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2100
dmr_72.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
1 ETPRO signatures available at the full report
No debug info