| URL: | http://dgza5b0tpp642.cloudfront.net/hyfi6~2lqg98g/Baixaki_iTunes.exe |
| Full analysis: | https://app.any.run/tasks/2ac9911c-1899-4f05-a153-f9e8d15f23d8 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | March 01, 2019, 22:05:48 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 411D6AEB30D965FF67B25AE73D90021D |
| SHA1: | 219B9641B00668A08CF1C0B5E1F3B14172C8B793 |
| SHA256: | D6CA6924313C16FFA69EFBCCEC756AAF4E1D561EA16D93A1BFE5835F16D568B5 |
| SSDEEP: | 3:N1KaCsTf+l/0bMXJbjV1OM6eA:Cahfnbo1OM6 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 688 | C:\Windows\system32\svchost.exe -k RPCSS | C:\Windows\System32\svchost.exe | — | services.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1384 | "C:\Users\admin\AppData\Local\Temp\IXP862.TMP\SetupAdmin.exe" /evt EE72 /pid 3836 /mon 508 520 | C:\Users\admin\AppData\Local\Temp\IXP862.TMP\SetupAdmin.exe | — | MsiExec.exe | |||||||||||
User: admin Company: Apple Inc. Integrity Level: HIGH Description: Apple Installer (Elevated) Exit code: 0 Version: 12.4.3.1 Modules
| |||||||||||||||
| 1484 | C:\Windows\system32\DllHost.exe /Processid:{16D99191-6280-4B33-A2F5-04805A0FC582} | C:\Windows\system32\DllHost.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2144 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2176 | "C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe" | C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe | services.exe | ||||||||||||
User: SYSTEM Company: Apple Inc. Integrity Level: SYSTEM Description: MobileDeviceService Exit code: 0 Version: 17.364.0.84 Modules
| |||||||||||||||
| 2272 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x6f5d00b0,0x6f5d00c0,0x6f5d00cc | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: HIGH Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 Modules
| |||||||||||||||
| 2292 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=984,242606157672125368,8062065844879851193,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=3E83EAAEDEC81D171ADD113DBC06E89C --mojo-platform-channel-handle=2408 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 Modules
| |||||||||||||||
| 2340 | DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{2cdb5113-94ed-0a86-c333-167e4f8e7f3e}\usbaapl.inf" "0" "64270aeef" "000003D4" "WinSta0\Default" "000003E0" "208" "C:\Program Files\Common Files\Apple\Mobile Device Support\Drivers" | C:\Windows\system32\DrvInst.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2392 | C:\Windows\system32\MsiExec.exe -Embedding C056968ED007B25B012B29473C38D9EB M Global\MSI0000 | C:\Windows\system32\MsiExec.exe | — | msiexec.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2412 | "C:\Users\admin\Downloads\Baixaki_iTunes.exe" | C:\Users\admin\Downloads\Baixaki_iTunes.exe | Baixaki_iTunes_0391992614.exe | ||||||||||||
User: admin Company: Apple Inc. Integrity Level: HIGH Description: iTunes Installer Exit code: 0 Version: 12.4.3.1 Modules
| |||||||||||||||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2812) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2844-13195951575681000 |
Value: 259 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 3516-13180984670829101 |
Value: 0 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 2844-13195951575681000 |
Value: 259 | |||
| (PID) Process: | (2844) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\0ee052eb-c6f4-450e-a905-552ccf560be2.tmp | — | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\03fbd698-3853-4ab0-9c01-38025a8466aa.tmp | — | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version | text | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\0a09d1c4-262f-469e-97dd-b503de7cbd9d.tmp | — | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF199a52.TMP | text | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Thumbnails\LOG.old~RF199b3c.TMP | text | |
MD5:— | SHA256:— | |||
| 2844 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2844 | chrome.exe | GET | 200 | 13.32.177.64:80 | http://dgza5b0tpp642.cloudfront.net/hyfi6~2lqg98g/Baixaki_iTunes.exe | US | executable | 2.20 Mb | malicious |
3700 | Baixaki_iTunes_0391992614.exe | GET | 200 | 199.115.112.67:80 | http://img.tesehari-tet.com/img/Tavasat/15Feb17/v2/EN.png | US | image | 43.9 Kb | malicious |
3700 | Baixaki_iTunes_0391992614.exe | POST | 200 | 54.194.149.175:80 | http://www3.tesehari-tet.com/ | IE | — | — | malicious |
3700 | Baixaki_iTunes_0391992614.exe | POST | 200 | 54.194.149.175:80 | http://www3.tesehari-tet.com/ | IE | — | — | malicious |
3700 | Baixaki_iTunes_0391992614.exe | POST | 200 | 54.194.149.175:80 | http://www3.tesehari-tet.com/ | IE | — | — | malicious |
2844 | chrome.exe | GET | 200 | 151.80.204.60:80 | http://img.ibxk.com.br/bxk_v12/bxklogo.png | FR | image | 4.69 Kb | suspicious |
3700 | Baixaki_iTunes_0391992614.exe | POST | 200 | 54.194.149.175:80 | http://www3.tesehari-tet.com/ | IE | — | — | malicious |
3700 | Baixaki_iTunes_0391992614.exe | POST | 200 | 34.241.59.126:80 | http://server.tesehari-tet.com/ | IE | binary | 361 Kb | malicious |
3700 | Baixaki_iTunes_0391992614.exe | POST | 200 | 18.203.190.76:80 | http://www2.tesehari-tet.com/?yes=0 | US | text | 1.59 Kb | malicious |
2844 | chrome.exe | GET | 301 | 151.80.204.60:80 | http://www.minhaserie.com.br/images/highlights/000/048/940/thumb_46185-t222x111.jpg | FR | html | 178 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2844 | chrome.exe | 172.217.18.99:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
2844 | chrome.exe | 13.32.177.64:80 | dgza5b0tpp642.cloudfront.net | Amazon.com, Inc. | US | suspicious |
2844 | chrome.exe | 216.58.205.237:443 | accounts.google.com | Google Inc. | US | whitelisted |
2844 | chrome.exe | 216.58.205.227:443 | www.gstatic.com | Google Inc. | US | whitelisted |
2844 | chrome.exe | 216.58.205.238:443 | sb-ssl.google.com | Google Inc. | US | whitelisted |
3700 | Baixaki_iTunes_0391992614.exe | 18.203.190.76:80 | www2.tesehari-tet.com | — | US | malicious |
2844 | chrome.exe | 172.217.22.99:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
3700 | Baixaki_iTunes_0391992614.exe | 34.241.59.126:80 | server.tesehari-tet.com | Amazon.com, Inc. | IE | malicious |
3700 | Baixaki_iTunes_0391992614.exe | 54.194.149.175:80 | www3.tesehari-tet.com | Amazon.com, Inc. | IE | malicious |
3700 | Baixaki_iTunes_0391992614.exe | 151.80.204.60:443 | img.ibxk.com.br | OVH SAS | FR | unknown |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
dgza5b0tpp642.cloudfront.net |
| malicious |
www.gstatic.com |
| whitelisted |
accounts.google.com |
| shared |
sb-ssl.google.com |
| whitelisted |
ssl.gstatic.com |
| whitelisted |
www3.tesehari-tet.com |
| malicious |
www2.tesehari-tet.com |
| malicious |
server.tesehari-tet.com |
| malicious |
img.ibxk.com.br |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
2844 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2844 | chrome.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3700 | Baixaki_iTunes_0391992614.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2 |
3700 | Baixaki_iTunes_0391992614.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1 |
3700 | Baixaki_iTunes_0391992614.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3 |
3700 | Baixaki_iTunes_0391992614.exe | Misc activity | ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4 |
Process | Message |
|---|---|
AppleMobileDeviceService.exe | ASL checking for logging parameters in environment variable "AppleMobileDeviceService.exe.log"
|
AppleMobileDeviceService.exe | ASL checking for logging parameters in environment variable "asl.log"
|