URL:

https://chomikuj.pl/ChomikBox

Full analysis: https://app.any.run/tasks/ba14fd7b-7c6c-44e9-8c63-ba780352130c
Verdict: Malicious activity
Analysis date: May 29, 2021, 20:46:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

CAB60CD60748EC0E58F01B487F9C5C9B

SHA1:

7B6AC67D162776D3524FF4B671FE262CB74223E8

SHA256:

D6E0F052E64D3EE45D3D15E62A2669C96BDD565E1CE87A8E36C2627746EECF7B

SSDEEP:

3:N8QEzVJKeMIKd:2QEX7M3d

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • wmiprvse.exe (PID: 1768)
      • ChomikBox.exe (PID: 4024)
      • chomikbox1conf.exe (PID: 2740)
      • ChomikBox.exe (PID: 3928)
    • Application was dropped or rewritten from another process

      • chomikbox1conf.exe (PID: 2740)
      • ChomikBox.exe (PID: 4024)
      • ChomikBox.exe (PID: 3928)
    • Changes the autorun value in the registry

      • ChomikBox.exe (PID: 4024)
    • Application was injected by another process

      • smss.exe (PID: 264)
      • wininit.exe (PID: 384)
      • csrss.exe (PID: 348)
      • csrss.exe (PID: 392)
      • winlogon.exe (PID: 432)
      • services.exe (PID: 476)
      • lsass.exe (PID: 492)
      • svchost.exe (PID: 604)
      • lsm.exe (PID: 500)
      • svchost.exe (PID: 684)
      • svchost.exe (PID: 772)
      • svchost.exe (PID: 844)
      • svchost.exe (PID: 816)
      • spoolsv.exe (PID: 1208)
      • taskeng.exe (PID: 1996)
      • svchost.exe (PID: 1064)
      • svchost.exe (PID: 880)
      • IMEDICTUPDATE.EXE (PID: 1376)
      • srvpost.exe (PID: 1452)
      • dwm.exe (PID: 120)
      • ctfmon.exe (PID: 668)
      • explorer.exe (PID: 292)
      • svchost.exe (PID: 1792)
      • SearchIndexer.exe (PID: 1348)
      • SearchProtocolHost.exe (PID: 3608)
      • SearchProtocolHost.exe (PID: 2024)
      • TrustedInstaller.exe (PID: 3152)
      • svchost.exe (PID: 2476)
      • svchost.exe (PID: 1236)
      • host.exe (PID: 3824)
    • Runs injected code in another process

      • wmiprvse.exe (PID: 1768)
  • SUSPICIOUS

    • Creates files in the user directory

      • lsass.exe (PID: 492)
      • msiexec.exe (PID: 2768)
    • Starts Microsoft Installer

      • chrome.exe (PID: 3980)
    • Drops a file with a compile date too recent

      • chrome.exe (PID: 3980)
    • Executed as Windows Service

      • vssvc.exe (PID: 4044)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 2768)
    • Creates files in the program directory

      • SearchIndexer.exe (PID: 1348)
    • Creates files in the Windows directory

      • TrustedInstaller.exe (PID: 3152)
      • msiexec.exe (PID: 2768)
    • Drops a file that was compiled in debug mode

      • msiexec.exe (PID: 2768)
    • Changes default file association

      • msiexec.exe (PID: 2768)
    • Removes files from Windows directory

      • TrustedInstaller.exe (PID: 3152)
      • msiexec.exe (PID: 2768)
    • Loads DLL from Mozilla Firefox

      • csrss.exe (PID: 392)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 2768)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2768)
      • ChomikBox.exe (PID: 4024)
    • Starts Internet Explorer

      • ChomikBox.exe (PID: 4024)
    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3052)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 3980)
      • iexplore.exe (PID: 2744)
      • iexplore.exe (PID: 2992)
    • Reads the hosts file

      • chrome.exe (PID: 3980)
      • chrome.exe (PID: 2896)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 4044)
    • Searches for installed software

      • msiexec.exe (PID: 2768)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2768)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2768)
    • Loads dropped or rewritten executable

      • msiexec.exe (PID: 2768)
    • Creates files in the program directory

      • msiexec.exe (PID: 2768)
    • Creates files in the user directory

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 2204)
      • iexplore.exe (PID: 2744)
      • iexplore.exe (PID: 2992)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3052)
    • Changes internet zones settings

      • iexplore.exe (PID: 2744)
      • iexplore.exe (PID: 2992)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2204)
      • iexplore.exe (PID: 3932)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2204)
      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 2992)
      • iexplore.exe (PID: 2744)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2744)
      • iexplore.exe (PID: 2992)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2744)
      • iexplore.exe (PID: 2992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
56
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start inject inject inject inject inject inject chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msiexec.exe no specs msiexec.exe vssvc.exe no specs chrome.exe no specs cmd.exe no specs wmiprvse.exe no specs chomikbox1conf.exe no specs chomikbox.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs smss.exe csrss.exe wininit.exe csrss.exe winlogon.exe services.exe lsass.exe lsm.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe spoolsv.exe svchost.exe imedictupdate.exe srvpost.exe svchost.exe taskeng.exe dwm.exe explorer.exe ctfmon.exe searchindexer.exe searchprotocolhost.exe host.exe svchost.exe trustedinstaller.exe searchprotocolhost.exe searchfilterhost.exe no specs chomikbox.exe no specs searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Windows\system32\Dwm.exe"C:\Windows\System32\dwm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Desktop Window Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\uxtheme.dll
264\SystemRoot\System32\smss.exeC:\Windows\System32\smss.exe
System
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Session Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\systemroot\system32\smss.exe
c:\windows\system32\ntdll.dll
292C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
348%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
384wininit.exeC:\Windows\System32\wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Start-Up Application
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wininit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
392%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16C:\Windows\System32\csrss.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Client Server Runtime Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\csrsrv.dll
c:\windows\system32\basesrv.dll
c:\windows\system32\winsrv.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
432winlogon.exeC:\Windows\System32\winlogon.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Logon Application
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\winlogon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winsta.dll
476C:\Windows\system32\services.exeC:\Windows\System32\services.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Services and Controller app
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\services.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
492C:\Windows\system32\lsass.exeC:\Windows\System32\lsass.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Local Security Authority Process
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\lsass.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspisrv.dll
c:\windows\system32\lsasrv.dll
c:\windows\system32\sechost.dll
c:\windows\system32\sspicli.dll
500C:\Windows\system32\lsm.exeC:\Windows\System32\lsm.exe
wininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Local Session Manager Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\lsm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sysntfy.dll
c:\windows\system32\wmsgapi.dll
c:\windows\system32\cryptbase.dll
Total events
8 414
Read events
7 363
Write events
1 021
Delete events
30

Modification events

(PID) Process:(292) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3980) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(3980) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
114
Suspicious files
151
Text files
154
Unknown types
55

Dropped files

PID
Process
Filename
Type
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60B2A84D-F8C.pma
MD5:
SHA256:
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\2a855d69-d360-4067-bcc4-b0730153a07d.tmp
MD5:
SHA256:
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
844svchost.exeC:\Windows\ServiceProfiles\LocalService\AppData\Local\~FontCache-S-1-5-21-1302019708-1500728564-335382590-1000.dat
MD5:
SHA256:
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
492lsass.exeC:\Users\admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-1302019708-1500728564-335382590-1000\7c67258e-d3bc-491c-9f56-375cd369015cbinary
MD5:
SHA256:
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF183534.TMPtext
MD5:
SHA256:
3980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RF1835e0.TMPtext
MD5:
SHA256:
492lsass.exeC:\Users\admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-1302019708-1500728564-335382590-1000\Preferredbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
118
TCP/UDP connections
120
DNS requests
55
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4024
ChomikBox.exe
GET
200
95.211.227.131:80
http://download.box.chomikuj.pl/updates/2.0.8.2/win32/packages.xml
NL
xml
10.1 Kb
suspicious
4024
ChomikBox.exe
GET
200
95.211.227.131:80
http://download.box.chomikuj.pl/updates/2.0.8.2/win32/installeru.exe.gz
NL
compressed
55.4 Kb
suspicious
4024
ChomikBox.exe
GET
301
95.211.227.131:80
http://download.box.chomikuj.pl/updates/win32/packages.xml
NL
html
189 b
suspicious
4024
ChomikBox.exe
GET
200
95.211.227.131:80
http://download.box.chomikuj.pl/updates/2.0.8.2/win32/chomikbox1conf.exe.gz
NL
compressed
153 Kb
suspicious
3932
iexplore.exe
GET
301
172.67.42.83:80
http://www.chomikuj.pl/Create.aspx
US
html
153 b
suspicious
3932
iexplore.exe
GET
301
104.22.25.70:80
http://chomikuj.pl/Create.aspx
US
html
168 b
whitelisted
4024
ChomikBox.exe
GET
200
95.211.227.131:80
http://download.box.chomikuj.pl/updates/2.0.8.2/win32/configurator.exe.gz
NL
compressed
102 Kb
suspicious
4024
ChomikBox.exe
POST
200
104.22.25.70:80
http://box.chomikuj.pl/services/ChomikBoxService.svc
US
text
249 b
suspicious
4024
ChomikBox.exe
POST
200
104.22.25.70:80
http://box.chomikuj.pl/services/ChomikBoxService.svc
US
text
249 b
suspicious
4024
ChomikBox.exe
POST
200
104.22.25.70:80
http://box.chomikuj.pl/services/ChomikBoxService.svc
US
text
249 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2896
chrome.exe
172.67.42.83:443
chomikuj.pl
US
suspicious
2896
chrome.exe
142.250.184.205:443
accounts.google.com
Google Inc.
US
whitelisted
2896
chrome.exe
172.67.160.221:443
x4.static-chomikuj.pl
US
unknown
2896
chrome.exe
216.58.212.132:443
www.google.com
Google Inc.
US
whitelisted
2896
chrome.exe
142.250.185.174:443
apis.google.com
Google Inc.
US
whitelisted
2896
chrome.exe
64.233.167.156:443
stats.g.doubleclick.net
Google Inc.
US
whitelisted
2896
chrome.exe
142.250.186.131:443
www.gstatic.com
Google Inc.
US
whitelisted
2896
chrome.exe
142.250.185.110:443
clients1.google.com
Google Inc.
US
whitelisted
2896
chrome.exe
217.74.71.132:443
js.iplsc.com
INTERIA.PL Sp z.o.o.
PL
suspicious
2896
chrome.exe
142.250.184.238:443
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
chomikuj.pl
  • 172.67.42.83
  • 104.22.24.70
  • 104.22.25.70
whitelisted
accounts.google.com
  • 142.250.184.205
shared
x4.static-chomikuj.pl
  • 172.67.160.221
  • 104.21.89.144
malicious
www.google.com
  • 216.58.212.132
malicious
apis.google.com
  • 142.250.185.174
whitelisted
stats.g.doubleclick.net
  • 64.233.167.156
  • 64.233.167.154
  • 64.233.167.155
  • 64.233.167.157
whitelisted
www.gstatic.com
  • 142.250.186.131
whitelisted
x2.static-chomikuj.pl
  • 172.67.160.221
  • 104.21.89.144
malicious
x1.static-chomikuj.pl
  • 104.21.89.144
  • 172.67.160.221
malicious
x3.static-chomikuj.pl
  • 104.21.89.144
  • 172.67.160.221
malicious

Threats

Found threats are available for the paid subscriptions
16 ETPRO signatures available at the full report
No debug info