analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://siph0n.in/exploits.php?id=4235

Full analysis: https://app.any.run/tasks/14c27abe-f6e8-4859-9e10-8837205956b1
Verdict: Malicious activity
Analysis date: August 09, 2020, 04:30:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

5CEBD6EA30456AEAC2C8EB68D853E7E1

SHA1:

A94542E8B4410BAE7EB8991CA71B60B52FDBCBA0

SHA256:

E51704B108A7A6686FC8B9AA402F0F74BF7929E987AB3618F9EF7F6B3F7C814F

SSDEEP:

3:N1KNMVH/M+YJX+5eGQ:CedM+kXUQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2496)
      • chrome.exe (PID: 2176)
    • Application launched itself

      • chrome.exe (PID: 2496)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
15
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2496"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://siph0n.in/exploits.php?id=4235"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3800"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6e94a9d0,0x6e94a9e0,0x6e94a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
556"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2664 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1700"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6301831881114318980 --mojo-platform-channel-handle=1064 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2176"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=5716806363847330839 --mojo-platform-channel-handle=1568 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3344"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8432927506949570258 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
1492"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6624329080093204425 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2824"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17797835373619428615 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2592"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3791768269891296707 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
948"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1032,14424959649147783894,3472916770643863466,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=16332118761793441421 --mojo-platform-channel-handle=3596 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
675
Read events
579
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
17
Text files
59
Unknown types
1

Dropped files

PID
Process
Filename
Type
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\3095be32-df37-4d57-a8bc-7d5fe8cda29b.tmp
MD5:
SHA256:
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFdc525.TMPtext
MD5:988975E56D776333B46F1BCAE6967C0E
SHA256:22186F0422A02BE70860975EF688A895EEA653C3A7259FFBA9114138A544E05A
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:988975E56D776333B46F1BCAE6967C0E
SHA256:22186F0422A02BE70860975EF688A895EEA653C3A7259FFBA9114138A544E05A
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:142AFC7F980CB38310D0680F2E8907CF
SHA256:3D5E5DF95E28CF65C77882748077EC52706AF02F8D869E188B6D16F782F82F44
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG.oldtext
MD5:EA44F1E6310B5C7626A071052868C4D9
SHA256:D5C1CE84A81C66B08CA0DB82B3BC981FF89F6A4A785183283FD41878FFD5B491
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RFdc583.TMPtext
MD5:142AFC7F980CB38310D0680F2E8907CF
SHA256:3D5E5DF95E28CF65C77882748077EC52706AF02F8D869E188B6D16F782F82F44
3800chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pmagmc
MD5:B6D81B360A5672D80C27430F39153E2C
SHA256:30E14955EBF1352266DC2FF8067E68104607E750ABB9D3B36582B8AF909FCB58
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000001.dbtmp
MD5:
SHA256:
2496chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.oldtext
MD5:93AD58B08432FE2A935E1CEF40067A30
SHA256:8C0A6636BDB4ACD83D99E0BD78A484710121D5410459F27DEE24A0EB5B2877A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
15
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2176
chrome.exe
GET
200
52.222.136.79:80
http://d1lxhc4jvstzrp.cloudfront.net/themes/assets/style.css
US
text
343 b
shared
2176
chrome.exe
GET
200
52.222.136.79:80
http://d1lxhc4jvstzrp.cloudfront.net/themes/cleanPeppermint_7a82f1f3/style.css
US
text
571 b
shared
2176
chrome.exe
GET
200
52.222.136.79:80
http://d1lxhc4jvstzrp.cloudfront.net/scripts/js3caf.js
US
text
6.17 Kb
shared
2176
chrome.exe
GET
200
185.53.177.51:80
http://siph0n.in/exploits.php?id=4235
DE
html
4.59 Kb
malicious
2176
chrome.exe
POST
201
185.53.177.51:80
http://siph0n.in/ls.php
DE
compressed
20 b
malicious
2176
chrome.exe
GET
200
185.53.177.51:80
http://siph0n.in/track.php?domain=siph0n.in&toggle=browserjs&uid=MTU5Njk0NzQyMS4yMjU3OjhkMDViMTI3YTcyZjMxNTk5YjhmNGFlMWZlYzQ4Yjc1YTkxMGFjOTE2NTQ2YTEyMGM2MTZlN2EyZTEwZDhhOTU6NWYyZjdiZGQzNzE3OA%3D%3D
DE
binary
20 b
malicious
2176
chrome.exe
GET
200
185.53.177.51:80
http://siph0n.in/track.php?domain=siph0n.in&caf=1&toggle=answercheck&answer=yes&uid=MTU5Njk0NzQyMS4yMjU3OjhkMDViMTI3YTcyZjMxNTk5YjhmNGFlMWZlYzQ4Yjc1YTkxMGFjOTE2NTQ2YTEyMGM2MTZlN2EyZTEwZDhhOTU6NWYyZjdiZGQzNzE3OA%3D%3D
DE
binary
20 b
malicious
2176
chrome.exe
GET
200
52.222.136.79:80
http://d1lxhc4jvstzrp.cloudfront.net/themes/cleanPeppermint_7a82f1f3/img/arrows.png
US
image
15.1 Kb
shared
2176
chrome.exe
GET
200
185.53.177.51:80
http://siph0n.in/favicon.ico
DE
compressed
20 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2176
chrome.exe
185.53.177.51:80
siph0n.in
Team Internet AG
DE
malicious
2176
chrome.exe
172.217.20.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2176
chrome.exe
172.217.20.234:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2176
chrome.exe
172.217.20.77:443
accounts.google.com
Google Inc.
US
whitelisted
2176
chrome.exe
52.222.136.79:80
d1lxhc4jvstzrp.cloudfront.net
Amazon.com, Inc.
US
unknown
2176
chrome.exe
172.217.168.196:443
www.google.com
Google Inc.
US
whitelisted
2176
chrome.exe
172.217.23.14:443
clients1.google.com
Google Inc.
US
whitelisted
2176
chrome.exe
216.58.214.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2176
chrome.exe
172.217.23.67:443
www.gstatic.com
Google Inc.
US
whitelisted
2176
chrome.exe
216.58.214.14:443
clients2.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.20.99
whitelisted
siph0n.in
  • 185.53.177.51
malicious
accounts.google.com
  • 172.217.20.77
shared
d1lxhc4jvstzrp.cloudfront.net
  • 52.222.136.79
shared
fonts.googleapis.com
  • 172.217.20.234
whitelisted
www.google.com
  • 172.217.168.196
whitelisted
fonts.gstatic.com
  • 216.58.214.3
whitelisted
www.gstatic.com
  • 172.217.23.67
whitelisted
clients1.google.com
  • 172.217.23.14
whitelisted
clients2.google.com
  • 216.58.214.14
whitelisted

Threats

No threats detected
No debug info