analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://mega.nz/#F!PuAEmSBa!hqd_9d2bk3SkCnbxQszdUg

Full analysis: https://app.any.run/tasks/bd7d9dd6-ac5e-4710-952f-191aa72a2f17
Verdict: Malicious activity
Analysis date: June 18, 2019, 19:00:42
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

1BE99757F6D3E71BA4F71020C1A1A886

SHA1:

2FE1CC231BF9124382B721CEA7B79B71DCC9F732

SHA256:

FA7293FB946FEA9A51C5C788DCC52A6DF433AE454A59AD960BCAFDF541DF311E

SSDEEP:

3:N8X/iG4vkcMcBXHo/BwC:29bcDXMB3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Roblox Automation.exe (PID: 3632)
      • close.exe (PID: 3496)
    • Loads dropped or rewritten executable

      • Roblox Automation.exe (PID: 3632)
      • SearchProtocolHost.exe (PID: 4012)
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 3328)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 3328)
      • WinRAR.exe (PID: 2452)
    • Creates files in the user directory

      • close.exe (PID: 3496)
    • Reads Environment values

      • close.exe (PID: 3496)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3328)
    • Reads Internet Cache Settings

      • firefox.exe (PID: 3328)
    • Reads settings of System Certificates

      • firefox.exe (PID: 3328)
    • Reads CPU info

      • firefox.exe (PID: 3328)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 3328)
    • Manual execution by user

      • Roblox Automation.exe (PID: 3632)
      • close.exe (PID: 3496)
    • Creates files in the user directory

      • firefox.exe (PID: 3328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe winrar.exe close.exe roblox automation.exe searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3328"C:\Program Files\Mozilla Firefox\firefox.exe" https://mega.nz/#F!PuAEmSBa!hqd_9d2bk3SkCnbxQszdUgC:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
3424"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3328.0.1491389032\1622747598" -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - "C:\Users\admin\AppData\LocalLow\Mozilla\Temp-{ce348e4c-7d33-445e-89f9-60108c51bcaf}" 3328 "\\.\pipe\gecko-crash-server-pipe.3328" 1136 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
1864"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3328.6.1995306759\233697120" -childID 1 -isForBrowser -prefsHandle 1292 -prefMapHandle 1584 -prefsLen 1 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3328 "\\.\pipe\gecko-crash-server-pipe.3328" 1704 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
1732"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3328.13.2065260777\1516410196" -childID 2 -isForBrowser -prefsHandle 2548 -prefMapHandle 2552 -prefsLen 216 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3328 "\\.\pipe\gecko-crash-server-pipe.3328" 2580 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
1652"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3328.20.558155923\702816013" -childID 3 -isForBrowser -prefsHandle 3376 -prefMapHandle 3388 -prefsLen 5824 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3328 "\\.\pipe\gecko-crash-server-pipe.3328" 3400 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
2452"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Auto Restart.zip"C:\Program Files\WinRAR\WinRAR.exe
firefox.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3496"C:\Users\admin\Desktop\Auto Restart\close.exe" C:\Users\admin\Desktop\Auto Restart\close.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
4.0.0.0
3632"C:\Users\admin\Desktop\Auto Restart\Roblox Automation.exe" C:\Users\admin\Desktop\Auto Restart\Roblox Automation.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Roblox_Automation
Version:
1.0.0.0
4012"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Total events
1 978
Read events
1 893
Write events
0
Delete events
0

Modification events

No data
Executable files
14
Suspicious files
193
Text files
66
Unknown types
102

Dropped files

PID
Process
Filename
Type
3328firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3328firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\trash23050
MD5:
SHA256:
3328firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3328firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3328firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
3328firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:6C32CB3FD01869207E7AAE8B28598F29
SHA256:4F8ECF8007F6CC603991256AACF38224ADBA7D0A16685706072D1AADC0604303
3328firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\base-track-digest256.sbstorebinary
MD5:23E438FD4AF1829D4469FF8D0BC83854
SHA256:96E0D7644AEA81D26F039AE633EB405583E11B020363090DAC5CAD9B4B188846
3328firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\except-flash-digest256.sbstorebinary
MD5:C921D8E98FA01B4F303481E112202E92
SHA256:4EF1038730EC8BC7206713C29A936768831B922C5E6C83355FD62D7401D8C1DC
3328firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\allow-flashallow-digest256.psetcdxl
MD5:076933FF9904D1110D896E2C525E39E5
SHA256:4CBBD8CA5215B8D161AEC181A74B694F4E24B001D5B081DC0030ED797A8973E0
3328firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
119
DNS requests
468
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3328
firefox.exe
GET
104.86.111.161:80
http://detectportal.firefox.com/success.txt
NL
whitelisted
3328
firefox.exe
GET
104.86.111.161:80
http://detectportal.firefox.com/success.txt
NL
whitelisted
3328
firefox.exe
GET
104.86.111.161:80
http://detectportal.firefox.com/success.txt
NL
whitelisted
3328
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3328
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3328
firefox.exe
POST
200
216.58.213.163:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
3328
firefox.exe
POST
200
151.139.128.14:80
http://ocsp.comodoca.com/
US
der
471 b
whitelisted
3328
firefox.exe
POST
200
92.122.122.139:80
http://ocsp.int-x3.letsencrypt.org/
unknown
der
527 b
whitelisted
3328
firefox.exe
POST
200
216.58.213.163:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
3328
firefox.exe
POST
200
216.58.213.163:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3328
firefox.exe
31.216.148.10:443
mega.nz
Datacenter Luxembourg S.A.
LU
unknown
3328
firefox.exe
35.244.181.201:443
aus5.mozilla.org
US
suspicious
3328
firefox.exe
92.122.122.139:80
ocsp.int-x3.letsencrypt.org
Akamai International B.V.
whitelisted
3328
firefox.exe
34.210.151.118:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
3328
firefox.exe
34.215.70.240:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3328
firefox.exe
104.86.111.161:80
detectportal.firefox.com
Akamai International B.V.
NL
whitelisted
3328
firefox.exe
151.139.128.14:80
ocsp.comodoca.com
Highwinds Network Group, Inc.
US
suspicious
3328
firefox.exe
89.44.169.134:443
eu.static.mega.co.nz
Datacenter Luxembourg S.A.
LU
suspicious
3328
firefox.exe
52.85.254.139:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
unknown
3328
firefox.exe
52.85.255.194:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
mega.nz
  • 31.216.148.10
whitelisted
detectportal.firefox.com
  • 104.86.111.161
  • 104.86.110.209
whitelisted
aus5.mozilla.org
  • 35.244.181.201
whitelisted
ocsp.int-x3.letsencrypt.org
  • 92.122.122.139
whitelisted
search.services.mozilla.com
  • 34.215.70.240
whitelisted
tiles.services.mozilla.com
  • 34.210.151.118
whitelisted
snippets.cdn.mozilla.net
  • 52.85.254.139
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
safebrowsing.googleapis.com
  • 216.58.215.42
whitelisted
ocsp.pki.goog
  • 216.58.213.163
whitelisted

Threats

PID
Process
Class
Message
3496
close.exe
Misc activity
APP [PTsecurity] SmartAssembly
3496
close.exe
Misc activity
APP [PTsecurity] SmartAssembly
3496
close.exe
Misc activity
APP [PTsecurity] SmartAssembly
3 ETPRO signatures available at the full report
Process
Message
Roblox Automation.exe
Native library pre-loader is trying to load native SQLite library "C:\Users\admin\Desktop\Auto Restart\x86\SQLite.Interop.dll"...