analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://pro.pz0.3dn.ie.sogou.com/sogou_explorer_8.5.7.30293_0000.exe

Full analysis: https://app.any.run/tasks/6a65da60-f8b3-4d1c-98ef-353868eebbb3
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 22, 2019, 01:54:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
sogou
loader
Indicators:
MD5:

204112FAB1EA1AFFED58E8D8F2A137F8

SHA1:

81ECF921F54555A09918F0CC471C254A6CF27B90

SHA256:

FB3A8AC010EA8E09682750CC27E6A050F69883B112C0B049B94BC25E5FFE3BA5

SSDEEP:

3:N1KOXA43NUKKNetKXebM/VL4An:COXA43NUK1bUL4An

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 1848)
      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
      • SogouExplorer.exe (PID: 3956)
      • SESecurityCenter.exe (PID: 3960)
      • SESecurityCenter.exe (PID: 896)
      • SCMainFrame.exe (PID: 2408)
      • SogouExplorer.exe (PID: 1956)
      • SogouExplorer.exe (PID: 3740)
      • SogouExplorer.exe (PID: 2540)
      • SogouExplorer.exe (PID: 2996)
      • SogouExplorer.exe (PID: 1576)
      • SogouExplorer.exe (PID: 2912)
      • SogouExplorer.exe (PID: 2312)
      • SogouExplorer.exe (PID: 3124)
      • SogouExplorer.exe (PID: 3604)
      • SogouExplorerUp.exe (PID: 604)
      • SogouExplorer.exe (PID: 696)
    • Downloads executable files from the Internet

      • chrome.exe (PID: 3540)
      • SogouExplorerUp.exe (PID: 604)
    • Loads dropped or rewritten executable

      • SogouExplorer.exe (PID: 3956)
      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
      • SESecurityCenter.exe (PID: 896)
      • SogouExplorer.exe (PID: 1956)
      • SogouExplorer.exe (PID: 2540)
      • SogouExplorer.exe (PID: 1576)
      • SogouExplorer.exe (PID: 3740)
      • SogouExplorer.exe (PID: 2996)
      • SogouExplorer.exe (PID: 696)
      • SogouExplorer.exe (PID: 3604)
      • SogouExplorer.exe (PID: 3124)
      • SogouExplorer.exe (PID: 2912)
      • SogouExplorer.exe (PID: 2312)
      • SogouExplorerUp.exe (PID: 604)
    • Changes settings of System certificates

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
  • SUSPICIOUS

    • Creates files in the user directory

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 1848)
      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
      • SogouExplorer.exe (PID: 2996)
      • SogouExplorerUp.exe (PID: 604)
      • SogouExplorer.exe (PID: 696)
      • SogouExplorer.exe (PID: 1956)
    • Application launched itself

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 1848)
      • SogouExplorer.exe (PID: 1956)
      • SogouExplorer.exe (PID: 2996)
    • Creates a software uninstall entry

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
    • Executable content was dropped or overwritten

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
      • chrome.exe (PID: 1980)
      • SogouExplorer.exe (PID: 1956)
      • SogouExplorerUp.exe (PID: 604)
    • Modifies the open verb of a shell class

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
      • SogouExplorer.exe (PID: 3956)
      • SogouExplorer.exe (PID: 1956)
    • Creates files in the program directory

      • SESecurityCenter.exe (PID: 896)
    • Creates or modifies windows services

      • SESecurityCenter.exe (PID: 3960)
      • SESecurityCenter.exe (PID: 896)
    • Creates files in the Windows directory

      • SESecurityCenter.exe (PID: 896)
    • Adds / modifies Windows certificates

      • sogou_explorer_8.5.7.30293_0000.exe (PID: 688)
    • Removes files from Windows directory

      • SESecurityCenter.exe (PID: 896)
    • Connects to unusual port

      • SogouExplorer.exe (PID: 1956)
    • Low-level read access rights to disk partition

      • SogouExplorer.exe (PID: 696)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 1980)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3540)
      • SogouExplorer.exe (PID: 2996)
    • Dropped object may contain Bitcoin addresses

      • SogouExplorer.exe (PID: 1956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
28
Malicious processes
14
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sogou_explorer_8.5.7.30293_0000.exe sogou_explorer_8.5.7.30293_0000.exe chrome.exe no specs sogouexplorer.exe no specs chrome.exe no specs sesecuritycenter.exe no specs sesecuritycenter.exe scmainframe.exe no specs sogouexplorer.exe no specs sogouexplorer.exe sogouexplorer.exe no specs sogouexplorer.exe sogouexplorer.exe sogouexplorer.exe no specs sogouexplorer.exe no specs sogouexplorer.exe no specs sogouexplorer.exe sogouexplorerup.exe sogouexplorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1980"C:\Program Files\Google\Chrome\Application\chrome.exe" http://pro.pz0.3dn.ie.sogou.com/sogou_explorer_8.5.7.30293_0000.exeC:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
73.0.3683.75
888"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=73.0.3683.75 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6f700f18,0x6f700f28,0x6f700f34C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
73.0.3683.75
1940"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=128 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
73.0.3683.75
2972"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=912,1896986431677722932,8391010336390516234,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=197129593697026374 --mojo-platform-channel-handle=1000 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
73.0.3683.75
3540"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=912,1896986431677722932,8391010336390516234,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=17511907933671878153 --mojo-platform-channel-handle=1536 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
73.0.3683.75
1568"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=912,1896986431677722932,8391010336390516234,131072 --enable-features=PasswordImport --service-pipe-token=8286075029720755352 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8286075029720755352 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
73.0.3683.75
3752"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=912,1896986431677722932,8391010336390516234,131072 --enable-features=PasswordImport --service-pipe-token=13023954533611201428 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13023954533611201428 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
73.0.3683.75
2264"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=912,1896986431677722932,8391010336390516234,131072 --enable-features=PasswordImport --service-pipe-token=3854841921466674446 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3854841921466674446 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
2516"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=912,1896986431677722932,8391010336390516234,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=14704346511797464439 --mojo-platform-channel-handle=2784 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
1848"C:\Users\admin\Downloads\sogou_explorer_8.5.7.30293_0000.exe" C:\Users\admin\Downloads\sogou_explorer_8.5.7.30293_0000.exe
chrome.exe
User:
admin
Company:
Sogou.com
Integrity Level:
MEDIUM
Description:
搜狗高速浏览器安装程序
Version:
8.5.7.30293
Total events
5 020
Read events
4 013
Write events
0
Delete events
0

Modification events

No data
Executable files
40
Suspicious files
91
Text files
799
Unknown types
19

Dropped files

PID
Process
Filename
Type
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\b8af5947-1d5a-46a3-93ce-80bddb1b50a0.tmp
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000018.dbtmp
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0
MD5:
SHA256:
1980chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
85
TCP/UDP connections
112
DNS requests
69
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1848
sogou_explorer_8.5.7.30293_0000.exe
GET
200
49.51.130.237:80
http://config.ie.sogou.com/checkinstall.php?v=8.5.7.30293&request=2
CN
malicious
688
sogou_explorer_8.5.7.30293_0000.exe
GET
200
49.51.130.237:80
http://config.ie.sogou.com/checkinstall.php?v=8.5.7.30293&request=2
CN
malicious
688
sogou_explorer_8.5.7.30293_0000.exe
POST
211.159.235.178:80
http://security.ie.sogou.com/q
CN
malicious
1848
sogou_explorer_8.5.7.30293_0000.exe
POST
211.159.235.178:80
http://security.ie.sogou.com/q
CN
malicious
3740
SogouExplorer.exe
POST
211.159.235.117:80
http://get.sogou.com/q
CN
malicious
2996
SogouExplorer.exe
GET
200
49.51.130.237:80
http://ie.sogou.com/features8/style/index.css
CN
text
1.90 Kb
malicious
688
sogou_explorer_8.5.7.30293_0000.exe
POST
211.159.235.178:80
http://security.ie.sogou.com/q
CN
malicious
1848
sogou_explorer_8.5.7.30293_0000.exe
POST
211.159.235.178:80
http://security.ie.sogou.com/q
CN
malicious
896
SESecurityCenter.exe
POST
211.159.235.117:80
http://get.sogou.com/q
CN
malicious
2996
SogouExplorer.exe
POST
211.159.235.143:80
http://get.sogou.com/q
CN
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3540
chrome.exe
172.217.16.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2996
SogouExplorer.exe
118.191.216.42:443
123.sogo.com
CN
malicious
896
SESecurityCenter.exe
211.159.235.117:80
security.ie.sogou.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
2996
SogouExplorer.exe
49.51.130.237:80
config.ie.sogou.com
Tencent Building, Kejizhongyi Avenue
CN
malicious
1848
sogou_explorer_8.5.7.30293_0000.exe
211.159.235.178:80
security.ie.sogou.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1848
sogou_explorer_8.5.7.30293_0000.exe
49.51.130.237:80
config.ie.sogou.com
Tencent Building, Kejizhongyi Avenue
CN
malicious
688
sogou_explorer_8.5.7.30293_0000.exe
211.159.235.178:80
security.ie.sogou.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
688
sogou_explorer_8.5.7.30293_0000.exe
49.51.130.237:80
config.ie.sogou.com
Tencent Building, Kejizhongyi Avenue
CN
malicious
3540
chrome.exe
216.58.205.227:443
www.gstatic.com
Google Inc.
US
whitelisted
3740
SogouExplorer.exe
211.159.235.117:80
security.ie.sogou.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.16.195
whitelisted
pro.pz0.3dn.ie.sogou.com
  • 163.171.132.18
malicious
accounts.google.com
  • 172.217.16.141
shared
ssl.gstatic.com
  • 172.217.22.35
whitelisted
sb-ssl.google.com
  • 216.58.205.238
whitelisted
config.ie.sogou.com
  • 49.51.130.237
malicious
security.ie.sogou.com
  • 211.159.235.178
  • 211.159.235.117
  • 211.159.235.143
malicious
www.gstatic.com
  • 216.58.205.227
whitelisted
get.sogou.com
  • 211.159.235.117
  • 211.159.235.178
  • 211.159.235.143
malicious
123.sogo.com
  • 118.191.216.42
  • 118.191.216.57
  • 119.28.109.132
malicious

Threats

PID
Process
Class
Message
3540
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
604
SogouExplorerUp.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
896
SESecurityCenter.exe
Misc activity
ADWARE [PTsecurity] Sogou
3740
SogouExplorer.exe
Misc activity
ADWARE [PTsecurity] Sogou
1956
SogouExplorer.exe
Misc activity
ADWARE [PTsecurity] Sogou
604
SogouExplorerUp.exe
Misc activity
ADWARE [PTsecurity] Sogou
896
SESecurityCenter.exe
Misc activity
ADWARE [PTsecurity] Sogou
1956
SogouExplorer.exe
Misc activity
ADWARE [PTsecurity] Sogou
604
SogouExplorerUp.exe
Misc activity
ADWARE [PTsecurity] Sogou
896
SESecurityCenter.exe
Misc activity
ADWARE [PTsecurity] Sogou
2 ETPRO signatures available at the full report
Process
Message
sogou_explorer_8.5.7.30293_0000.exe
lotus:: starttime is 366, filetime is 1319769 --- 1064484
sogou_explorer_8.5.7.30293_0000.exe
lotus:: starttime is 366, filetime is 1319769 --- 1066859
SogouExplorer.exe
Create New Tab from outside:
SogouExplorer.exe
VerQueryValue