Overview
overview
8Static
static
3fb71a9372f...18.exe
windows7-x64
8fb71a9372f...18.exe
windows10-2004-x64
8$_2_/Ad.exe
windows7-x64
1$_2_/Ad.exe
windows10-2004-x64
1$_2_/Downl...PS.dll
windows7-x64
1$_2_/Downl...PS.dll
windows10-2004-x64
1$_2_/QQVip...er.exe
windows7-x64
8$_2_/QQVip...er.exe
windows10-2004-x64
8$_2_/TXSSOSetup.exe
windows7-x64
7$_2_/TXSSOSetup.exe
windows10-2004-x64
7$_2_/Tencentdl.exe
windows7-x64
1$_2_/Tencentdl.exe
windows10-2004-x64
1$_2_/bugreport.exe
windows7-x64
1$_2_/bugreport.exe
windows10-2004-x64
$_2_/curllib.dll
windows7-x64
3$_2_/curllib.dll
windows10-2004-x64
3$_2_/dlcore.dll
windows7-x64
1$_2_/dlcore.dll
windows10-2004-x64
1$_2_/extract.dll
windows7-x64
1$_2_/extract.dll
windows10-2004-x64
1$_2_/tinyxml.dll
windows7-x64
3$_2_/tinyxml.dll
windows10-2004-x64
3$_2_/tnproxy.dll
windows7-x64
1$_2_/tnproxy.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
fb71a9372f7195356b87f195e68b534a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb71a9372f7195356b87f195e68b534a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$_2_/Ad.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$_2_/Ad.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$_2_/DownloadProxyPS.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$_2_/DownloadProxyPS.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$_2_/QQVipDownloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$_2_/QQVipDownloader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$_2_/TXSSOSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$_2_/TXSSOSetup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$_2_/Tencentdl.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$_2_/Tencentdl.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$_2_/bugreport.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$_2_/bugreport.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$_2_/curllib.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$_2_/curllib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$_2_/dlcore.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$_2_/dlcore.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$_2_/extract.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$_2_/extract.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$_2_/tinyxml.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$_2_/tinyxml.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
$_2_/tnproxy.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$_2_/tnproxy.dll
Resource
win10v2004-20240412-en
General
-
Target
$_2_/QQVipDownloader.exe
-
Size
1023KB
-
MD5
65dbfaf76be7baf0369e1a202f8499cc
-
SHA1
542dca77ea0f20b91b8ebac80e326686dd507c55
-
SHA256
e997d69e9649210f79167f2a8501196ac2a62a23944b5d0d39b1e9bd7e3b774f
-
SHA512
0880bc2a3182708e3ac620f4028a85eb1683bda96f0246ea5751c9ad20c3ea2c1e9879751b4f57fea0ee16b41347a93be88ef0f87661583971204179b917b608
-
SSDEEP
12288:pDfAIZBLC7KNkg2BirPUTYLzD3zk2U5LZE+KGngCRyEi1QOCXSSY9p8s96+9AUys:pDfAIZBZkg2B4UsKKLEiGi9X0cAUSK6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2652 netsh.exe 2640 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
tencentdl.exetencentdl.exepid process 2500 tencentdl.exe 2416 tencentdl.exe -
Loads dropped DLL 18 IoCs
Processes:
tencentdl.exeregsvr32.exetencentdl.exetencentdl.exeQQVipDownloader.exepid process 2228 tencentdl.exe 2724 regsvr32.exe 2500 tencentdl.exe 2500 tencentdl.exe 2500 tencentdl.exe 2500 tencentdl.exe 2500 tencentdl.exe 2500 tencentdl.exe 2500 tencentdl.exe 2500 tencentdl.exe 2416 tencentdl.exe 2416 tencentdl.exe 2416 tencentdl.exe 2416 tencentdl.exe 1612 QQVipDownloader.exe 1612 QQVipDownloader.exe 1612 QQVipDownloader.exe 2416 tencentdl.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
tencentdl.exetencentdl.exeQQVipDownloader.exetencentdl.exedescription ioc process File opened for modification \??\PhysicalDrive0 tencentdl.exe File opened for modification \??\PhysicalDrive0 tencentdl.exe File opened for modification \??\PhysicalDrive0 QQVipDownloader.exe File opened for modification \??\PhysicalDrive0 tencentdl.exe -
Drops file in Program Files directory 9 IoCs
Processes:
tencentdl.exedescription ioc process File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\dlcore.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\Tencentdl.exe tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\DownloadProxyPS.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\tinyxml.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\bugreport_xf.exe tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\InstallInfo.xml tencentdl.exe File opened for modification C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\dlcore.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\tnproxy.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\extract.dll tencentdl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
tencentdl.exeregsvr32.exeQQVipDownloader.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0 tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\NumMethods\ = "6" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1} tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader\CLSID tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ = "IDownloader" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader\CurVer tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\VersionIndependentProgID tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\Version = "1.0" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\ = "IDownloader_2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ = "IDownloader" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\InProcServer32\ = "C:\\program files (x86)\\common files\\tencent\\qqdownload\\127\\DownloadProxyPS.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32\ = "{B9E49847-9822-4139-BC55-7173ED1ADA11}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DownloadProxy.EXE\AppID = "{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader.1 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\LocalServer32\ = "\"C:\\program files (x86)\\common files\\tencent\\qqdownload\\127\\tencentdl.exe\"" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\ = "DownloadProxy 1.0 Type Library" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA} tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader.1\ = "Downloader Class" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\ProgID\ = "DownloadProxy.Downloader.1" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\AppID = "{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\TypeLib tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{28D341BF-13DD-457E-BAFB-D3FC0C442CA4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}\ = "DownloadProxy" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\ProgID tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\NumMethods\ = "4" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\Version = "1.0" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\Version = "1.0" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\Programmable tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DownloadProxy.EXE tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32 tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\VersionIndependentProgID\ = "DownloadProxy.Downloader" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{28D341BF-13DD-457E-BAFB-D3FC0C442CA4}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\ = "IDownloader_3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd QQVipDownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader\ = "Downloader Class" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\0\win32 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ = "_IDownloaderEvents" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\LocalServer32 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ = "IDownloader" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{28D341BF-13DD-457E-BAFB-D3FC0C442CA4}\ = "IDownloader_4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\FLAGS tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid QQVipDownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ProxyStubClsid32 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\FLAGS\ = "0" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\ProxyStubClsid32\ = "{B9E49847-9822-4139-BC55-7173ED1ADA11}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
QQVipDownloader.exetencentdl.exepid process 1612 QQVipDownloader.exe 1612 QQVipDownloader.exe 1612 QQVipDownloader.exe 2416 tencentdl.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
QQVipDownloader.exepid process 1612 QQVipDownloader.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
QQVipDownloader.exepid process 1612 QQVipDownloader.exe 1612 QQVipDownloader.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
QQVipDownloader.exetencentdl.exetencentdl.exedescription pid process target process PID 1612 wrote to memory of 2228 1612 QQVipDownloader.exe tencentdl.exe PID 1612 wrote to memory of 2228 1612 QQVipDownloader.exe tencentdl.exe PID 1612 wrote to memory of 2228 1612 QQVipDownloader.exe tencentdl.exe PID 1612 wrote to memory of 2228 1612 QQVipDownloader.exe tencentdl.exe PID 2228 wrote to memory of 2500 2228 tencentdl.exe tencentdl.exe PID 2228 wrote to memory of 2500 2228 tencentdl.exe tencentdl.exe PID 2228 wrote to memory of 2500 2228 tencentdl.exe tencentdl.exe PID 2228 wrote to memory of 2500 2228 tencentdl.exe tencentdl.exe PID 2500 wrote to memory of 2640 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2640 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2640 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2640 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2652 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2652 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2652 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2652 2500 tencentdl.exe netsh.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe PID 2500 wrote to memory of 2724 2500 tencentdl.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_2_\QQVipDownloader.exe"C:\Users\Admin\AppData\Local\Temp\$_2_\QQVipDownloader.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\appdata\local\temp\$_2_\tencentdl.exe"C:\Users\Admin\appdata\local\temp\$_2_\tencentdl.exe" /install2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe"C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" /RegServer3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="腾讯产品下载组件" dir=in program="C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" description="C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" action=allow4⤵
- Modifies Windows Firewall
PID:2640 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="腾讯产品下载组件Crash上报" dir=in program="C:\program files (x86)\common files\tencent\qqdownload\127\bugreport_xf.exe" description="C:\program files (x86)\common files\tencent\qqdownload\127\bugreport_xf.exe" action=allow4⤵
- Modifies Windows Firewall
PID:2652 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\program files (x86)\common files\tencent\qqdownload\127\DownloadProxyPS.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:2724
-
C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe"C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\InstallInfo.xmlFilesize
1KB
MD568deb2a7669c8a17da384ca980b360a9
SHA1c0c46ffb5f5a21d384fb03ca5e6c44a4cf0307dc
SHA256fb32f89eda8ab7303629f1c13fbe055b57e9fe2a9fde4694b1447ed081606e57
SHA512d8e49fd250a7c721cc6a91af5df89446e9625f9228dea12ec303bc3d6bda3f2870aca58021c275c24bdcba9b2c91745f21bdf540df02f28c2db872c799239732
-
C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exeFilesize
915KB
MD57e8dfc56349967d134ccdc9de4cd772f
SHA180f9636e5f2b7509d50e3e865b5c0d921348fff0
SHA256fcaf44a74ec98e9780ddded45729dab1dc292c3a1bfed1c1a7ce56f1fed9b604
SHA512b25fa86519cc23157f253ab816e8f8dfab54c5eddb72ec2092ece5b33767131f2ebdb4c791a2e28688c3bbbddc0db1e34d046f309592f95bf4665f5f12617010
-
\??\c:\program files (x86)\common files\tencent\qqdownload\127\dlcore.dllFilesize
1.9MB
MD50ed92ed82d4d1b22fe231c177b45eac5
SHA1d858a692e6c0a364137c4d0190816809b8c37f7f
SHA256ad1425b8497cf8b5891adbd51371c3ceb0f977e6e417b6c3f3262e6b6f01e2fc
SHA5128d7d60e84314ba2b5b1a9248e6ddf1f2723844ebde1953343ee5f825f1d3e30a5a9a504d028c9311f9aa82c17929c4927769b7ae6df986003b2c1aaef0be3aa1
-
\Program Files (x86)\Common Files\Tencent\QQDownload\127\DownloadProxyPS.dllFilesize
67KB
MD59c629978377e3edc8d0b001115f93eec
SHA1c563aad2e04b0e69b3ceeb722f7f7e85dd3cb410
SHA2561ce25ffc0d8671f5c44573ec190533860cc3bec823d2dcfaf4548a0bd76add50
SHA51234cb1eafd31385094bc0f2f03da80fb94662a7a966dff7f9be974b5e850e2c588e82546edfaf244b7f20046fd63421495b7a429d50184d074b83208d86dcd619
-
\Program Files (x86)\Common Files\Tencent\QQDownload\127\extract.dllFilesize
358KB
MD59da51d4506bd094fbfc7d337338fc872
SHA11b5799ef6b66ac9471842f17570813e7c42cdb27
SHA256f2181e41d5950fcb762edf6b9cbb665e94004a7f1102b606c331690e6069a501
SHA51207dfae7c04ea2815ed78af9e29313050338bfec5a8e08a8846c0f846d6d27b79b7bfe2c3b4dbf3758aa22f88342aadf5513dcbcd6a718b9dd939996d6ce9e044
-
\Program Files (x86)\Common Files\Tencent\QQDownload\127\tnproxy.dllFilesize
707KB
MD53bad47f1e11387358ba090fbc2682713
SHA1e7e7843d3fd4f45fdb65ff40936bc28a10651589
SHA25626c906e83d280f03e021a5730908cc40551f8ef98e048b9ae001354ec83ae736
SHA512c00f7079746cc0ab961680ca784cac036ad60c2883e032fea9d8ac4791579f5cb952a341efb0068a38f81ab84c6dc870ddd8ae5ddb66d17a812a80fc8e1486eb
-
memory/1612-37-0x0000000006EB0000-0x0000000006EC0000-memory.dmpFilesize
64KB
-
memory/2416-35-0x0000000000570000-0x0000000000580000-memory.dmpFilesize
64KB
-
memory/2416-30-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2416-41-0x0000000004EA0000-0x0000000004F4F000-memory.dmpFilesize
700KB
-
memory/2416-43-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB