Overview
overview
8Static
static
3fb71a9372f...18.exe
windows7-x64
8fb71a9372f...18.exe
windows10-2004-x64
8$_2_/Ad.exe
windows7-x64
1$_2_/Ad.exe
windows10-2004-x64
1$_2_/Downl...PS.dll
windows7-x64
1$_2_/Downl...PS.dll
windows10-2004-x64
1$_2_/QQVip...er.exe
windows7-x64
8$_2_/QQVip...er.exe
windows10-2004-x64
8$_2_/TXSSOSetup.exe
windows7-x64
7$_2_/TXSSOSetup.exe
windows10-2004-x64
7$_2_/Tencentdl.exe
windows7-x64
1$_2_/Tencentdl.exe
windows10-2004-x64
1$_2_/bugreport.exe
windows7-x64
1$_2_/bugreport.exe
windows10-2004-x64
$_2_/curllib.dll
windows7-x64
3$_2_/curllib.dll
windows10-2004-x64
3$_2_/dlcore.dll
windows7-x64
1$_2_/dlcore.dll
windows10-2004-x64
1$_2_/extract.dll
windows7-x64
1$_2_/extract.dll
windows10-2004-x64
1$_2_/tinyxml.dll
windows7-x64
3$_2_/tinyxml.dll
windows10-2004-x64
3$_2_/tnproxy.dll
windows7-x64
1$_2_/tnproxy.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
fb71a9372f7195356b87f195e68b534a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb71a9372f7195356b87f195e68b534a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$_2_/Ad.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$_2_/Ad.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$_2_/DownloadProxyPS.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$_2_/DownloadProxyPS.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$_2_/QQVipDownloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$_2_/QQVipDownloader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$_2_/TXSSOSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$_2_/TXSSOSetup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$_2_/Tencentdl.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$_2_/Tencentdl.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$_2_/bugreport.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$_2_/bugreport.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$_2_/curllib.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$_2_/curllib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$_2_/dlcore.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$_2_/dlcore.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$_2_/extract.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$_2_/extract.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$_2_/tinyxml.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$_2_/tinyxml.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
$_2_/tnproxy.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$_2_/tnproxy.dll
Resource
win10v2004-20240412-en
General
-
Target
$_2_/QQVipDownloader.exe
-
Size
1023KB
-
MD5
65dbfaf76be7baf0369e1a202f8499cc
-
SHA1
542dca77ea0f20b91b8ebac80e326686dd507c55
-
SHA256
e997d69e9649210f79167f2a8501196ac2a62a23944b5d0d39b1e9bd7e3b774f
-
SHA512
0880bc2a3182708e3ac620f4028a85eb1683bda96f0246ea5751c9ad20c3ea2c1e9879751b4f57fea0ee16b41347a93be88ef0f87661583971204179b917b608
-
SSDEEP
12288:pDfAIZBLC7KNkg2BirPUTYLzD3zk2U5LZE+KGngCRyEi1QOCXSSY9p8s96+9AUys:pDfAIZBZkg2B4UsKKLEiGi9X0cAUSK6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 1776 netsh.exe 3688 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
QQVipDownloader.exetencentdl.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation QQVipDownloader.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation tencentdl.exe -
Executes dropped EXE 1 IoCs
Processes:
tencentdl.exepid process 1668 tencentdl.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 788 regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
QQVipDownloader.exetencentdl.exetencentdl.exedescription ioc process File opened for modification \??\PhysicalDrive0 QQVipDownloader.exe File opened for modification \??\PhysicalDrive0 tencentdl.exe File opened for modification \??\PhysicalDrive0 tencentdl.exe -
Drops file in Program Files directory 9 IoCs
Processes:
tencentdl.exedescription ioc process File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\dlcore.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\Tencentdl.exe tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\extract.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\tinyxml.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\InstallInfo.xml tencentdl.exe File opened for modification C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\dlcore.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\tnproxy.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\DownloadProxyPS.dll tencentdl.exe File created C:\Program Files (x86)\Common Files\Tencent\QQDownload\127\bugreport_xf.exe tencentdl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
QQVipDownloader.exeregsvr32.exetencentdl.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd QQVipDownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28D341BF-13DD-457E-BAFB-D3FC0C442CA4}\ProxyStubClsid32\ = "{B9E49847-9822-4139-BC55-7173ED1ADA11}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1} tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\LocalServer32\ = "\"C:\\program files (x86)\\common files\\tencent\\qqdownload\\127\\tencentdl.exe\"" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32\ = "{B9E49847-9822-4139-BC55-7173ED1ADA11}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid QQVipDownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader.1\CLSID\ = "{70DE12EA-79F4-46bc-9812-86DB50A2FD64}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\ = "DownloadProxy 1.0 Type Library" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\FLAGS\ = "0" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ = "IDownloader" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\FLAGS tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\Version = "1.0" tencentdl.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\WOW6432Node\Interface regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\ProxyStubClsid32\ = "{B9E49847-9822-4139-BC55-7173ED1ADA11}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E} tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B9E49847-9822-4139-BC55-7173ED1ADA11}\ = "IDownloader_3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\HELPDIR\ tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ProxyStubClsid32 tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28D341BF-13DD-457E-BAFB-D3FC0C442CA4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\0 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\0\win32\ = "C:\\program files (x86)\\common files\\tencent\\qqdownload\\127\\tencentdl.exe" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ = "_IDownloaderEvents" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\NumMethods\ = "15" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\Programmable tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28D341BF-13DD-457E-BAFB-D3FC0C442CA4}\NumMethods regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 8471bc81a2aedf4ea87ca65d678c86b3 QQVipDownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\ = "Downloader Class" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\Version = "1.0" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\ProxyStubClsid32\ = "{B9E49847-9822-4139-BC55-7173ED1ADA11}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\ProgID tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader\CurVer\ = "DownloadProxy.Downloader.1" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\NumMethods\ = "6" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA} tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader.1 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DownloadProxy.EXE\AppID = "{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E} tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\InProcServer32\ = "C:\\program files (x86)\\common files\\tencent\\qqdownload\\127\\DownloadProxyPS.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DownloadProxy.Downloader\CLSID tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0 tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}\ = "DownloadProxy" tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\TypeLib tencentdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70DE12EA-79F4-46bc-9812-86DB50A2FD64}\VersionIndependentProgID\ = "DownloadProxy.Downloader" tencentdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9E49847-9822-4139-BC55-7173ED1ADA11}\ = "PSFactoryBuffer" regsvr32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
QQVipDownloader.exepid process 3028 QQVipDownloader.exe 3028 QQVipDownloader.exe 3028 QQVipDownloader.exe 3028 QQVipDownloader.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
QQVipDownloader.exepid process 3028 QQVipDownloader.exe 3028 QQVipDownloader.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
QQVipDownloader.exepid process 3028 QQVipDownloader.exe 3028 QQVipDownloader.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
QQVipDownloader.exetencentdl.exetencentdl.exedescription pid process target process PID 3028 wrote to memory of 4844 3028 QQVipDownloader.exe tencentdl.exe PID 3028 wrote to memory of 4844 3028 QQVipDownloader.exe tencentdl.exe PID 3028 wrote to memory of 4844 3028 QQVipDownloader.exe tencentdl.exe PID 4844 wrote to memory of 1668 4844 tencentdl.exe tencentdl.exe PID 4844 wrote to memory of 1668 4844 tencentdl.exe tencentdl.exe PID 4844 wrote to memory of 1668 4844 tencentdl.exe tencentdl.exe PID 1668 wrote to memory of 1776 1668 tencentdl.exe netsh.exe PID 1668 wrote to memory of 1776 1668 tencentdl.exe netsh.exe PID 1668 wrote to memory of 1776 1668 tencentdl.exe netsh.exe PID 1668 wrote to memory of 3688 1668 tencentdl.exe netsh.exe PID 1668 wrote to memory of 3688 1668 tencentdl.exe netsh.exe PID 1668 wrote to memory of 3688 1668 tencentdl.exe netsh.exe PID 1668 wrote to memory of 788 1668 tencentdl.exe regsvr32.exe PID 1668 wrote to memory of 788 1668 tencentdl.exe regsvr32.exe PID 1668 wrote to memory of 788 1668 tencentdl.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_2_\QQVipDownloader.exe"C:\Users\Admin\AppData\Local\Temp\$_2_\QQVipDownloader.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\appdata\local\temp\$_2_\tencentdl.exe"C:\Users\Admin\appdata\local\temp\$_2_\tencentdl.exe" /install2⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe"C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" /RegServer3⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="腾讯产品下载组件" dir=in program="C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" description="C:\program files (x86)\common files\tencent\qqdownload\127\tencentdl.exe" action=allow4⤵
- Modifies Windows Firewall
PID:1776
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="腾讯产品下载组件Crash上报" dir=in program="C:\program files (x86)\common files\tencent\qqdownload\127\bugreport_xf.exe" description="C:\program files (x86)\common files\tencent\qqdownload\127\bugreport_xf.exe" action=allow4⤵
- Modifies Windows Firewall
PID:3688
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\program files (x86)\common files\tencent\qqdownload\127\DownloadProxyPS.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50d095aab24635aa9377fafd8e86910a2
SHA1f0909168847b010080e14e3188582696a8019ca3
SHA256eb733c9b6bbe17ebd2bdc01b2409852a361d0e0d63683eba228de6af1a139592
SHA51230da0f3b996928bd2ab02956be1737617b4d453fe251186f70fd958bafdcac35f2f63a8dc10a150dba4a0df68a7e1ac3876bdaf90774d6e571cbf4c1cf7496ca
-
Filesize
915KB
MD57e8dfc56349967d134ccdc9de4cd772f
SHA180f9636e5f2b7509d50e3e865b5c0d921348fff0
SHA256fcaf44a74ec98e9780ddded45729dab1dc292c3a1bfed1c1a7ce56f1fed9b604
SHA512b25fa86519cc23157f253ab816e8f8dfab54c5eddb72ec2092ece5b33767131f2ebdb4c791a2e28688c3bbbddc0db1e34d046f309592f95bf4665f5f12617010
-
Filesize
67KB
MD59c629978377e3edc8d0b001115f93eec
SHA1c563aad2e04b0e69b3ceeb722f7f7e85dd3cb410
SHA2561ce25ffc0d8671f5c44573ec190533860cc3bec823d2dcfaf4548a0bd76add50
SHA51234cb1eafd31385094bc0f2f03da80fb94662a7a966dff7f9be974b5e850e2c588e82546edfaf244b7f20046fd63421495b7a429d50184d074b83208d86dcd619
-
Filesize
1.9MB
MD50ed92ed82d4d1b22fe231c177b45eac5
SHA1d858a692e6c0a364137c4d0190816809b8c37f7f
SHA256ad1425b8497cf8b5891adbd51371c3ceb0f977e6e417b6c3f3262e6b6f01e2fc
SHA5128d7d60e84314ba2b5b1a9248e6ddf1f2723844ebde1953343ee5f825f1d3e30a5a9a504d028c9311f9aa82c17929c4927769b7ae6df986003b2c1aaef0be3aa1
-
Filesize
358KB
MD59da51d4506bd094fbfc7d337338fc872
SHA11b5799ef6b66ac9471842f17570813e7c42cdb27
SHA256f2181e41d5950fcb762edf6b9cbb665e94004a7f1102b606c331690e6069a501
SHA51207dfae7c04ea2815ed78af9e29313050338bfec5a8e08a8846c0f846d6d27b79b7bfe2c3b4dbf3758aa22f88342aadf5513dcbcd6a718b9dd939996d6ce9e044
-
Filesize
707KB
MD53bad47f1e11387358ba090fbc2682713
SHA1e7e7843d3fd4f45fdb65ff40936bc28a10651589
SHA25626c906e83d280f03e021a5730908cc40551f8ef98e048b9ae001354ec83ae736
SHA512c00f7079746cc0ab961680ca784cac036ad60c2883e032fea9d8ac4791579f5cb952a341efb0068a38f81ab84c6dc870ddd8ae5ddb66d17a812a80fc8e1486eb