Analysis

  • max time kernel
    62s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 05:47

General

  • Target

    50bab97dd6ce903465751affe72871e43d611c043a5b613b56f0bcea27dd9b45N.exe

  • Size

    1.7MB

  • MD5

    b97b9c985d85051e9371db6ec300f8f0

  • SHA1

    71b3134f886f391872d5181937d7f3eb48193e6f

  • SHA256

    50bab97dd6ce903465751affe72871e43d611c043a5b613b56f0bcea27dd9b45

  • SHA512

    86b145bda83dcd4d3d97e3df8f150d74d908f5b294e502a4806e5ad6cb6e5c093e190e134645cd419dc4abe2dce2462829775a58c7f13163e233d19185d4b606

  • SSDEEP

    49152:s07aDJnVNJi+n1+NGi9AOmVDOki6UbdjU:BeDJnF1oGyuDfi6Ub5U

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 22 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50bab97dd6ce903465751affe72871e43d611c043a5b613b56f0bcea27dd9b45N.exe
    "C:\Users\Admin\AppData\Local\Temp\50bab97dd6ce903465751affe72871e43d611c043a5b613b56f0bcea27dd9b45N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files (x86)\QvodPlayer\kuaibo.exe
      "C:\Program Files (x86)\QvodPlayer\kuaibo.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2860
    • C:\Program Files (x86)\QvodPlayer\qvodupdate.exe
      "C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2940
    • C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe
      "C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Program Files (x86)\tools\BaiduP2PService.exe
        "C:\Program Files (x86)\tools\BaiduP2PService.exe" init
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2516
      • C:\Program Files (x86)\tools\sr.exe
        "C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\
        3⤵
        • Executes dropped EXE
        PID:1932
      • C:\Program Files (x86)\tools\BaiduP2PService.exe
        "C:\Program Files (x86)\tools\BaiduP2PService.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\tools\BaiduP2PService.exe

    Filesize

    508KB

    MD5

    012a8879efa6f8dbc3c6ba58a659fefb

    SHA1

    d2a2dac321ff5a78de52e926044ba362f4004cde

    SHA256

    774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66

    SHA512

    b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba

  • C:\Program Files (x86)\tools\P2PStatReport.dll

    Filesize

    364KB

    MD5

    3b14cae0ea1d045bb5b196017913edb3

    SHA1

    7ca456595148f2d5e71444a612f2351c4cd8a20d

    SHA256

    a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982

    SHA512

    6c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200

  • C:\Program Files (x86)\tools\P2SBase.dll

    Filesize

    512KB

    MD5

    894ab861e608eacbac24280ab234368f

    SHA1

    e283ef8757f04b0252ec5dce22e6e8094bed7737

    SHA256

    687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb

    SHA512

    26a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\快捷导航\打折网购.lnk

    Filesize

    1KB

    MD5

    f2010ecc1b774c9ffa5c2b0319c11ee9

    SHA1

    caccff14e672e30d1202141958854e727ad5b2e2

    SHA256

    f6b938d9679466d4ead32a4f6e2903e8150c0c5128ac8c72efaef75b78af776e

    SHA512

    70a0ccb7342acc8f4c3f8781f1b61590f15273142dc4de758a66f762781e9779a984b60fecfa79a02edc23bd2b5919f0aa4d19587f27e2d4d0d8d4776f824453

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\快捷导航\网址导航.lnk

    Filesize

    1KB

    MD5

    35245b4aeec22f912be45409c1cfc90e

    SHA1

    4e16c9718c07ef9469dd572260076dfc2dae5e4a

    SHA256

    f3e5c5d835322dc436e1762b850a622dd7ef794dbb0691509c4116c94f3d0509

    SHA512

    05258c011ec472c0f54a5d2912086e4dafdc1382035a5b6477fc49b2eefabf67157a98b2172ccb71fca4a3c7a28a81c729172ac91827c17f8efc1fb4dcb78a08

  • C:\ProgramData\tools\ie10.ico

    Filesize

    66KB

    MD5

    0dd21d0a21f47a54bdd4a8344c870839

    SHA1

    f714a9e6062697ffe3bec31690f44579f2809b69

    SHA256

    053eaa1b94f5d4ecdc740a338987580feef9d9fa6e994a9e9f17a0dac55612f7

    SHA512

    9734cb39ae46ece49663ed63359521d5c327885c2de320419b0d2472dbeb6158e4f4c40d047d404c5f2643be6fd1eba3c9b02d6e1ede44e76b9daf0e70f9cb68

  • C:\ProgramData\tools\ie6.ico

    Filesize

    17KB

    MD5

    bf69cff7e66a3aa109dda84eb0232813

    SHA1

    a5d83c6a2a3adc896a1eba23cd2db139e580d713

    SHA256

    1c4494e1b1b52d5c9ef5142f084f950cd986159f9652277c496b48ef19d927c4

    SHA512

    2a842f34dd57854523cc597851bcf4c094653e02ffc8d80228ab1e52742c12c26c19a9137685f202cb93a5c54838c985a814d29c0f9466fb616067bb273ef39a

  • C:\ProgramData\tools\ie8.ico

    Filesize

    17KB

    MD5

    c3e81d293ff596acd5596573c5bc0d92

    SHA1

    24f7eb541cf59abea6352b53a0b26392f9956017

    SHA256

    56a625bd2b7aee97368e92154c25da550dad3067b4c2f7f934cba21f40fa5f96

    SHA512

    e9b150e46493825ffa9aae71fe98579fc04e517398cb97bb473c98544b49022a0851928c95c9f2114bf40b6e113165b5bae5184a08fb18850550ee0af7515ea6

  • C:\ProgramData\tools\sougou_search.ico

    Filesize

    17KB

    MD5

    d9f97bbefebd7f6680a5cd7e428e7c6e

    SHA1

    b8f27fd1cecd21a0d893cd6c4d2900fcf5e657a9

    SHA256

    bb445582d1ea6728c3ef6836d0523b3d36b36f3ebc1206cdfcde1ef92493f506

    SHA512

    5808b085bdb028dae82434b255a0b1da3391409942899ecd4a7a01734e617f5e11a28d56e01d82aace80e5e37f395f43113cc8e96b532726388818f3c41d7f5d

  • C:\Users\Admin\AppData\LocalLow\Baidu\BaiduPlayer\P2PCfg.ini

    Filesize

    189B

    MD5

    0d935e600c6d165b87171f8af7ff75fc

    SHA1

    e65c9b2c6cf9045c6d2593912909fe39abc22309

    SHA256

    56212dcd4b80224698f0db1b106a726d1339a47a383694552b748046d860a6e4

    SHA512

    9ddae6a11b1019008ce94435e29e4ef48a128b8e313b133d77bbce1969275ea8f1f78fe10f09fce99ccaf9ea084ace8584010d8c8af1de8f12d9a40bb94ead2d

  • C:\Users\Admin\AppData\Local\Temp\nsj62AA.tmp\nsTools.dll

    Filesize

    260KB

    MD5

    6ae9eaa868bcb42ae79bf9701b18e7ec

    SHA1

    80bd26a403aaee21fc2b9af0d5585a768ea3acd0

    SHA256

    d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5

    SHA512

    06c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688

  • C:\Users\Admin\AppData\Local\Temp\nsu3A15.tmp\nsTools.dll

    Filesize

    262KB

    MD5

    69fcb9ae215b1397ae1f9751da7016d0

    SHA1

    da3816591f15fcdae48910fb632ee5d2f8c09d4d

    SHA256

    ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342

    SHA512

    f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer (2).lnk

    Filesize

    1KB

    MD5

    61100c4c188e3674a4efb6c0bed60fef

    SHA1

    883491717ec6eb6f9ae80d66381c0805d6ff7282

    SHA256

    94495921942ee671a68e7f37643625abd231a63d2accfffa81d1797b0e9e0580

    SHA512

    65f7553660ab7a58bf0524363808ad53954c460bb1a4fd220e4a805861c0d8410623d2a968d9ffcf59225c68934ac621bd550ff196f7812f6b60ab777f1eed62

  • C:\Users\Admin\Desktop\Intrenet. Expleror.lnk

    Filesize

    932B

    MD5

    955d6e6846ac2c83f56b782c3119e4ef

    SHA1

    d94cd314797e4a9aa74d1e5d0a294c1491b7169a

    SHA256

    38629b4bfdb9d133bdbf9caa786b1c5bce147fc27117bb08c90dbd288127f388

    SHA512

    24d5b7c43df3090976ab24aff0e8bc8d88648467b9bc7b4ae9990625a103f8986df5b253f6df2cd7cb971bc490c12dd2dfaba1516848d65fd6271c9d7112cb36

  • \Program Files (x86)\QvodPlayer\kuaibo.exe

    Filesize

    408KB

    MD5

    d8b7c3af2f63db6cc542273e192b1d02

    SHA1

    34b9d8be2c314ae099b3f825b801a78b608dec26

    SHA256

    6d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9

    SHA512

    4b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b

  • \Program Files (x86)\QvodPlayer\qvodkunbang.exe

    Filesize

    737KB

    MD5

    1009304614108cc969ca448183c54c03

    SHA1

    7df4d9658542c11e40dc390e4dba49554b1084d0

    SHA256

    c5e0e2aad81ed8920984572ea30110c1d341d5a0628213607d396d741526b26f

    SHA512

    05c24315a05f8dae782f33b0b70235dba50f7ee607a3e3f23e2174745db892971843cb62916124983db43ef80268e6558098126f636768ef1edda8dc892c1e5f

  • \Program Files (x86)\QvodPlayer\qvodupdate.exe

    Filesize

    304KB

    MD5

    73af65d9136e0a6294d33a1cd720fa1f

    SHA1

    12c88a51134e18ad5799638055b82afa26fbbd79

    SHA256

    c0741f8592d2d07421423a70036b2978fc2d00158cd2837f2f5de267c2c942f7

    SHA512

    3a636aa3dd08fa2250f2cd1aed5bdda0c17e7b1b6c96df045c1fdfc21a9164e545bfe5a2742e46ff4070e9347aa0722d6bad3fff606e08a3901eceabc5514e2a

  • \Program Files (x86)\QvodPlayer\tools.exe

    Filesize

    88KB

    MD5

    a1b9f2a3c74ef973879dba488ce9ce1a

    SHA1

    4dff7bf406bf681e2d7f81ecec349628f722053c

    SHA256

    c0a1b86c1f39897b5308ba876f5631bc55751bde494161f7a0c87c1454bdaea8

    SHA512

    dc7a5c8e7703e6b40fab370c4a99be0b7a65e870d23e6f3cde007fbffaa4de5294108fad534af0dd281f647a27337b00ba823b7ae0b3944b50798a82b3679e6a

  • \Program Files (x86)\tools\P2PBase.dll

    Filesize

    496KB

    MD5

    a86a90ba120c455ac0e3655f146d5a0f

    SHA1

    277c55191fbbadf888626df4fba279591632a406

    SHA256

    577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43

    SHA512

    a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47

  • \Program Files (x86)\tools\sr.exe

    Filesize

    154KB

    MD5

    83bcf3ad82ce65d2bd0fdd364fe32cb5

    SHA1

    32c5080bbf51dd22bed7f594a92f753a25eef73c

    SHA256

    5635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d

    SHA512

    852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81

  • \Users\Admin\AppData\Local\Temp\nsj62AA.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • \Users\Admin\AppData\Local\Temp\nsu3A15.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • memory/1372-232-0x0000000000490000-0x00000000004ED000-memory.dmp

    Filesize

    372KB

  • memory/1372-235-0x00000000004F0000-0x0000000000574000-memory.dmp

    Filesize

    528KB

  • memory/2072-201-0x0000000001F10000-0x0000000001F58000-memory.dmp

    Filesize

    288KB

  • memory/2380-129-0x00000000024D0000-0x0000000002518000-memory.dmp

    Filesize

    288KB

  • memory/2380-29-0x00000000023D0000-0x0000000002486000-memory.dmp

    Filesize

    728KB

  • memory/2380-0-0x0000000000400000-0x0000000000534000-memory.dmp

    Filesize

    1.2MB

  • memory/2380-23-0x00000000023D0000-0x0000000002486000-memory.dmp

    Filesize

    728KB

  • memory/2380-28-0x0000000000400000-0x0000000000534000-memory.dmp

    Filesize

    1.2MB

  • memory/2380-24-0x00000000023D0000-0x0000000002486000-memory.dmp

    Filesize

    728KB

  • memory/2380-185-0x0000000000400000-0x0000000000534000-memory.dmp

    Filesize

    1.2MB

  • memory/2516-213-0x0000000000230000-0x000000000028D000-memory.dmp

    Filesize

    372KB

  • memory/2516-217-0x0000000000290000-0x0000000000314000-memory.dmp

    Filesize

    528KB

  • memory/2860-26-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/2860-62-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/2860-31-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/2860-27-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2860-256-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB