Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2025, 02:39

General

  • Target

    $PROGRAMFILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll

  • Size

    2.4MB

  • MD5

    e9e1884c564283e30e3f856d1f9f8f80

  • SHA1

    6200823787f1a1c6acb2b687e620dcc26eb1f3f0

  • SHA256

    4b2a125d3d19ca691e4ef46dda0b290a6d3cdbd58e35728148fa43da8ef52f0c

  • SHA512

    a0fadb771e3c8a26ae81d790ce07642981232f205af5576e4bbbb0ca29993f0f98b64a1f51868ebf58a7d6bb4ad491821525d299b5ba2c81c8a3ceb1a5745c3e

  • SSDEEP

    49152:R4OPX6ZEGjOO7dL/GwcD01BsAigR/fYTULeh0soClqYktY:R4O/6WGjOO71Gr0TsAiZ0tCl5n

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Baidu\Toolbar\BaiduBarX_Tmp\BaiduBarX.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Baidu\Toolbar\BaiduBarX_Tmp\BaiduBarX.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Program Files (x86)\Baidu\Toolbar\BaiduSetupAx_3.exe
        "C:\Program Files (x86)\Baidu\Toolbar\BaiduSetupAx_3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Baidu\Toolbar\BaiduBarX.dll

    Filesize

    2.4MB

    MD5

    e9e1884c564283e30e3f856d1f9f8f80

    SHA1

    6200823787f1a1c6acb2b687e620dcc26eb1f3f0

    SHA256

    4b2a125d3d19ca691e4ef46dda0b290a6d3cdbd58e35728148fa43da8ef52f0c

    SHA512

    a0fadb771e3c8a26ae81d790ce07642981232f205af5576e4bbbb0ca29993f0f98b64a1f51868ebf58a7d6bb4ad491821525d299b5ba2c81c8a3ceb1a5745c3e

  • C:\Program Files (x86)\Baidu\Toolbar\BaiduSetupAx_3.exe

    Filesize

    342KB

    MD5

    cbc974c12b052b0c5c9dfe7633a2617b

    SHA1

    6df8d5392455627efec8ac56ba047eede022a48b

    SHA256

    45fca64a1025e24dc9ee4c25806411e94a0a951bd037fc39e8b8d0c0c51911a5

    SHA512

    ffcda7b5193b5a101cfe75eb33d1954e4c579f0969fa257163ea4b02d4708e04e98af9dfb16c50c32e6f41e1e79e9bdd5e6adfa9872722c4e3f35852c413bd64

  • C:\Users\Admin\AppData\Local\Temp\nsz9E55.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • C:\Windows\Downloaded Program Files\240623187\BaiduSetupAx_3.dll

    Filesize

    644KB

    MD5

    cdfa842044f18f77ec20318d1271dcab

    SHA1

    c2a9d6c8abfebbf8019a28eafc0ab6c81a8de44a

    SHA256

    59cb9ee31a4bd348b9aed8d5a55e17544380e499de8ed4e863e9920fcff3c95a

    SHA512

    f8ca1088063365d8d9e6d2e709d835777df863827dd70b857c46117ff9fa29181ab7e9565c33bf3d4297464ecf75b0eab46c5fe3373d95c2d5874c4d4bfe0e0c

  • memory/392-4-0x00000000030F0000-0x0000000003369000-memory.dmp

    Filesize

    2.5MB