download:

PotPlayerSetup.exe

Full analysis: https://app.any.run/tasks/a62a438b-0413-4173-8110-5251face9ff5
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 31, 2019, 07:40:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
pup
installcore
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

1A056B7D1D99378F9778BDBBFC06CFCD

SHA1:

4CB126D9B3DC65C070671836964D493F5C728935

SHA256:

060AF4D4C7E271C8614F24BEA8B7B8D4763E100055A54245954D71B6C3089640

SSDEEP:

393216:a28Z2LeoobfPM94gvR8tfeAE3UTu7CzyzI+xDf8HKLY24BulBatPt05YlQrRX59d:ajwyvT3Dx834z6D0H1l6BatV0IQvLEK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • PotPlayerSetup.exe (PID: 956)
      • PotPlayerSetup.exe (PID: 3848)
    • INSTALLCORE was detected

      • PotPlayerSetup.exe (PID: 3848)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • PotPlayerSetup.exe (PID: 956)
      • PotPlayerSetup.exe (PID: 3848)
    • Reads the machine GUID from the registry

      • PotPlayerSetup.exe (PID: 3848)
    • Application launched itself

      • PotPlayerSetup.exe (PID: 956)
    • Reads internet explorer settings

      • PotPlayerSetup.exe (PID: 3848)
    • Creates files in the program directory

      • PotPlayerSetup.exe (PID: 3848)
    • Reads CPU info

      • PotPlayerSetup.exe (PID: 3848)
    • Reads Windows Product ID

      • PotPlayerSetup.exe (PID: 3848)
    • Reads Environment values

      • PotPlayerSetup.exe (PID: 3848)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:08:01 02:33:59+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 25600
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3489
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.7.19955.0
ProductVersionNumber: 1.7.19955.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: PotPlayer Setup File (2019-07-31 오후 1:34:58)
CompanyName: Kakao
FileDescription: PotPlayer Setup File
FileVersion: v1.7.19955
LegalCopyright: ⓒ Kakao Corp. All rights reserved.
ProductName: PotPlayer

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 01-Aug-2017 00:33:59
Detected languages:
  • English - United States
Comments: PotPlayer Setup File (2019-07-31 오후 1:34:58)
CompanyName: Kakao
FileDescription: PotPlayer Setup File
FileVersion: v1.7.19955
LegalCopyright: ⓒ Kakao Corp. All rights reserved.
ProductName: PotPlayer

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 01-Aug-2017 00:33:59
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000063D1
0x00006400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.47945
.rdata
0x00008000
0x0000138E
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.14383
.data
0x0000A000
0x00020358
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.00074
.ndata
0x0002B000
0x0003C000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00067000
0x000297F8
0x00029800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.21393

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.29826
1061
UNKNOWN
English - United States
RT_MANIFEST
2
3.37729
38056
UNKNOWN
English - United States
RT_ICON
3
3.533
16936
UNKNOWN
English - United States
RT_ICON
4
7.92627
11257
UNKNOWN
English - United States
RT_ICON
5
3.95387
9640
UNKNOWN
English - United States
RT_ICON
6
3.73313
5512
UNKNOWN
English - United States
RT_ICON
7
4.10521
2440
UNKNOWN
English - United States
RT_ICON
8
4.39138
1128
UNKNOWN
English - United States
RT_ICON
102
2.71813
180
UNKNOWN
English - United States
RT_DIALOG
103
3.06414
118
UNKNOWN
English - United States
RT_GROUP_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start potplayersetup.exe #INSTALLCORE potplayersetup.exe

Process information

PID
CMD
Path
Indicators
Parent process
956"C:\Users\admin\AppData\Local\Temp\PotPlayerSetup.exe" C:\Users\admin\AppData\Local\Temp\PotPlayerSetup.exe
explorer.exe
User:
admin
Company:
Kakao
Integrity Level:
MEDIUM
Description:
PotPlayer Setup File
Exit code:
0
Version:
v1.7.19955
Modules
Images
c:\users\admin\appdata\local\temp\potplayersetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3848"C:\Users\admin\AppData\Local\Temp\PotPlayerSetup.exe" /UAC:7019E /NCRC C:\Users\admin\AppData\Local\Temp\PotPlayerSetup.exe
PotPlayerSetup.exe
User:
admin
Company:
Kakao
Integrity Level:
HIGH
Description:
PotPlayer Setup File
Exit code:
0
Version:
v1.7.19955
Modules
Images
c:\users\admin\appdata\local\temp\potplayersetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
Total events
781
Read events
753
Write events
28
Delete events
0

Modification events

(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3848) PotPlayerSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PotPlayerSetup_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
8
Suspicious files
0
Text files
80
Unknown types
0

Dropped files

PID
Process
Filename
Type
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\00114246.log
MD5:
SHA256:
956PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsf103B.tmp\UAC.dllexecutable
MD5:0BEA21545B130F74AD40160AE8AC05EA
SHA256:3239A185C653B1F2385FBB9716172E116551FC68867E36FFDB96D5D7C8EAEA5B
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsm14B0.tmp\UAC.dllexecutable
MD5:0BEA21545B130F74AD40160AE8AC05EA
SHA256:3239A185C653B1F2385FBB9716172E116551FC68867E36FFDB96D5D7C8EAEA5B
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsm14B0.tmp\hYEBnFBwH.dllexecutable
MD5:
SHA256:
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsd11310785424\css\sdk-ui\button.csstext
MD5:37E1FF96E084EC201F0D95FEEF4D5E94
SHA256:8E806F5B94FC294E918503C8053EF1284E4F4B1E02C7DA4F4635E33EC33E0534
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsd11310785424\css\main.csstext
MD5:9B27E2A266FE15A3AABFE635C29E8923
SHA256:166AA42BC5216C5791388847AE114EC0671A0D97B9952D14F29419B8BE3FB23F
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsm14B0.tmp\advsplash.dllexecutable
MD5:EC4E08A6EF93404B08A4A62CABFFF0A9
SHA256:4BEE4C9D5FFE126A7DAF7EE7DC6DC4C77FE4CF7334132D4D63352EC01A2A37FD
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsd11310785424\css\sdk-ui\checkbox.csstext
MD5:64773C6B0E3413C81AEBC46CCE8C9318
SHA256:B09504C1BF0486D3EC46500592B178A3A6C39284672AF8815C3687CC3D29560D
3848PotPlayerSetup.exeC:\spltmp.bmpimage
MD5:D4EE30123118DB940A32A53AC885160B
SHA256:588AFC91C651687C80EC5CDB8201881EA01212E2B4C898EC679EA2F4835C1F5B
3848PotPlayerSetup.exeC:\Users\admin\AppData\Local\Temp\nsm14B0.tmp\LangDLL.dllexecutable
MD5:30B091668111AB1D6C19F16586A9EEE5
SHA256:331CA4B3A311324B463167EC43851146E57A2D90500AC3FD57A7683F6B777FFB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
6
DNS requests
5
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3848
PotPlayerSetup.exe
GET
200
54.194.149.175:80
http://cloud.posofett-hod.com/
IE
malicious
3848
PotPlayerSetup.exe
POST
200
54.194.149.175:80
http://cloud.posofett-hod.com/
IE
malicious
3848
PotPlayerSetup.exe
POST
200
52.50.98.206:80
http://ww2.posofett-hod.com/FusionPotplayer/
IE
binary
258 Kb
malicious
3848
PotPlayerSetup.exe
POST
200
54.194.149.175:80
http://cloud.posofett-hod.com/
IE
malicious
3848
PotPlayerSetup.exe
POST
200
54.194.149.175:80
http://cloud.posofett-hod.com/
IE
malicious
3848
PotPlayerSetup.exe
POST
200
54.194.149.175:80
http://cloud.posofett-hod.com/
IE
malicious
3848
PotPlayerSetup.exe
POST
200
54.194.149.175:80
http://cloud.posofett-hod.com/
IE
malicious
3848
PotPlayerSetup.exe
GET
200
85.159.237.103:80
http://img.posofett-hod.com/img/Sibarasawi/logo_comp.png
NL
image
12.4 Kb
malicious
3848
PotPlayerSetup.exe
GET
200
85.159.237.103:80
http://img.posofett-hod.com/img/Sibarasawi/bg_comp.png
NL
image
25.2 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3848
PotPlayerSetup.exe
52.50.98.206:80
ww2.posofett-hod.com
Amazon.com, Inc.
IE
malicious
3848
PotPlayerSetup.exe
54.194.149.175:80
cloud.posofett-hod.com
Amazon.com, Inc.
IE
malicious
3848
PotPlayerSetup.exe
121.53.201.241:443
track.tiara.daum.net
DREAMLINE CO.
KR
unknown
3848
PotPlayerSetup.exe
85.159.237.103:80
img.posofett-hod.com
NForce Entertainment B.V.
NL
malicious

DNS requests

Domain
IP
Reputation
cloud.posofett-hod.com
  • 54.194.149.175
  • 52.214.73.247
malicious
ww2.posofett-hod.com
  • 52.50.98.206
  • 52.212.215.62
  • 52.51.129.59
malicious
track.tiara.daum.net
  • 121.53.201.241
  • 211.231.99.201
whitelisted
img.posofett-hod.com
  • 85.159.237.103
malicious

Threats

PID
Process
Class
Message
3848
PotPlayerSetup.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
3848
PotPlayerSetup.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
3848
PotPlayerSetup.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
3848
PotPlayerSetup.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
No debug info