| URL: | http://wdl1.pcfg.cache.wpscdn.com/wpsdl/wpsoffice/onlinesetup/distsrc/200.1023/wpsinst/wps_office_inst.exe |
| Full analysis: | https://app.any.run/tasks/962a5260-bdab-413a-9c54-1f61d6e80118 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | May 06, 2020, 10:17:38 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 8207613BDD85C9D6D342A8E9E5B06A76 |
| SHA1: | 83C42A9DB4AA6F77CAF5D3F74EBE7DF6811E5E7B |
| SHA256: | 1959B9576A21CEC87469141517C0DA557761FA07706168C947224F6E8694419F |
| SSDEEP: | 3:N1KJBaWjNRoTJVGJbWDY7Rq0J8pYM6MyLN:CSWxMVGJn7R9AYM6MyLN |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 312 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe" -Assopdf | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe | setup_urls_default.500.2024.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Module Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 576 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\wps_office_inst.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\wps_office_inst.exe | iexplore.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Setup Exit code: 1 Version: 11,2,0,9283 Modules
| |||||||||||||||
| 740 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2308 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 792 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe" -setlng en_US | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe | setup_urls_default.500.2024.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Module Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 792 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\\office6\wps.exe" Run -User=Admin "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\kvprinter\kvpins.exe" /r | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\wps.exe | — | wpspdf.exe | |||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Writer Exit code: 3 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 988 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe" -createsubmodulelink desktop prometheus | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe | setup_urls_default.500.2024.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Module Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 1172 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe" -regksee -forceperusermode | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe | wps.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Module Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 1328 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /krecentfile /init /From=Qing | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe | — | wps.exe | |||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 1356 | "C:/Users/admin/AppData/Local/Kingsoft/WPS Office/11.2.0.9281/office6/promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-file="C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\debug.log" --log-severity=disable --lang=zh-CN --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --log-file="C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\debug.log" --log-severity=disable --lang=zh-CN --service-request-channel-token=11464309704947046998 --mojo-platform-channel-handle=2276 /prefetch:2 | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\promecefpluginhost.exe | — | wps.exe | |||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: Prome CEF SubProcess Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| 1432 | "C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe" -register | C:\Users\admin\AppData\Local\Kingsoft\WPS Office\11.2.0.9281\office6\ksomisc.exe | setup_urls_default.500.2024.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: WPS Office Module Exit code: 0 Version: 11,2,0,9281 Modules
| |||||||||||||||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 2897633692 | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30811023 | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2308) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 740 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\wps_office_inst[1].exe | — | |
MD5:— | SHA256:— | |||
| 740 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\wps_office_inst.exe.8wza3oi.partial | — | |
MD5:— | SHA256:— | |||
| 2308 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF2A8D9A334DD81810.TMP | — | |
MD5:— | SHA256:— | |||
| 2308 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\wps_office_inst.exe.8wza3oi.partial:Zone.Identifier | — | |
MD5:— | SHA256:— | |||
| 2308 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\CabF52C.tmp | — | |
MD5:— | SHA256:— | |||
| 2308 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\TarF52D.tmp | — | |
MD5:— | SHA256:— | |||
| 2308 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\YAAGMRW5.txt | — | |
MD5:— | SHA256:— | |||
| 2308 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\0297WR9L.txt | — | |
MD5:— | SHA256:— | |||
| 3420 | wps_office_inst.exe | C:\Users\admin\AppData\Roaming\konlinesetup\down\0ADD5B26944BD25CAA703FEA55F10A29\setup_urls_default.500.2024.exe | — | |
MD5:— | SHA256:— | |||
| 1860 | setup_urls_default.500.2024.exe | C:\Users\admin\AppData\Local\tempinstall.ini | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2452 | wps.exe | HEAD | 200 | 128.1.77.42:80 | http://wdl1.pcfg.cache.wpscdn.com/ksodl/service/per-plugin/dl/addons/pool/win-i386/konlinemeeting_1.0.2020.1.7z | US | — | — | malicious |
740 | iexplore.exe | GET | 200 | 128.1.77.42:80 | http://wdl1.pcfg.cache.wpscdn.com/wpsdl/wpsoffice/onlinesetup/distsrc/200.1023/wpsinst/wps_office_inst.exe | US | executable | 4.48 Mb | malicious |
2860 | setup_urls_default.500.2024.exe | GET | 200 | 93.184.220.29:80 | http://ocsp1.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR3enuod9bxDxzpICGW%2B2sabjf17QQUkFj%2FsJx1qFFUd7Ht8qNDFjiebMUCEAvseGjyi5huKs%2FWs8uiWS4%3D | US | der | 471 b | whitelisted |
3420 | wps_office_inst.exe | POST | 200 | 18.195.158.232:80 | http://dw-online.ksosoft.com/api/dynamicParam/v1/app/46bcb297fd50d982 | DE | text | 14.9 Kb | unknown |
576 | wps_office_inst.exe | POST | 200 | 52.57.106.2:80 | http://dw-online.ksosoft.com/api/dynamicParam/v1/app/46bcb297fd50d982 | DE | text | 14.9 Kb | unknown |
3740 | wpscloudsvr.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA%2BoSQYV1wCgviF2%2FcXsbb0%3D | US | der | 471 b | whitelisted |
2860 | setup_urls_default.500.2024.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D | US | der | 471 b | whitelisted |
1920 | ksomisc.exe | POST | 200 | 52.29.12.246:80 | http://dw-online.ksosoft.com/api/dynamicParam/v1/app/46bcb297fd50d982 | DE | text | 14.9 Kb | unknown |
3740 | wpscloudsvr.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSYagvY3tfizDNoybzVSPFZmSEm0wQUe2jOKarAF75JeuHlP9an90WPNTICEALkTX0dOK4iOyegK6zXm1M%3D | US | der | 471 b | whitelisted |
2068 | wps.exe | GET | 200 | 128.1.77.42:80 | http://wdl1.pcfg.cache.wpscdn.com/ksodl/service/per-plugin/dl/addons/list/win-i386/11.2.0.9281/wpsoffice/index.ini | US | text | 195 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2068 | wps.exe | 54.69.14.161:80 | dyn.kingsoftstore.com | Amazon.com, Inc. | US | unknown |
2308 | iexplore.exe | 152.199.19.161:443 | iecvlist.microsoft.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
740 | iexplore.exe | 128.1.77.42:80 | wdl1.pcfg.cache.wpscdn.com | GTT Communications Inc. | US | suspicious |
2308 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
576 | wps_office_inst.exe | 52.57.106.2:80 | dw-online.ksosoft.com | Amazon.com, Inc. | DE | unknown |
3420 | wps_office_inst.exe | 52.57.106.2:80 | dw-online.ksosoft.com | Amazon.com, Inc. | DE | unknown |
3420 | wps_office_inst.exe | 38.122.90.195:443 | wdl1.pcfg.cache.wpscdn.com | Cogent Communications | US | unknown |
576 | wps_office_inst.exe | 18.195.31.78:443 | shuc-pc.ksord.com | Amazon.com, Inc. | DE | unknown |
3420 | wps_office_inst.exe | 18.195.158.232:80 | dw-online.ksosoft.com | Amazon.com, Inc. | DE | unknown |
2308 | iexplore.exe | 204.79.197.200:443 | ieonline.microsoft.com | Microsoft Corporation | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
wdl1.pcfg.cache.wpscdn.com |
| malicious |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
dw-online.ksosoft.com |
| unknown |
shuc-pc.ksord.com |
| unknown |
ieonline.microsoft.com |
| whitelisted |
api-web-param-us.wps.com |
| suspicious |
ocsp1.digicert.com |
| whitelisted |
ocsp.msocsp.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
740 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
setup_urls_default.500.2024.exe | [kscreen] isElide:0 switchRec:0 switchRecElide:1 |
setup_urls_default.500.2024.exe | [kscreen] now screensaver is |
setup_urls_default.500.2024.exe | unregister dll path:qingshellext.dll
|
setup_urls_default.500.2024.exe | unInstall qingshellex success!
|
setup_urls_default.500.2024.exe | unregister dll path:qingshellext.dll
|
ksomisc.exe | 2020/05/06 11:20:37 I ksomisc 00000318:00000fdc [wWinMain][ksomisc begin] cmdline:-setlng en_US FL:E:\rc_v11_i18_kpr_20200415\Coding\support\ksomisc\ksomisc.cpp(474)
|
ksomisc.exe | 2020/05/06 11:20:37 I ksomisc 00000908:00000758 [wWinMain][ksomisc begin] cmdline:-setservers FL:E:\rc_v11_i18_kpr_20200415\Coding\support\ksomisc\ksomisc.cpp(474)
|
ksomisc.exe | 2020/05/06 11:20:38 I ksomisc 00000598:00000544 [wWinMain][ksomisc begin] cmdline:-register FL:E:\rc_v11_i18_kpr_20200415\Coding\support\ksomisc\ksomisc.cpp(474)
|
ksomisc.exe | 2020/05/06 11:20:55 E ksomisc 00000598:00000544 [Run]RegisterModule(0, true) faild! FL:E:\rc_v11_i18_kpr_20200415\Coding\support\ksomisc\ksomisc.cpp(83)
|
ksomisc.exe | 2020/05/06 11:20:56 I ksomisc 00000b48:0000030c [wWinMain][ksomisc begin] cmdline:-regmtfont FL:E:\rc_v11_i18_kpr_20200415\Coding\support\ksomisc\ksomisc.cpp(474)
|