File name:

kinstnui_150_15.exe

Full analysis: https://app.any.run/tasks/21631e8b-43a0-45bd-982e-757f90aa665d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 12, 2021, 07:25:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

EFB463C919EC58B2B1ECE395E2C1A72F

SHA1:

C6C32F6CE4EFCB1606F65DED3AF4FC6F441D9626

SHA256:

37F52BD4628A26118CC423ABDAFE347ABFD977E6F8549244A3CD5EDE75EF915D

SSDEEP:

24576:r8tnseHdSzn+s2RypgWm7BrEl53TVXceo5aZ3C78f76+CyMAO0eQiUMB80eQiUM7:oN3H8znB2RAOBrS3U5aZymm+xMbyiUMk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • kinstnui_150_15.exe (PID: 2300)
      • duba_100_51.exe (PID: 1376)
    • Application was dropped or rewritten from another process

      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kxetray.exe (PID: 2824)
      • kavlog2.exe (PID: 3112)
      • kislive.exe (PID: 3324)
      • ksoftmgr.exe (PID: 668)
      • kxescore.exe (PID: 1248)
      • kxescore.exe (PID: 1176)
      • knewvip.exe (PID: 2536)
      • kxecenter.exe (PID: 332)
      • knewvip.exe (PID: 3920)
      • kxetray.exe (PID: 2700)
    • Loads dropped or rewritten executable

      • kxemain.exe (PID: 1164)
      • duba_100_51.exe (PID: 1376)
      • kavlog2.exe (PID: 3112)
      • ksoftmgr.exe (PID: 668)
      • kxetray.exe (PID: 2824)
      • kislive.exe (PID: 3324)
      • kxescore.exe (PID: 1248)
      • kxescore.exe (PID: 1176)
      • knewvip.exe (PID: 2536)
      • kxecenter.exe (PID: 332)
      • Explorer.EXE (PID: 1284)
      • svchost.exe (PID: 888)
      • kxetray.exe (PID: 2700)
      • knewvip.exe (PID: 3920)
    • Changes the autorun value in the registry

      • duba_100_51.exe (PID: 1376)
    • Steals credentials from Web Browsers

      • kxemain.exe (PID: 1164)
    • Actions looks like stealing of personal data

      • kxemain.exe (PID: 1164)
      • kxetray.exe (PID: 2824)
      • kxescore.exe (PID: 1176)
  • SUSPICIOUS

    • Reads the computer name

      • kinstnui_150_15.exe (PID: 2300)
      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kislive.exe (PID: 3324)
      • ksoftmgr.exe (PID: 668)
      • kxetray.exe (PID: 2824)
      • kxescore.exe (PID: 1248)
      • kxescore.exe (PID: 1176)
      • knewvip.exe (PID: 2536)
      • kxecenter.exe (PID: 332)
      • kxetray.exe (PID: 2700)
    • Checks supported languages

      • duba_100_51.exe (PID: 1376)
      • kinstnui_150_15.exe (PID: 2300)
      • kxemain.exe (PID: 1164)
      • ksoftmgr.exe (PID: 668)
      • kislive.exe (PID: 3324)
      • kxetray.exe (PID: 2824)
      • kxescore.exe (PID: 1248)
      • kxescore.exe (PID: 1176)
      • knewvip.exe (PID: 2536)
      • kavlog2.exe (PID: 3112)
      • kxecenter.exe (PID: 332)
      • kxetray.exe (PID: 2700)
      • knewvip.exe (PID: 3920)
    • Drops a file with too old compile date

      • kinstnui_150_15.exe (PID: 2300)
      • duba_100_51.exe (PID: 1376)
    • Drops a file with a compile date too recent

      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kxetray.exe (PID: 2824)
      • kxescore.exe (PID: 1176)
      • kislive.exe (PID: 3324)
    • Creates a directory in Program Files

      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kxescore.exe (PID: 1176)
      • kxetray.exe (PID: 2824)
      • kislive.exe (PID: 3324)
    • Creates files in the Windows directory

      • duba_100_51.exe (PID: 1376)
      • kavlog2.exe (PID: 3112)
      • kxescore.exe (PID: 1176)
    • Removes files from Windows directory

      • duba_100_51.exe (PID: 1376)
    • Creates files in the driver directory

      • duba_100_51.exe (PID: 1376)
      • kxescore.exe (PID: 1176)
    • Creates a software uninstall entry

      • duba_100_51.exe (PID: 1376)
      • kxetray.exe (PID: 2824)
    • Executable content was dropped or overwritten

      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kxescore.exe (PID: 1176)
    • Creates/Modifies COM task schedule object

      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kxescore.exe (PID: 1176)
    • Drops a file that was compiled in debug mode

      • duba_100_51.exe (PID: 1376)
      • kxemain.exe (PID: 1164)
      • kxescore.exe (PID: 1176)
    • Creates files in the program directory

      • duba_100_51.exe (PID: 1376)
      • kxetray.exe (PID: 2824)
      • kxescore.exe (PID: 1248)
      • kxemain.exe (PID: 1164)
      • kislive.exe (PID: 3324)
      • knewvip.exe (PID: 2536)
      • kxecenter.exe (PID: 332)
      • kxescore.exe (PID: 1176)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • duba_100_51.exe (PID: 1376)
    • Creates files in the user directory

      • kxemain.exe (PID: 1164)
      • kxetray.exe (PID: 2824)
    • Executed as Windows Service

      • kxescore.exe (PID: 1176)
    • Reads Microsoft Outlook installation path

      • ksoftmgr.exe (PID: 668)
    • Check for Java to be installed

      • kxemain.exe (PID: 1164)
    • Creates or modifies windows services

      • kxescore.exe (PID: 1176)
    • Reads internet explorer settings

      • ksoftmgr.exe (PID: 668)
    • Reads CPU info

      • kxescore.exe (PID: 1176)
      • kxetray.exe (PID: 2824)
    • Searches for installed software

      • kxemain.exe (PID: 1164)
      • kxecenter.exe (PID: 332)
      • kxescore.exe (PID: 1176)
      • kxetray.exe (PID: 2824)
    • Changes default file association

      • kxetray.exe (PID: 2824)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1284)
    • Application launched itself

      • knewvip.exe (PID: 2536)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • duba_100_51.exe (PID: 1376)
      • kislive.exe (PID: 3324)
    • Checks Windows Trust Settings

      • kxescore.exe (PID: 1176)
      • Explorer.EXE (PID: 1284)
    • Reads settings of System Certificates

      • kxescore.exe (PID: 1176)
      • Explorer.EXE (PID: 1284)
    • Reads the hosts file

      • knewvip.exe (PID: 2536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (38.7)
.exe | Win64 Executable (generic) (34.3)
.scr | Windows screen saver (16.2)
.exe | Win32 Executable (generic) (5.6)
.exe | Generic Win/DOS Executable (2.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:06:22 14:12:08+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 753664
InitializedDataSize: 724992
UninitializedDataSize: -
EntryPoint: 0x73960
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2021.6.22.815
ProductVersionNumber: 9.3.0.815
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Kingsoft Corporation
FileDescription: Kingsoft Security - 安装程序
FileVersion: 2021,06,22,815
InternalName: KInstallTool
LegalCopyright: Copyright (C) 1998-2021 Kingsoft Corporation
OriginalFileName: -
ProductName: Kingsoft Internet Security
ProductVersion: 9,3,0,815

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 22-Jun-2021 12:12:08
Detected languages:
  • Chinese - PRC
  • English - United States
Debug artifacts:
  • e:\KINGSOFT_DUBA\Build\Build_Src\kisengine_git\kisengine_git\product\win32\dbginfo\kinstuiofficial.pdb
CompanyName: Kingsoft Corporation
FileDescription: Kingsoft Security - 安装程序
FileVersion: 2021,06,22,815
InternalName: KInstallTool
LegalCopyright: Copyright (C) 1998-2021 Kingsoft Corporation
OriginalFilename: -
ProductName: Kingsoft Internet Security
ProductVersion: 9,3,0,815

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 22-Jun-2021 12:12:08
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000B712C
0x000B8000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.59874
.rdata
0x000B9000
0x000258EE
0x00026000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.82133
.data
0x000DF000
0x00008E08
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.6669
.rsrc
0x000E8000
0x000850A4
0x00086000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.69095

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.253
1054
Latin 1 / Western European
English - United States
RT_MANIFEST
2
6.56924
9640
Latin 1 / Western European
Chinese - PRC
RT_ICON
3
6.61484
4264
Latin 1 / Western European
Chinese - PRC
RT_ICON
4
4.67813
1128
Latin 1 / Western European
Chinese - PRC
RT_ICON
5
6.44522
38056
Latin 1 / Western European
Chinese - PRC
RT_ICON
6
6.56924
9640
Latin 1 / Western European
Chinese - PRC
RT_ICON
7
6.61484
4264
Latin 1 / Western European
Chinese - PRC
RT_ICON
8
4.67813
1128
Latin 1 / Western European
Chinese - PRC
RT_ICON
9
7.21166
361
Latin 1 / Western European
Chinese - PRC
PNG
10
6.01791
1101
Latin 1 / Western European
Chinese - PRC
PNG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
MSIMG32.dll
OLEAUT32.dll
PSAPI.DLL
RASAPI32.dll
SHELL32.dll
SHLWAPI.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
16
Malicious processes
15
Suspicious processes
0

Behavior graph

Click at the process to see the details
download and start start drop and start drop and start drop and start drop and start drop and start drop and start kinstnui_150_15.exe duba_100_51.exe kxemain.exe kxetray.exe kavlog2.exe ksoftmgr.exe kislive.exe kxescore.exe no specs kxescore.exe knewvip.exe kxecenter.exe no specs svchost.exe no specs explorer.exe kxetray.exe no specs knewvip.exe kinstnui_150_15.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
332"c:\program files\kingsoft\kingsoft antivirus\kxecenter.exe" c:\program files\kingsoft\kingsoft antivirus\kxecenter.exekxetray.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - kxecenter
Exit code:
0
Version:
2021,09,09,1012
Modules
Images
c:\program files\kingsoft\kingsoft antivirus\kxecenter.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
668"c:\program files\kingsoft\kingsoft antivirus\ksoftmgr.exe" -preloadc:\program files\kingsoft\kingsoft antivirus\ksoftmgr.exe
duba_100_51.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - ????
Exit code:
0
Version:
2021,09,14,1051
Modules
Images
c:\program files\kingsoft\kingsoft antivirus\ksoftmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
888C:\Windows\system32\svchost.exe -k netsvcsC:\Windows\system32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1164"c:\program files\kingsoft\kingsoft antivirus\kxemain.exe" /noplayanimat pos|240|66c:\program files\kingsoft\kingsoft antivirus\kxemain.exe
duba_100_51.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - Kingsoft KIS Main
Exit code:
0
Version:
2021,09,23,1074
Modules
Images
c:\program files\kingsoft\kingsoft antivirus\kxemain.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
1176"c:\program files\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescorec:\program files\kingsoft\kingsoft antivirus\kxescore.exe
services.exe
User:
SYSTEM
Company:
Kingsoft Corporation
Integrity Level:
SYSTEM
Description:
Kingsoft Security - ????
Exit code:
0
Version:
2021,04,27,689
Modules
Images
c:\program files\kingsoft\kingsoft antivirus\kxescore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1248"c:\program files\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescorec:\program files\kingsoft\kingsoft antivirus\kxescore.exeduba_100_51.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - ????
Exit code:
0
Version:
2021,04,27,689
Modules
Images
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\shell32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
1284C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1376"C:\Users\admin\AppData\Local\Temp\duba_100_51.exe" /rcmdfromkinst /rcmdSceneId=2 /rcmdSoftId=0 /rcmdcheck=1 /rcmdreason="NoRcmdItem" /rcmdCid=0 /rcmdTid=0 /rcmdCanRcmd=0 /autoinstall ##silence=0&installpath="C:\Program Files\kingsoft\kingsoft antivirus\"&hwnd=2012e&##tid1=100 tid2=50 tod1=100 tod2=51C:\Users\admin\AppData\Local\Temp\duba_100_51.exe
kinstnui_150_15.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - ????
Exit code:
1
Version:
2021,06,25,822
Modules
Images
c:\users\admin\appdata\local\temp\duba_100_51.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
1744"C:\Users\admin\AppData\Local\Temp\kinstnui_150_15.exe" C:\Users\admin\AppData\Local\Temp\kinstnui_150_15.exeExplorer.EXE
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
MEDIUM
Description:
Kingsoft Security - ????
Exit code:
3221226540
Version:
2021,06,22,815
Modules
Images
c:\users\admin\appdata\local\temp\kinstnui_150_15.exe
c:\windows\system32\ntdll.dll
2300"C:\Users\admin\AppData\Local\Temp\kinstnui_150_15.exe" C:\Users\admin\AppData\Local\Temp\kinstnui_150_15.exe
Explorer.EXE
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - ????
Exit code:
0
Version:
2021,06,22,815
Modules
Images
c:\users\admin\appdata\local\temp\kinstnui_150_15.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
98 885
Read events
98 166
Write events
630
Delete events
89

Modification events

(PID) Process:(2300) kinstnui_150_15.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idex
Value:
407a80b01afa153017a32cdfe55cec87
(PID) Process:(2300) kinstnui_150_15.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idno
Value:
1
(PID) Process:(1284) Explorer.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:P:\Hfref\nqzva\NccQngn\Ybpny\Grzc\xvafgahv_150_15.rkr
Value:
00000000000000000100000000000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000
(PID) Process:(1284) Explorer.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
(PID) Process:(2300) kinstnui_150_15.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}
Operation:writeName:did
Value:
06CB9194B3BE6EA77B21283B43F73E3A
(PID) Process:(2300) kinstnui_150_15.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}
Operation:writeName:PacketPath_150_15_1
Value:
C:\Users\admin\AppData\Local\Temp\duba_100_51.exe
(PID) Process:(2300) kinstnui_150_15.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\duba_100_51.exe
(PID) Process:(1376) duba_100_51.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idno
Value:
1
(PID) Process:(1376) duba_100_51.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idex
Value:
407a80b01afa153017a32cdfe55cec87
(PID) Process:(1376) duba_100_51.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:svrid
Value:
Executable files
328
Suspicious files
654
Text files
353
Unknown types
43

Dropped files

PID
Process
Filename
Type
2300kinstnui_150_15.exeC:\Users\admin\AppData\Local\Temp\duba_100_51.exe
MD5:
SHA256:
1376duba_100_51.exeC:\ProgramData\Kingsoft\KIS\hg.dat
MD5:
SHA256:
2300kinstnui_150_15.exeC:\Users\admin\AppData\Local\Temp\KInstallRcmdCfg.datbinary
MD5:
SHA256:
2300kinstnui_150_15.exeC:\Users\admin\AppData\Local\Temp\kinst.logtext
MD5:
SHA256:
1376duba_100_51.exeC:\Users\admin\AppData\Local\Temp\kantivirus\kavsetup.logtext
MD5:
SHA256:
1376duba_100_51.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~1229e7\install_res\3.jpgimage
MD5:F3B9632B84AE1B2686AA35DF23B505EF
SHA256:10DBBB8367D847EB97F33E48D6227C33E6845C64D3309354F71CD55405481852
1376duba_100_51.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~1229e7\install_res\110.pngimage
MD5:1BA853743DF06EF6AB48A19D7DE280B1
SHA256:39F8A938CC1B2217A7D3DD248AA564B13C489309ED416330C174131AB0C068F6
1376duba_100_51.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~1229e7\install_res\4.pngimage
MD5:567412DEFA6FF8C0A22B6741903D5BD6
SHA256:EC47BE1C0109FE07FD41B5C8133CE17D3FBAFD003369FF6A0ADC616C9297205B
2300kinstnui_150_15.exeC:\Users\admin\AppData\Local\Temp\unioncfg.datbinary
MD5:DF94904C0C61F26EBBF8CBCD01FCC168
SHA256:83E8FA01B44461D2650DDBA64D351F591E7265DB8CA21343C8C6C2DB83ED368B
1376duba_100_51.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~1229e7\install_res\5.pngimage
MD5:A9D6E9863117C07204ACA39EAB5B994A
SHA256:908B09757F56BDCFD2BC8D53DFF95E62159D2BA448FC41DBFA135DB87BE5E608
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
167
TCP/UDP connections
172
DNS requests
91
Threats
70

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2300
kinstnui_150_15.exe
HEAD
200
58.216.13.248:80
http://config.i.duba.net/lminstall3/unioncfg.dat?time=1634023560
CN
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
2300
kinstnui_150_15.exe
GET
200
58.216.13.248:80
http://config.i.duba.net/installrcmd/KInstallRcmdCfg.dat
CN
binary
164 Kb
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
2300
kinstnui_150_15.exe
GET
200
58.216.13.248:80
http://config.i.duba.net/lminstall3/150.json?time=1634023576
CN
text
10.1 Kb
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
2300
kinstnui_150_15.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2300
kinstnui_150_15.exe
218.12.76.151:80
2398.35go.net
CHINA UNICOM China169 Backbone
CN
malicious
2300
kinstnui_150_15.exe
119.29.49.207:80
infoc0.duba.net
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
2300
kinstnui_150_15.exe
58.216.13.248:80
config.i.duba.net
AS Number for CHINANET jiangsu province backbone
CN
suspicious
2300
kinstnui_150_15.exe
120.52.95.243:80
2398.35go.net
China Unicom IP network
CN
malicious
1376
duba_100_51.exe
103.235.46.39:80
www.baidu.com
Beijing Baidu Netcom Science and Technology Co., Ltd.
HK
unknown
1376
duba_100_51.exe
134.175.158.111:80
cct.duba.com
US
unknown
1376
duba_100_51.exe
139.199.215.55:80
ct.duba.net
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1376
duba_100_51.exe
111.230.160.42:80
dbsu.cmcm.com
Shenzhen Tencent Computer Systems Company Limited
CN
unknown
119.29.49.207:80
infoc0.duba.net
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1164
kxemain.exe
123.207.105.156:8080
Shenzhen Tencent Computer Systems Company Limited
CN
suspicious

DNS requests

Domain
IP
Reputation
2398.35go.net
  • 218.12.76.151
  • 218.12.76.150
  • 120.52.95.243
  • 120.52.95.242
whitelisted
infoc0.duba.net
  • 119.29.49.207
  • 193.112.237.121
whitelisted
config.i.duba.net
  • 58.216.13.248
  • 58.216.13.243
  • 58.216.13.241
  • 58.216.13.238
  • 58.216.13.240
  • 58.216.13.242
  • 58.216.13.244
  • 58.216.13.239
whitelisted
cd001.www.duba.net
  • 120.52.95.243
  • 218.12.76.150
  • 218.12.76.151
  • 120.52.95.242
malicious
did.ijinshan.com
  • 139.199.218.80
malicious
www.baidu.com
  • 103.235.46.39
whitelisted
cct.duba.com
  • 134.175.158.111
unknown
ct.duba.net
  • 139.199.215.55
whitelisted
dbsu.cmcm.com
  • 111.230.160.42
unknown
cv.duba.net
  • 120.52.95.235
  • 218.12.76.163
  • 218.12.76.164
  • 120.52.95.234
whitelisted

Threats

PID
Process
Class
Message
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2300
kinstnui_150_15.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
44 ETPRO signatures available at the full report
Process
Message
duba_100_51.exe
08:29:00|~03120| [KAVMENU] unreg_duba_32bit
duba_100_51.exe
08:29:00|~03120| [KAVMENU] reg_duba_32bit
kxemain.exe
08:29:00|~02956| [KAVMENU] unreg_duba_32bit
kxemain.exe
08:29:00|~02956| [KAVMENU] reg_duba_32bit
kavlog2.exe
_tWinMain End.
kxescore.exe
c:\program files\kingsoft\kingsoft antivirus\ksapi.dll
kxescore.exe
c:\program files\kingsoft\kingsoft antivirus\ksapi.dll
knewvip.exe
[1012/082902:ERROR:main_delegate.cc(766)] Could not load cef_extensions.pak
kxetray.exe
c:\program files\kingsoft\kingsoft antivirus\ksapi.dll
kxetray.exe
c:\program files\kingsoft\kingsoft antivirus\ksapi.dll