URL:

http://files2.codecguide.com/K-Lite_Codec_Pack_1465_Mega.exe

Full analysis: https://app.any.run/tasks/f64c7129-a588-450c-b99b-b4ab4f195c0f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 17, 2019, 13:45:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
loader
Indicators:
MD5:

C29855C235602BAEE3BE2E4A91A0AE8E

SHA1:

228F5923342DC585A36F290544937E1623E03C7C

SHA256:

47306136BFC99C05F5A8808458656ADD73873A55F8BEE98E68D29B3BE7FF95C3

SSDEEP:

3:N1KYuZ22LKKcBivOiDACW:CYuZDLTWiDACW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3456)
    • Registers / Runs the DLL via REGSVR32.EXE

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 2956)
      • regsvr32.exe (PID: 3788)
      • regsvr32.exe (PID: 2540)
      • regsvr32.exe (PID: 1708)
      • regsvr32.exe (PID: 2624)
      • regsvr32.exe (PID: 3212)
      • regsvr32.exe (PID: 940)
    • Uses Task Scheduler to run other applications

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2436)
    • Application was dropped or rewritten from another process

      • setacl_x86.exe (PID: 3576)
      • setacl_x86.exe (PID: 2628)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • K-Lite_Codec_Pack_1465_Mega[1].exe (PID: 3608)
      • K-Lite_Codec_Pack_1465_Mega[1].exe (PID: 560)
      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Reads the Windows organization settings

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Checks supported languages

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Checks for external IP

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Searches for installed software

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Reads Windows owner or organization settings

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates files in the user directory

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates files in the Windows directory

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 940)
      • regsvr32.exe (PID: 1708)
      • regsvr32.exe (PID: 3212)
    • Creates files in the program directory

      • regsvr32.exe (PID: 3212)
    • Modifies the open verb of a shell class

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2944)
    • Application was dropped or rewritten from another process

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 3360)
      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Application launched itself

      • iexplore.exe (PID: 2944)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3456)
    • Loads dropped or rewritten executable

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates a software uninstall entry

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Dropped object may contain Bitcoin addresses

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates files in the program directory

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
16
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe k-lite_codec_pack_1465_mega[1].exe k-lite_codec_pack_1465_mega[1].tmp no specs k-lite_codec_pack_1465_mega[1].exe k-lite_codec_pack_1465_mega[1].tmp regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs setacl_x86.exe no specs setacl_x86.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
560"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe
iexplore.exe
User:
admin
Company:
KLCP
Integrity Level:
MEDIUM
Description:
K-Lite Mega Codec Pack Setup
Exit code:
0
Version:
14.6.5.0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\r9zewh8d\k-lite_codec_pack_1465_mega[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
940"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\DirectVobSub\vsfilter.dll"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1708"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Icaros\32-bit\IcarosThumbnailProvider.dll"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2208"C:\Users\admin\AppData\Local\Temp\is-Q8EC4.tmp\K-Lite_Codec_Pack_1465_Mega[1].tmp" /SL5="$40182,56578049,259072,C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe" /SPAWNWND=$30150 /NOTIFYWND=$4018A C:\Users\admin\AppData\Local\Temp\is-Q8EC4.tmp\K-Lite_Codec_Pack_1465_Mega[1].tmp
K-Lite_Codec_Pack_1465_Mega[1].exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-q8ec4.tmp\k-lite_codec_pack_1465_mega[1].tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2436"C:\Windows\system32\schtasks.exe" /Create /TN "klcp_update" /XML "C:\Users\admin\AppData\Local\Temp\is-G059V.tmp\klcp_update_task.xml" /FC:\Windows\system32\schtasks.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2540"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\LAV\LAVSplitter.ax"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2624"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\ffdshow\ffdshow.ax"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2628"C:\Program Files\K-Lite Codec Pack\Tools\setacl_x86.exe" -ot reg -on "HKLM\SOFTWARE\Microsoft\DirectShow\Preferred" -actn ace -ace "n:S-1-5-32-544;s:y;p:full;i:so,sc;m:set;w:dacl"C:\Program Files\K-Lite Codec Pack\Tools\setacl_x86.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Helge Klein
Integrity Level:
HIGH
Description:
SetACL 2
Exit code:
0
Version:
2, 1, 3, 0
Modules
Images
c:\program files\k-lite codec pack\tools\setacl_x86.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\wkscli.dll
2944"C:\Program Files\Internet Explorer\iexplore.exe" http://files2.codecguide.com/K-Lite_Codec_Pack_1465_Mega.exeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2956"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\LAV\LAVVideo.ax"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
6 574
Read events
2 193
Write events
4 344
Delete events
37

Modification events

(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{3A71B813-1A5E-11E9-BAD8-5254004A04AF}
Value:
0
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070100040011000D002E000300E801
Executable files
99
Suspicious files
6
Text files
80
Unknown types
18

Dropped files

PID
Process
Filename
Type
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFEDC3B1745C6B3B14.TMP
MD5:
SHA256:
3456iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\K-Lite_Codec_Pack_1465_Mega[1].exe
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFBC2BFD9B607A1944.TMP
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{3A71B813-1A5E-11E9-BAD8-5254004A04AF}.dat
MD5:
SHA256:
2208K-Lite_Codec_Pack_1465_Mega[1].tmpC:\Users\admin\AppData\Local\Temp\is-G059V.tmp\offer_wc.ini
MD5:
SHA256:
2208K-Lite_Codec_Pack_1465_Mega[1].tmpC:\Program Files\K-Lite Codec Pack\is-TLD1I.tmp
MD5:
SHA256:
2208K-Lite_Codec_Pack_1465_Mega[1].tmpC:\Program Files\K-Lite Codec Pack\Info\is-NPPUP.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
6
DNS requests
6
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
GET
104.17.113.51:80
http://webcompanion.com/nano_download.php?partner=KL150601
US
malicious
3456
iexplore.exe
GET
200
163.172.216.227:80
http://files2.codecguide.com/K-Lite_Codec_Pack_1465_Mega.exe
NL
executable
54.5 Mb
suspicious
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
GET
200
216.239.36.21:80
http://ipinfo.io/json
US
text
170 b
shared
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
GET
200
104.24.119.99:80
http://data.codecguide.com/config/offer_wc.ini
US
text
370 b
malicious
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
POST
200
172.217.23.142:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
2944
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3456
iexplore.exe
163.172.216.227:80
files2.codecguide.com
Online S.a.s.
NL
suspicious
2944
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
216.239.36.21:80
ipinfo.io
Google Inc.
US
whitelisted
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
104.24.119.99:80
data.codecguide.com
Cloudflare Inc
US
shared
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
172.217.23.142:80
www.google-analytics.com
Google Inc.
US
whitelisted
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
104.17.113.51:80
webcompanion.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
files2.codecguide.com
  • 163.172.216.227
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ipinfo.io
  • 216.239.36.21
  • 216.239.34.21
  • 216.239.32.21
  • 216.239.38.21
shared
data.codecguide.com
  • 104.24.119.99
  • 104.24.118.99
malicious
www.google-analytics.com
  • 172.217.23.142
whitelisted
webcompanion.com
  • 104.17.113.51
  • 104.17.112.51
  • 104.17.116.51
  • 104.17.115.51
  • 104.17.114.51
malicious

Threats

PID
Process
Class
Message
3456
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup ipinfo.io
No debug info