analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://files2.codecguide.com/K-Lite_Codec_Pack_1465_Mega.exe

Full analysis: https://app.any.run/tasks/f64c7129-a588-450c-b99b-b4ab4f195c0f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 17, 2019, 13:45:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
loader
Indicators:
MD5:

C29855C235602BAEE3BE2E4A91A0AE8E

SHA1:

228F5923342DC585A36F290544937E1623E03C7C

SHA256:

47306136BFC99C05F5A8808458656ADD73873A55F8BEE98E68D29B3BE7FF95C3

SSDEEP:

3:N1KYuZ22LKKcBivOiDACW:CYuZDLTWiDACW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3456)
    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 2540)
      • regsvr32.exe (PID: 2956)
      • regsvr32.exe (PID: 3788)
      • regsvr32.exe (PID: 1708)
      • regsvr32.exe (PID: 940)
      • regsvr32.exe (PID: 2624)
      • regsvr32.exe (PID: 3212)
    • Registers / Runs the DLL via REGSVR32.EXE

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Application was dropped or rewritten from another process

      • setacl_x86.exe (PID: 3576)
      • setacl_x86.exe (PID: 2628)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2436)
    • Uses Task Scheduler to run other applications

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • K-Lite_Codec_Pack_1465_Mega[1].exe (PID: 560)
      • K-Lite_Codec_Pack_1465_Mega[1].exe (PID: 3608)
      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Reads the Windows organization settings

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Checks supported languages

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Reads Windows owner or organization settings

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Checks for external IP

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates files in the user directory

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates files in the Windows directory

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Searches for installed software

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 940)
      • regsvr32.exe (PID: 1708)
      • regsvr32.exe (PID: 3212)
    • Creates files in the program directory

      • regsvr32.exe (PID: 3212)
    • Modifies the open verb of a shell class

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
  • INFO

    • Application was dropped or rewritten from another process

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 3360)
      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3456)
    • Application launched itself

      • iexplore.exe (PID: 2944)
    • Changes internet zones settings

      • iexplore.exe (PID: 2944)
    • Loads dropped or rewritten executable

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Dropped object may contain Bitcoin addresses

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates a software uninstall entry

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
    • Creates files in the program directory

      • K-Lite_Codec_Pack_1465_Mega[1].tmp (PID: 2208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
16
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe k-lite_codec_pack_1465_mega[1].exe k-lite_codec_pack_1465_mega[1].tmp no specs k-lite_codec_pack_1465_mega[1].exe k-lite_codec_pack_1465_mega[1].tmp regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs setacl_x86.exe no specs setacl_x86.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2944"C:\Program Files\Internet Explorer\iexplore.exe" http://files2.codecguide.com/K-Lite_Codec_Pack_1465_Mega.exeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3456"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2944 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
560"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe
iexplore.exe
User:
admin
Company:
KLCP
Integrity Level:
MEDIUM
Description:
K-Lite Mega Codec Pack Setup
Version:
14.6.5.0
3360"C:\Users\admin\AppData\Local\Temp\is-TJK8J.tmp\K-Lite_Codec_Pack_1465_Mega[1].tmp" /SL5="$4018A,56578049,259072,C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe" C:\Users\admin\AppData\Local\Temp\is-TJK8J.tmp\K-Lite_Codec_Pack_1465_Mega[1].tmpK-Lite_Codec_Pack_1465_Mega[1].exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.1052.0.0
3608"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe" /SPAWNWND=$30150 /NOTIFYWND=$4018A C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe
K-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
KLCP
Integrity Level:
HIGH
Description:
K-Lite Mega Codec Pack Setup
Version:
14.6.5.0
2208"C:\Users\admin\AppData\Local\Temp\is-Q8EC4.tmp\K-Lite_Codec_Pack_1465_Mega[1].tmp" /SL5="$40182,56578049,259072,C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe" /SPAWNWND=$30150 /NOTIFYWND=$4018A C:\Users\admin\AppData\Local\Temp\is-Q8EC4.tmp\K-Lite_Codec_Pack_1465_Mega[1].tmp
K-Lite_Codec_Pack_1465_Mega[1].exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
940"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\DirectVobSub\vsfilter.dll"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3788"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\LAV\LAVAudio.ax"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2956"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\LAV\LAVVideo.ax"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2540"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\K-Lite Codec Pack\Filters\LAV\LAVSplitter.ax"C:\Windows\system32\regsvr32.exeK-Lite_Codec_Pack_1465_Mega[1].tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
6 574
Read events
2 193
Write events
0
Delete events
0

Modification events

No data
Executable files
99
Suspicious files
6
Text files
80
Unknown types
18

Dropped files

PID
Process
Filename
Type
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFEDC3B1745C6B3B14.TMP
MD5:
SHA256:
3456iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\K-Lite_Codec_Pack_1465_Mega[1].exe
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\K-Lite_Codec_Pack_1465_Mega[1].exe
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFBC2BFD9B607A1944.TMP
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{3A71B813-1A5E-11E9-BAD8-5254004A04AF}.dat
MD5:
SHA256:
2208K-Lite_Codec_Pack_1465_Mega[1].tmpC:\Users\admin\AppData\Local\Temp\is-G059V.tmp\offer_wc.ini
MD5:
SHA256:
2208K-Lite_Codec_Pack_1465_Mega[1].tmpC:\Program Files\K-Lite Codec Pack\is-TLD1I.tmp
MD5:
SHA256:
2208K-Lite_Codec_Pack_1465_Mega[1].tmpC:\Program Files\K-Lite Codec Pack\Info\is-NPPUP.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
6
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
GET
200
216.239.36.21:80
http://ipinfo.io/json
US
text
170 b
shared
3456
iexplore.exe
GET
200
163.172.216.227:80
http://files2.codecguide.com/K-Lite_Codec_Pack_1465_Mega.exe
NL
executable
54.5 Mb
suspicious
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
GET
200
104.24.119.99:80
http://data.codecguide.com/config/offer_wc.ini
US
text
370 b
malicious
2944
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
GET
104.17.113.51:80
http://webcompanion.com/nano_download.php?partner=KL150601
US
malicious
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
POST
200
172.217.23.142:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
172.217.23.142:80
www.google-analytics.com
Google Inc.
US
whitelisted
2944
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
216.239.36.21:80
ipinfo.io
Google Inc.
US
whitelisted
3456
iexplore.exe
163.172.216.227:80
files2.codecguide.com
Online S.a.s.
NL
suspicious
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
104.24.119.99:80
data.codecguide.com
Cloudflare Inc
US
shared
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
104.17.113.51:80
webcompanion.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
files2.codecguide.com
  • 163.172.216.227
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ipinfo.io
  • 216.239.36.21
  • 216.239.34.21
  • 216.239.32.21
  • 216.239.38.21
shared
data.codecguide.com
  • 104.24.119.99
  • 104.24.118.99
malicious
www.google-analytics.com
  • 172.217.23.142
whitelisted
webcompanion.com
  • 104.17.113.51
  • 104.17.112.51
  • 104.17.116.51
  • 104.17.115.51
  • 104.17.114.51
malicious

Threats

PID
Process
Class
Message
3456
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2208
K-Lite_Codec_Pack_1465_Mega[1].tmp
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup ipinfo.io
No debug info