| download: | PowerWord.800.12012.exe |
| Full analysis: | https://app.any.run/tasks/ebc86af1-f0dd-4fe8-8d3d-28641042b7e2 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | April 07, 2019, 11:10:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 14FE74F3913E49C7070A12277481D9C9 |
| SHA1: | 1B13A2F9240C433F236CF9177A29D779E9D3DF49 |
| SHA256: | 5366DCD94FEC6559AA01E6145627C4E6A92D578837DC2037562FE6406858DFF8 |
| SSDEEP: | 393216:taAHVKric3nEWTVFUkIODQmcw7cJIjGyX3kCvPLQuvtrlM584bHZATBQyy1:taNzEW/PIQASGeBzQ6RlM58wZ8QR1 |
| .exe | | | InstallShield setup (54.3) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (34.8) |
| .exe | | | Win32 Executable (generic) (5.6) |
| .exe | | | Generic Win/DOS Executable (2.5) |
| .exe | | | DOS Executable Generic (2.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1970:01:30 16:32:16+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 1701888 |
| InitializedDataSize: | 858624 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x10b403 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2016.2018.821.1827 |
| ProductVersionNumber: | 2016.2018.821.1827 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Unknown |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | Zhuhai Kingsoft Office Software Co.,Ltd |
| FileDescription: | 金山词霸安装程序 |
| FileVersion: | 2016,3,3,0333 |
| InternalName: | KPacket |
| LegalCopyright: | Copyright©1988-2016 Kingsoft Corporation. All rights reserved. |
| OriginalFileName: | KPacket.exe |
| ProductName: | 金山词霸2016 |
| ProductVersion: | 2016,3,3,0333 |
| MIMEType: | - |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 30-Jan-1970 15:32:16 |
| Detected languages: |
|
| Debug artifacts: |
|
| CompanyName: | Zhuhai Kingsoft Office Software Co.,Ltd |
| FileDescription: | 金山词霸安装程序 |
| FileVersion: | 2016,3,3,0333 |
| InternalName: | KPacket |
| LegalCopyright: | Copyright©1988-2016 Kingsoft Corporation. All rights reserved. |
| OriginalFilename: | KPacket.exe |
| ProductName: | 金山词霸2016 |
| ProductVersion: | 2016,3,3,0333 |
| MIMEType: | - |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000108 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 30-Jan-1970 15:32:16 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0019F74C | 0x0019F800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.73099 |
.rdata | 0x001A1000 | 0x00068C84 | 0x00068E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.68696 |
.data | 0x0020A000 | 0x00018840 | 0x00011000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.95894 |
.rsrc | 0x00223000 | 0x0003F4AC | 0x0003F600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.86209 |
.reloc | 0x00263000 | 0x0001851C | 0x00018600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.87673 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.00801 | 609 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 7.97935 | 40801 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
3 | 3.9342 | 67624 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
4 | 3.95701 | 16936 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
5 | 4.31119 | 9640 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
6 | 4.1772 | 4264 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
7 | 4.89043 | 2440 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
8 | 5.30332 | 1128 | Latin 1 / Western European | Chinese - PRC | RT_ICON |
100 | 5.19154 | 1666 | Latin 1 / Western European | Chinese - PRC | XML |
101 | 4.85193 | 1401 | Latin 1 / Western European | Chinese - PRC | XML |
ADVAPI32.dll |
COMCTL32.dll |
CRYPT32.dll |
GDI32.dll |
KERNEL32.dll |
OLEAUT32.dll |
PSAPI.DLL |
SHELL32.dll |
SHLWAPI.dll |
Secur32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 904 | "C:\Windows\System32\regsvr32.exe" /s "C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\CBGrabProxy.dll" | C:\Windows\System32\regsvr32.exe | — | PowerWord.800.12012.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1252 | "C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\PowerWord.exe" -installer:main | C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\PowerWord.exe | PowerWord.800.12012.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: 金山词霸2016 Exit code: 0 Version: 2016,3,3,0333 Modules
| |||||||||||||||
| 1424 | update.exe /productVer:2016.3.3.0333 /productID:PG01-PW-2052-156-X-Personal /UserGUID:{E70EC19437F14307B1E0869DD7D9AFF6----} /DistSrc: /uuid:E70EC19437F14307B1E0869DD7D9AFF6 /from:ksostart | C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\update.exe | PowerWord.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: Expansion tool Exit code: 0 Version: 10,1,0,5491 Modules
| |||||||||||||||
| 3132 | "C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\selfix.exe" --install | C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\selfix.exe | — | PowerWord.800.12012.exe | |||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: Powerword Self Fix Exit code: 0 Version: 2016,3,3,0333 Modules
| |||||||||||||||
| 3336 | "C:\Windows\System32\regsvr32.exe" /s /u "CBGrabProxy.dll" | C:\Windows\System32\regsvr32.exe | — | PowerWord.800.12012.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 3 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3372 | "C:\Users\admin\AppData\Local\Temp\PowerWord.800.12012.exe" | C:\Users\admin\AppData\Local\Temp\PowerWord.800.12012.exe | explorer.exe | ||||||||||||
User: admin Company: Zhuhai Kingsoft Office Software Co.,Ltd Integrity Level: MEDIUM Description: 金山词霸安装程序 Exit code: 0 Version: 2016,3,3,0333 Modules
| |||||||||||||||
| 3640 | "C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\powerwordhelper.exe" Power word open helper | C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\powerwordhelper.exe | — | PowerWord.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: 金山词霸辅助程序 Exit code: 0 Version: 2016,3,3,0333 Modules
| |||||||||||||||
| (PID) Process: | (3372) PowerWord.800.12012.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted |
| Operation: | write | Name: | C:\Users\admin\AppData\Local\Temp\PowerWord.800.12012.exe |
Value: 1 | |||
| (PID) Process: | (3372) PowerWord.800.12012.exe | Key: | HKEY_CURRENT_USER\Software\Kingsoft\Power Word |
| Operation: | write | Name: | StartCountPinSC |
Value: -1 | |||
| (PID) Process: | (3372) PowerWord.800.12012.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3372) PowerWord.800.12012.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (904) regsvr32.exe | Key: | HKEY_CLASSES_ROOT\AppID\{56D46CB3-3B60-4258-917A-502FB85582E4} |
| Operation: | write | Name: | |
Value: CBGrabProxy | |||
| (PID) Process: | (904) regsvr32.exe | Key: | HKEY_CLASSES_ROOT\AppID\CBGrabProxy.DLL |
| Operation: | write | Name: | AppID |
Value: {56D46CB3-3B60-4258-917A-502FB85582E4} | |||
| (PID) Process: | (904) regsvr32.exe | Key: | HKEY_CLASSES_ROOT\CBGrabProxy.CBRMGrabPlugin.1 |
| Operation: | write | Name: | |
Value: CBRMGrabPlugin Class | |||
| (PID) Process: | (904) regsvr32.exe | Key: | HKEY_CLASSES_ROOT\CBGrabProxy.CBRMGrabPlugin.1\CLSID |
| Operation: | write | Name: | |
Value: {1A8AAB98-37E6-4e68-B877-1BDE7F945E89} | |||
| (PID) Process: | (904) regsvr32.exe | Key: | HKEY_CLASSES_ROOT\CBGrabProxy.CBRMGrabPlugin |
| Operation: | write | Name: | |
Value: CBRMGrabPlugin Class | |||
| (PID) Process: | (904) regsvr32.exe | Key: | HKEY_CLASSES_ROOT\CBGrabProxy.CBRMGrabPlugin\CLSID |
| Operation: | write | Name: | |
Value: {1A8AAB98-37E6-4e68-B877-1BDE7F945E89} | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\20.png | image | |
MD5:B6463DFDA56244FBAAD5C0B983B9A5C8 | SHA256:DC336991D9114D6C86B588C3042610834B16F1994C9AD30B2E7EDA1981556F4E | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\30.png | image | |
MD5:3005F169E7104557B6EFCF06E88A0515 | SHA256:022F29DA06C127C36C4E7A8BB93A09899279ABAB8C0EE6D7ECEA051B7E7B2E46 | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\3.png | image | |
MD5:99910B7A9E80C1C5DE5A62814625EE83 | SHA256:44A01AAF0D2858D092AFF2B1ECFABE8ACF57126A6E21667D9D418F67FD5A9B22 | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\102.png | image | |
MD5:5192DC719389684E228C5ED6EAE9A3DA | SHA256:066733B6F7B054BECE74A4FE801732E991B830A0F70FD613444AADD96E8B24D7 | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\104.png | image | |
MD5:CE9038D52ACD2253609CC0F57596EDEA | SHA256:35AAAB539D213EC1B93AE0BEE85DF757F2B346BB9A3454FC574A3522D6B02603 | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\10.png | image | |
MD5:FEAF35246015524B3B335462EA0E7C5B | SHA256:0C06BF07D4CFBB68C1901A4E3B9B5D649145396F07FE2433ED4F64CCFF5FB87A | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\101.png | image | |
MD5:20FCFD436541CC9A931C9C68C18C60DE | SHA256:029B53CAE4EE97BDC6CD383E8A61E7161F6FF46F4ECAAB2CB7E2602BA1F2080F | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\103.png | image | |
MD5:16F538546506DC4130444497208C93E1 | SHA256:E7F69D26EDBA0BC03F083FE986490FC2D4FE9B4C3122E4C961885D133EF92673 | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\100.png | image | |
MD5:F4F713DB58B4364A072B94A3B05AC5FA | SHA256:8488CCB8D08B19AF4BD04B73404D2085EDAECE9862DCC741D2EEDD4F454DDA93 | |||
| 3372 | PowerWord.800.12012.exe | C:\Users\admin\AppData\Local\Temp\Power Word\~eaa07\install_res\2.jpg | image | |
MD5:F179A0CA31A7FA7D1B62BF76B8DED22F | SHA256:77C059D87D8598FFA91558FE28459510D37CE801BBA3D93381E5F3AF6275FCD4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1252 | PowerWord.exe | POST | 200 | 120.92.91.106:80 | http://ic.wps.cn/wpsv6internet/infos.ads?v=D1S1E1&d=ZG09L3dwcy9jbGllbnQvcGx1Z2lucyZhY3Rpb249cXVnX21pc3MyX3Bvd2Vyd29yZCZwbnVtPTQmcDA9RTcwRUMxOTQzN0YxNDMwN0IxRTA4NjlERDdEOUFGRjZ8OEI5RkUwRTUwMUJDOEE5RDY4RDAzNDYxRDE4NUMxMDV8NzQ0ZWI5YmJjMzU5NGE5YWY3ODMyNzI4Nzc5MmVhNmYmcDE9MjAxNi4zLjMuMDMzMyZwMj0mcDM9MQ== | CN | — | — | suspicious |
3372 | PowerWord.800.12012.exe | GET | — | 120.92.3.55:80 | http://push.wps.cn/bundled.php?distsrc=1.1&version=&type=install&platform=5 | CN | — | — | suspicious |
1252 | PowerWord.exe | POST | 200 | 120.92.5.151:80 | http://sentence.iciba.com/index.php?&c=dailysentence&m=getList&duration=10&title=2019-04-07&period=0&v=2016.3.3.0333&sv=Windows+7+Professional&uid=defaultuid&uuid=E70EC19437F14307B1E0869DD7D9AFF6&client=5 | CN | text | 3.48 Kb | suspicious |
1252 | PowerWord.exe | GET | 200 | 120.92.59.60:80 | http://service.iciba.com/popo/pc/icon_red_packets/every_normal.png | CN | image | 1.17 Kb | suspicious |
1252 | PowerWord.exe | GET | 200 | 120.92.59.60:80 | http://service.iciba.com/popo/pc/icon_red_packets/every_all.png | CN | image | 2.05 Kb | suspicious |
1252 | PowerWord.exe | POST | 200 | 120.92.91.106:80 | http://ic.wps.cn/wpsv6internet/infos.ads?v=D1S1E2 | CN | — | — | suspicious |
1252 | PowerWord.exe | GET | 200 | 117.91.177.228:80 | http://cdn.iciba.com/news/word/big_20190407b.jpg | CN | image | 103 Kb | malicious |
1252 | PowerWord.exe | GET | 200 | 120.92.59.60:80 | http://service.iciba.com/popo/pc/icon_red_packets/every.gif | CN | image | 7.52 Kb | suspicious |
1252 | PowerWord.exe | POST | 200 | 120.92.20.54:80 | http://mini.wps.cn/v2.php/iconflicker/api/config | CN | text | 12 b | suspicious |
1252 | PowerWord.exe | POST | 200 | 120.92.59.60:80 | http://service.iciba.com/popo/ad?client=5×tamp=1554635560&uuid=E70EC19437F14307B1E0869DD7D9AFF6&v=2016.3.3.0333&sv=Windows+7+Professional&channel=&uid=&sign=d07b12a9acad2cbe | CN | html | 1.49 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3372 | PowerWord.800.12012.exe | 120.92.3.55:80 | push.wps.cn | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | unknown |
1252 | PowerWord.exe | 120.92.3.58:80 | dict-mobile.iciba.com | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | unknown |
1252 | PowerWord.exe | 120.92.59.60:80 | oxford.iciba.com | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | suspicious |
1252 | PowerWord.exe | 120.92.20.54:80 | mini.wps.cn | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | suspicious |
1252 | PowerWord.exe | 120.92.5.165:80 | dict-pc.iciba.com | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | unknown |
1252 | PowerWord.exe | 120.92.5.151:80 | minisite.iciba.com | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | unknown |
1252 | PowerWord.exe | 183.134.19.1:80 | activity.iciba.com | No.31,Jin-rong Street | CN | suspicious |
1252 | PowerWord.exe | 120.92.91.106:80 | ic.wps.cn | Beijing Kingsoft Cloud Internet Technology Co., Ltd | CN | suspicious |
1252 | PowerWord.exe | 183.131.200.84:80 | download.iciba.com | DaLi | CN | suspicious |
1252 | PowerWord.exe | 117.91.177.228:80 | cdn.iciba.com | No.31,Jin-rong Street | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
push.wps.cn |
| suspicious |
oxford.iciba.com |
| suspicious |
dict-mobile.iciba.com |
| suspicious |
service.iciba.com |
| suspicious |
mini.wps.cn |
| suspicious |
minisite.iciba.com |
| suspicious |
activity.iciba.com |
| suspicious |
dict-pc.iciba.com |
| suspicious |
sentence.iciba.com |
| suspicious |
ic.wps.cn |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
1252 | PowerWord.exe | A Network Trojan was detected | ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request |
1252 | PowerWord.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
PowerWord.exe | 2019/04/07 12:12:37 I Powerword program start!
|
PowerWord.exe | 2019/04/07 12:12:38 I Powerword http://service.iciba.com/popo/open/screens/pc?client=5&v=2016.3.3.0333&sv=Windows+7+Professional&uuid=E70EC19437F14307B1E0869DD7D9AFF6&uid=defaultuid×tamp=1554635558&key=1000005&sign=df367ce495b956fb
|
PowerWord.exe | 2019/04/07 12:12:40 I Powerword initialize
|
PowerWord.exe | 2019/04/07 12:12:40 I Powerword C:\Users\admin\AppData\Local\Kingsoft\Power Word 2016\2016.3.3.0333\PowerWord.exe
|
PowerWord.exe | 2019/04/07 12:12:40 I Powerword -installer:main
|
update.exe | 2019/04/07 12:12:40 I update 00000590:00000a20 wpsupdate cmdline = /productVer:2016.3.3.0333 /productID:PG01-PW-2052-156-X-Personal /UserGUID:{E70EC19437F14307B1E0869DD7D9AFF6----} /DistSrc: /uuid:E70EC19437F14307B1E0869DD7D9AFF6 /from:ksostart
|
update.exe | 2019/04/07 12:12:40 I update 00000590:00000ec8 [WorkerMain]Update work thread begin.
|
update.exe | 2019/04/07 12:12:40 I update 00000590:00000a20 Update Exit.
|