| URL: | https://dldir1.qq.com/qqtv/TencentVideo10.33.5710.0.exe |
| Full analysis: | https://app.any.run/tasks/046c8d59-7e60-440e-ac23-03ad0c323750 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | April 23, 2020, 13:43:02 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | C2F593A03A9E9EF3B3300D748394E079 |
| SHA1: | D11041143C9970A24344946B1F02EF91D354BB21 |
| SHA256: | 6A9FF136255103DF3D6A652DF52B3FB77C771E12D99E88E1856309EC0BC100F5 |
| SSDEEP: | 3:N8R8ULEyXivEbk4A:2TItEbk4A |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 564 | "C:\QLDownloadGame\56.exe" | C:\QLDownloadGame\56.exe | QQLive.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 676 | "C:\Program Files\Tencent\QQLive\QQLive.exe" -LoadModule "QQLiveMainModule.dll" -type "2" | C:\Program Files\Tencent\QQLive\QQLive.exe | QQLive.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: 腾讯视频 Exit code: 0 Version: 10.33.5710.0 Modules
| |||||||||||||||
| 944 | "C:\Windows\system32\icacls.exe" "C:\Program Files\Tencent\QQLive" "/remove:g" "Authenticated Users" | C:\Windows\system32\icacls.exe | — | nsA1DD.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1016 | "C:\Users\admin\AppData\Local\Temp\nsl9173.tmp\ns9E62.tmp" "C:\Windows\system32\icacls.exe" "C:\Program Files\Tencent\QQLive" "/inheritance:d" | C:\Users\admin\AppData\Local\Temp\nsl9173.tmp\ns9E62.tmp | — | TencentVideo10.33.5710.0.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1196 | "C:\Program Files\Tencent\QQLive\QQLive.exe" -WriteCookie | C:\Program Files\Tencent\QQLive\QQLive.exe | TencentVideo10.33.5710.0.exe | ||||||||||||
User: admin Company: Tencent Integrity Level: HIGH Description: 腾讯视频 Exit code: 0 Version: 10.33.5710.0 Modules
| |||||||||||||||
| 1248 | "C:\Windows\System32\icacls.exe" C:\ProgramData\Tencent\QQLive /t /setintegritylevel low | C:\Windows\System32\icacls.exe | — | OcxHelper.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1444 | "C:\Program Files\Tencent\QQLive\QQLive.exe" -LoadModule "QQLiveMainModule.dll" -type "4" | C:\Program Files\Tencent\QQLive\QQLive.exe | QQLive.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: 腾讯视频 Exit code: 0 Version: 10.33.5710.0 Modules
| |||||||||||||||
| 1456 | regsvr32.exe /s "C:\Program Files\Tencent\QQLive\npQQLive.dll" | C:\Windows\system32\regsvr32.exe | — | TencentVideo10.33.5710.0.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1500 | "C:\Program Files\Tencent\QQLive\QQLive.exe" "" | C:\Program Files\Tencent\QQLive\QQLive.exe | TencentVideo10.33.5710.0.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: 腾讯视频 Exit code: 0 Version: 10.33.5710.0 Modules
| |||||||||||||||
| 1504 | "C:\Users\admin\AppData\Local\Temp\nsl9173.tmp\Statistics.exe" -ReportNew "-Step:1 -Result:1 -ModuleName:TencentVideo10.33.5710.0.exe -ModuleVer:10.33.5710.0 -ChannelName:channel1 -InstallDir:\"C:\Program Files\Tencent\QQLive\" -ParentProcessName:explorer.exe -NewInstall:1 -IsSilent:" | C:\Users\admin\AppData\Local\Temp\nsl9173.tmp\Statistics.exe | TencentVideo10.33.5710.0.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: 928088648 | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30808437 | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1632) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3616 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\CabE41F.tmp | — | |
MD5:— | SHA256:— | |||
| 3616 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\TarE420.tmp | — | |
MD5:— | SHA256:— | |||
| 3616 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\TencentVideo10.33.5710.0[1].exe | — | |
MD5:— | SHA256:— | |||
| 3616 | iexplore.exe | C:\Users\admin\Downloads\TencentVideo10.33.5710.0.exe.8j7tss5.partial | — | |
MD5:— | SHA256:— | |||
| 1632 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFE4430A212ADC0EC3.TMP | — | |
MD5:— | SHA256:— | |||
| 1632 | iexplore.exe | C:\Users\admin\Downloads\TencentVideo10.33.5710.0.exe.8j7tss5.partial:Zone.Identifier | — | |
MD5:— | SHA256:— | |||
| 1632 | iexplore.exe | C:\Users\admin\Downloads\TencentVideo10.33.5710.0.exe | — | |
MD5:— | SHA256:— | |||
| 1632 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Cab3CD9.tmp | — | |
MD5:— | SHA256:— | |||
| 1632 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Tar3CDA.tmp | — | |
MD5:— | SHA256:— | |||
| 1632 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\2KINT48U.txt | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1632 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
3616 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D | US | der | 471 b | whitelisted |
2944 | TencentVideo10.33.5710.0.exe | GET | 200 | 104.18.21.226:80 | http://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDH66MvlFBIR%2Fil2Ong%3D%3D | US | der | 1.54 Kb | whitelisted |
1632 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
1504 | Statistics.exe | GET | 200 | 47.246.43.223:80 | http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHv1Dj%2BciPJEWH5JNtwL5Y07mRqwQUxBF%2BiECGwkG%2FZfMa4bRTQKOr7H0CEAx9SdcIVfTpVSIEkn5jkyo%3D | US | der | 471 b | whitelisted |
2944 | TencentVideo10.33.5710.0.exe | GET | 200 | 104.18.21.226:80 | http://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDBatmz6EoaszR5ZrNw%3D%3D | US | der | 1.54 Kb | whitelisted |
1504 | Statistics.exe | GET | 200 | 47.246.43.223:80 | http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAh%2BGPuPqpJ%2B6HYKDYmC9RI%3D | US | der | 471 b | whitelisted |
1632 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
2944 | TencentVideo10.33.5710.0.exe | GET | 200 | 151.101.2.133:80 | http://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCCwQAAAAAAURO8EJH | US | der | 1.49 Kb | whitelisted |
1632 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3616 | iexplore.exe | 23.53.40.19:443 | — | Telia Company AB | NL | unknown |
1632 | iexplore.exe | 152.199.19.161:443 | iecvlist.microsoft.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
1632 | iexplore.exe | 204.79.197.200:443 | ieonline.microsoft.com | Microsoft Corporation | US | whitelisted |
3616 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2944 | TencentVideo10.33.5710.0.exe | 203.205.235.67:443 | tunnel.video.qq.com | — | CN | unknown |
2944 | TencentVideo10.33.5710.0.exe | 203.205.137.11:443 | dldir1.qq.com | Tencent Building, Kejizhongyi Avenue | CN | malicious |
1632 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
1504 | Statistics.exe | 203.205.137.11:80 | dldir1.qq.com | Tencent Building, Kejizhongyi Avenue | CN | malicious |
1728 | Statistics.exe | 203.205.137.11:80 | dldir1.qq.com | Tencent Building, Kejizhongyi Avenue | CN | malicious |
1504 | Statistics.exe | 203.205.239.169:443 | omgid.qq.com | — | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
dldir1.qq.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
ieonline.microsoft.com |
| whitelisted |
tunnel.video.qq.com |
| whitelisted |
btrace.qq.com |
| suspicious |
omgid.qq.com |
| unknown |
www.microsoft.com |
| whitelisted |
ocsp.globalsign.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1732 | hardwarecheck.exe | Generic Protocol Command Decode | SURICATA HTTP missing Host header |
1732 | hardwarecheck.exe | Potential Corporate Privacy Violation | ET POLICY QQ Browser WUP Request - qbpcstatf.stat |
1732 | hardwarecheck.exe | Generic Protocol Command Decode | SURICATA HTTP missing Host header |
1732 | hardwarecheck.exe | Generic Protocol Command Decode | SURICATA HTTP missing Host header |
1732 | hardwarecheck.exe | Generic Protocol Command Decode | SURICATA HTTP missing Host header |
676 | QQLive.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
676 | QQLive.exe | A Network Trojan was detected | ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2 |
676 | QQLive.exe | Misc activity | ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) |
2932 | hardwarecheck.exe | Potential Corporate Privacy Violation | ET POLICY Http Client Body contains pwd= in cleartext |
2932 | hardwarecheck.exe | Potential Corporate Privacy Violation | ET POLICY Http Client Body contains pwd= in cleartext |
Process | Message |
|---|---|
Statistics.exe | Generator |
Statistics.exe | CheckParentProcSign Sign success |
Statistics.exe | CheckParentProcSign Sign success |
Statistics.exe | Generator |
Statistics.exe | Generator |
Statistics.exe | Has Found |
Statistics.exe | Has Found |
Statistics.exe | Has Found |
Statistics.exe | Has Found |
Statistics.exe | Has Found |