File name:

kingsoftSecurity_install.exe

Full analysis: https://app.any.run/tasks/713807b7-5e87-4a7e-a047-a1ade9dc23bd
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 25, 2021, 00:24:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
kis
kingsoft
antivirus
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7D44967848022F5B65EF128E1CB62027

SHA1:

E050D124147F5C33E14BF4F7D5DB22EA281F55AE

SHA256:

8C083EEF2B1D558884C3FA9AA19877EFEE3B7F0D48BDAEFF770F0DAB8DAF2ABF

SSDEEP:

24576:7cTGnrlIKAI2SmVZg3jOsGmZiIzq6NNwf9C78f76+CyMAO0eQiUMB80eQiUMB9RD:YKnrlINI2SIgSsdzq6TuUmm+xMbyiUM6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • kingsoftSecurity_install.exe (PID: 1340)
      • duba_100_50.exe (PID: 1440)
    • Application was dropped or rewritten from another process

      • duba_100_50.exe (PID: 1440)
    • Changes the autorun value in the registry

      • duba_100_50.exe (PID: 1440)
  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • kingsoftSecurity_install.exe (PID: 1340)
    • Drops a file with too old compile date

      • kingsoftSecurity_install.exe (PID: 1340)
      • duba_100_50.exe (PID: 1440)
    • Executable content was dropped or overwritten

      • duba_100_50.exe (PID: 1440)
    • Removes files from Windows directory

      • duba_100_50.exe (PID: 1440)
    • Creates a software uninstall entry

      • duba_100_50.exe (PID: 1440)
    • Creates files in the Windows directory

      • duba_100_50.exe (PID: 1440)
    • Creates files in the driver directory

      • duba_100_50.exe (PID: 1440)
    • Drops a file that was compiled in debug mode

      • duba_100_50.exe (PID: 1440)
    • Creates/Modifies COM task schedule object

      • duba_100_50.exe (PID: 1440)
    • Creates a directory in Program Files

      • duba_100_50.exe (PID: 1440)
    • Creates files in the program directory

      • duba_100_50.exe (PID: 1440)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:12:10 14:05:42+01:00
PEType: PE32
LinkerVersion: 8
CodeSize: 741376
InitializedDataSize: 724992
UninitializedDataSize: -
EntryPoint: 0x716a4
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2020.12.10.65
ProductVersionNumber: 9.3.0.65
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Kingsoft Corporation
FileDescription: Kingsoft Security - 安装程序
FileVersion: 2020,12,10,65
InternalName: KInstallTool
LegalCopyright: Copyright (C) 1998-2020 Kingsoft Corporation
OriginalFileName: KInstallTool.exe
ProductName: Kingsoft Internet Security
ProductVersion: 9,3,0,65

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 10-Dec-2020 13:05:42
Detected languages:
  • Chinese - PRC
  • English - United States
Debug artifacts:
  • e:\KINGSOFT_DUBA\Build\Build_Src\kisengine_git\1337\product\win32\dbginfo\kinstuiofficial.pdb
CompanyName: Kingsoft Corporation
FileDescription: Kingsoft Security - 安装程序
FileVersion: 2020,12,10,65
InternalName: KInstallTool
LegalCopyright: Copyright (C) 1998-2020 Kingsoft Corporation
OriginalFilename: KInstallTool.exe
ProductName: Kingsoft Internet Security
ProductVersion: 9,3,0,65

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 10-Dec-2020 13:05:42
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000B4BAC
0x000B5000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.60814
.rdata
0x000B6000
0x0002522E
0x00026000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.80104
.data
0x000DC000
0x00008DC8
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.63633
.rsrc
0x000E5000
0x000850C4
0x00086000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.69088

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.253
1054
Latin 1 / Western European
English - United States
RT_MANIFEST
2
6.56924
9640
Latin 1 / Western European
Chinese - PRC
RT_ICON
3
6.61484
4264
Latin 1 / Western European
Chinese - PRC
RT_ICON
4
4.67813
1128
Latin 1 / Western European
Chinese - PRC
RT_ICON
5
6.44522
38056
Latin 1 / Western European
Chinese - PRC
RT_ICON
6
6.56924
9640
Latin 1 / Western European
Chinese - PRC
RT_ICON
7
6.61484
4264
Latin 1 / Western European
Chinese - PRC
RT_ICON
8
4.67813
1128
Latin 1 / Western European
Chinese - PRC
RT_ICON
9
7.21166
361
Latin 1 / Western European
Chinese - PRC
PNG
10
6.01791
1101
Latin 1 / Western European
Chinese - PRC
PNG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
MSIMG32.dll
OLEAUT32.dll
PSAPI.DLL
RASAPI32.dll
SHELL32.dll
SHLWAPI.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
download and start start kingsoftsecurity_install.exe duba_100_50.exe kingsoftsecurity_install.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1340"C:\Users\admin\Downloads\kingsoftSecurity_install.exe" C:\Users\admin\Downloads\kingsoftSecurity_install.exe
explorer.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
Kingsoft Security - 安装程序
Exit code:
0
Version:
2020,12,10,65
Modules
Images
c:\users\admin\downloads\kingsoftsecurity_install.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1440"C:\Users\admin\AppData\Local\Temp\duba_100_50.exe" /rcmdfromkinst /rcmdSceneId=2 /rcmdSoftId=0 /rcmdcheck=1 /rcmdreason="NoRcmdItem" /rcmdCid=0 /rcmdTid=0 /rcmdCanRcmd=0 /autoinstall ##silence=0&installpath="C:\Program Files\kingsoft\kingsoft antivirus\"&hwnd=5013c&tid1=100 tid2=50 tod1=100 tod2=51C:\Users\admin\AppData\Local\Temp\duba_100_50.exe
kingsoftSecurity_install.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
HIGH
Description:
安装程序
Exit code:
0
Version:
2019,06,20,22255
Modules
Images
c:\users\admin\appdata\local\temp\duba_100_50.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2672"C:\Users\admin\Downloads\kingsoftSecurity_install.exe" C:\Users\admin\Downloads\kingsoftSecurity_install.exeexplorer.exe
User:
admin
Company:
Kingsoft Corporation
Integrity Level:
MEDIUM
Description:
Kingsoft Security - 安装程序
Exit code:
3221226540
Version:
2020,12,10,65
Modules
Images
c:\systemroot\system32\ntdll.dll
Total events
276
Read events
85
Write events
119
Delete events
72

Modification events

(PID) Process:(1340) kingsoftSecurity_install.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idex
Value:
78534eb65e0bbc63b210104eaf85b681
(PID) Process:(1340) kingsoftSecurity_install.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idno
Value:
1
(PID) Process:(1340) kingsoftSecurity_install.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}
Operation:writeName:did
Value:
7D5C48EBB0D7E21D0E7F78ABD6D11F8A
(PID) Process:(1340) kingsoftSecurity_install.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}
Operation:writeName:PacketPath_1_3_1
Value:
C:\Users\admin\AppData\Local\Temp\duba_100_50.exe
(PID) Process:(1440) duba_100_50.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idno
Value:
1
(PID) Process:(1440) duba_100_50.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:idex
Value:
78534eb65e0bbc63b210104eaf85b681
(PID) Process:(1440) duba_100_50.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:svrid
Value:
(PID) Process:(1340) kingsoftSecurity_install.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\duba_100_50.exe
(PID) Process:(1440) duba_100_50.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}
Operation:writeName:svrid
Value:
9w4hjooiejuqu5wza29twykhcgav
(PID) Process:(1440) duba_100_50.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
12
Suspicious files
35
Text files
252
Unknown types
3

Dropped files

PID
Process
Filename
Type
1340kingsoftSecurity_install.exeC:\Users\admin\AppData\Local\Temp\jcqgx.ini
MD5:
SHA256:
1340kingsoftSecurity_install.exeC:\Users\admin\AppData\Local\Temp\KInstallRcmdCfg.dat
MD5:
SHA256:
1340kingsoftSecurity_install.exeC:\Users\admin\AppData\Local\Temp\duba_100_50.exe
MD5:
SHA256:
1340kingsoftSecurity_install.exeC:\Users\admin\AppData\Local\Temp\kinst.logtext
MD5:
SHA256:
1440duba_100_50.exeC:\ProgramData\Kingsoft\KIS\hg.dattext
MD5:
SHA256:
1340kingsoftSecurity_install.exeC:\Users\admin\AppData\Local\Temp\unioncfg.datbinary
MD5:DF94904C0C61F26EBBF8CBCD01FCC168
SHA256:83E8FA01B44461D2650DDBA64D351F591E7265DB8CA21343C8C6C2DB83ED368B
1440duba_100_50.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~e6bd5\install_res\2.jpgimage
MD5:D2FE241B32B67B67AEA896867054BFA3
SHA256:287187541B240F6A4A9B504D0D9FC21F49BC7C2CE6A474A5C84489984C61B147
1440duba_100_50.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~e6bd5\install_res\3.jpgimage
MD5:F3B9632B84AE1B2686AA35DF23B505EF
SHA256:10DBBB8367D847EB97F33E48D6227C33E6845C64D3309354F71CD55405481852
1440duba_100_50.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~e6bd5\install_res\4.pngimage
MD5:567412DEFA6FF8C0A22B6741903D5BD6
SHA256:EC47BE1C0109FE07FD41B5C8133CE17D3FBAFD003369FF6A0ADC616C9297205B
1440duba_100_50.exeC:\Users\admin\AppData\Local\Temp\kantivirus\~e6bd5\install_res\508.pngimage
MD5:CAAD6E02DD7795853A912DA4E7C2DCC6
SHA256:E635397306DFE1E3C878F59DB82BE49573887821BCB8775634B83509DD438CFC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
51
TCP/UDP connections
51
DNS requests
36
Threats
33

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1340
kingsoftSecurity_install.exe
HEAD
200
58.218.203.248:80
http://config.i.duba.net/lminstall3/unioncfg.dat?time=1619310285
CN
whitelisted
1340
kingsoftSecurity_install.exe
HEAD
200
182.207.100.37:80
http://cd002.www.duba.net/duba/install/2011/ever/duba20191125_100_50.exe
CN
malicious
1340
kingsoftSecurity_install.exe
GET
200
58.216.4.240:80
http://config.i.duba.net/installrcmd/KInstallRcmdCfg.dat
CN
binary
164 Kb
whitelisted
1340
kingsoftSecurity_install.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
1340
kingsoftSecurity_install.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
1340
kingsoftSecurity_install.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
1340
kingsoftSecurity_install.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
1340
kingsoftSecurity_install.exe
GET
200
182.207.100.37:80
http://cd002.www.duba.net/duba/install/2011/ever/duba20191125_100_50.exe
CN
executable
52.5 Mb
malicious
1340
kingsoftSecurity_install.exe
GET
200
58.218.203.248:80
http://config.i.duba.net/lminstall3/1.json?time=1619310289
CN
text
2.17 Kb
whitelisted
1340
kingsoftSecurity_install.exe
POST
200
119.29.49.207:80
http://infoc0.duba.net/c/
CN
binary
43 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1440
duba_100_50.exe
111.230.160.42:80
dbsu.cmcm.com
Shenzhen Tencent Computer Systems Company Limited
CN
unknown
119.29.49.207:80
infoc0.duba.net
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1340
kingsoftSecurity_install.exe
120.52.95.242:80
2398.35go.net
China Unicom IP network
CN
malicious
1340
kingsoftSecurity_install.exe
119.29.49.207:80
infoc0.duba.net
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1340
kingsoftSecurity_install.exe
58.216.4.240:80
config.i.duba.net
AS Number for CHINANET jiangsu province backbone
CN
suspicious
1340
kingsoftSecurity_install.exe
58.218.203.248:80
config.i.duba.net
No.31,Jin-rong Street
CN
suspicious
1340
kingsoftSecurity_install.exe
182.207.100.37:80
cd002.www.duba.net
No.31,Jin-rong Street
CN
malicious
1440
duba_100_50.exe
139.199.218.80:80
did.ijinshan.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1440
duba_100_50.exe
120.52.95.243:80
2398.35go.net
China Unicom IP network
CN
malicious
1440
duba_100_50.exe
119.29.49.207:80
infoc0.duba.net
Shenzhen Tencent Computer Systems Company Limited
CN
malicious

DNS requests

Domain
IP
Reputation
2398.35go.net
  • 120.52.95.242
  • 218.12.76.151
  • 218.12.76.150
  • 120.52.95.243
whitelisted
infoc0.duba.net
  • 119.29.49.207
whitelisted
config.i.duba.net
  • 58.216.4.240
  • 58.216.15.242
  • 117.91.179.129
  • 221.230.245.249
  • 58.218.203.238
  • 218.94.206.238
  • 117.91.179.130
  • 58.218.203.248
  • 58.216.4.238
  • 58.216.15.239
  • 117.91.179.229
  • 117.91.179.126
whitelisted
cd002.www.duba.net
  • 182.207.100.37
malicious
did.ijinshan.com
  • 139.199.218.80
malicious
www.baidu.com
  • 104.193.88.77
  • 104.193.88.123
whitelisted
cct.duba.com
  • 134.175.158.111
unknown
ct.duba.net
  • 139.199.215.55
whitelisted
dbsu.cmcm.com
  • 111.230.160.42
unknown

Threats

PID
Process
Class
Message
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1340
kingsoftSecurity_install.exe
Potentially Bad Traffic
ET INFO Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
11 ETPRO signatures available at the full report
Process
Message
duba_100_50.exe
01:25:40|~00272| [KAVMENU] reg_duba_32bit